<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Auto Failover in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775562#M486521</link>
    <description>&lt;P&gt;Regarding the timers, I don't know if there is enough field experience to answer this reliably, but let's be clear about what this Automatic PAN failover is for.&amp;nbsp; If the PAN fails, then Guests will still get to the guest portal and MAB etc will still work.&amp;nbsp; The urgency is around the Sponsor Portal because that will be unavailable while the PAN is not running 100%.&amp;nbsp; That's the only issue as far as I know.&amp;nbsp; How quickly do you need the Sponsor portal back up?&amp;nbsp; 20min sounds reasonable.&amp;nbsp; Why not make it more aggressive?&amp;nbsp; Because if the PAN is restarted intentionally (or there is a transient LAN failure), then you don't want to Auto failover to kick in and start causing havoc.&amp;nbsp; Leave yourself some room.&amp;nbsp; Remember that this mechanism causes the Standby to restart - that is not fast. So you want to avoid that if it's not required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Jan 2019 23:24:08 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2019-01-08T23:24:08Z</dc:date>
    <item>
      <title>ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775065#M486518</link>
      <description>&lt;P&gt;I want to confirm this is still true today with 2.4&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/identity-services-engine-ise/pan-auto-failover-for-2-ise/td-p/3512753" target="_blank"&gt;https://community.cisco.com/t5/identity-services-engine-ise/pan-auto-failover-for-2-ise/td-p/3512753&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I require automatic failover for guest/sponsorship services and currently running in standalone mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It appears that the minimum deployment mode in this case is medium. Example:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PAN/MNT Primary (DC1)&lt;/LI&gt;
&lt;LI&gt;PAN/MNT Secondary (DC2)&lt;/LI&gt;
&lt;LI&gt;PSN1 (DC1)&lt;/LI&gt;
&lt;LI&gt;PSN2 (DC2)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PSNs also acting as health check boxes for their respective DC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can I get confirmation?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, based on the timers are we looking at best time for guest services to be available during auto failover is 20 minutes?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 13:16:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775065#M486518</guid>
      <dc:creator>Jason Maynard</dc:creator>
      <dc:date>2019-01-08T13:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775126#M486519</link>
      <description>I assume you’re talking about PAN auto failover correct? Correct minimum deployment requires PAN/MNT on their own boxes and PSN outside of this deployment to monitor. See sizing guide.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_00.html#ID-1413-000000b1" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_00.html#ID-1413-000000b1&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;see here for what’s available when the PAN is down&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_011.html#ID59" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ise_admin_guide_24/b_ise_admin_guide_24_new_chapter_011.html#ID59&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The default times should be fine.&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Jan 2019 14:37:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775126#M486519</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-08T14:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775405#M486520</link>
      <description>&lt;P&gt;Just to be clear -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Multiple DCs I would required a medium deployment&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PAN/MNT Primary (DC1)&lt;/LI&gt;
&lt;LI&gt;PAN/MNT Secondary (DC2)&lt;/LI&gt;
&lt;LI&gt;PSN1 (DC1)&lt;/LI&gt;
&lt;LI&gt;PSN2 (DC2)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Each PSN acting as a health check node for their respective DC PAN/MNT as well as PSN&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Single DC is this supported&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PAN/MNT Primary (DC1)&lt;/LI&gt;
&lt;LI&gt;PAN/MNT Secondary (DC1)&lt;/LI&gt;
&lt;LI&gt;PSN1 (DC1)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Single PSN acting as a health check node for their respective DC PAN/MNT as well as PSN.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, with the timers - can I tweak them to reduce the overall time to failover? Recommended?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;BR /&gt;Jason&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 19:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775405#M486520</guid>
      <dc:creator>Jason Maynard</dc:creator>
      <dc:date>2019-01-08T19:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775562#M486521</link>
      <description>&lt;P&gt;Regarding the timers, I don't know if there is enough field experience to answer this reliably, but let's be clear about what this Automatic PAN failover is for.&amp;nbsp; If the PAN fails, then Guests will still get to the guest portal and MAB etc will still work.&amp;nbsp; The urgency is around the Sponsor Portal because that will be unavailable while the PAN is not running 100%.&amp;nbsp; That's the only issue as far as I know.&amp;nbsp; How quickly do you need the Sponsor portal back up?&amp;nbsp; 20min sounds reasonable.&amp;nbsp; Why not make it more aggressive?&amp;nbsp; Because if the PAN is restarted intentionally (or there is a transient LAN failure), then you don't want to Auto failover to kick in and start causing havoc.&amp;nbsp; Leave yourself some room.&amp;nbsp; Remember that this mechanism causes the Standby to restart - that is not fast. So you want to avoid that if it's not required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775562#M486521</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2019-01-08T23:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775569#M486522</link>
      <description>Yes agree with Arne. Leave alone . Also have 2 PSNs for redundancy &lt;BR /&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775569#M486522</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-08T23:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775570#M486523</link>
      <description>&lt;P&gt;Thanks on the timers. Just need confirmation on the examples single vs. Dual DCs&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:36:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775570#M486523</guid>
      <dc:creator>Jason Maynard</dc:creator>
      <dc:date>2019-01-08T23:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775572#M486524</link>
      <description>&lt;P&gt;Hey Jason&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would 3 be a supported solution 2x PAN/MNt and 1xPSN? Just want to have all the options available - I realize that 2x PSN provides redundancy for policies and health checks but need to be clear what min is supported&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775572#M486524</guid>
      <dc:creator>Jason Maynard</dc:creator>
      <dc:date>2019-01-08T23:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775573#M486525</link>
      <description>They’re fine but make sure to have minimum 2 psns separate from the PAN/MNT in either scenario &lt;BR /&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775573#M486525</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-08T23:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Auto Failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775578#M486526</link>
      <description>That all depends on your scale but yes 1 psn is minimal but not recommended&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_00.html#ID-1413-00000018" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/install_guide/b_ise_InstallationGuide24/b_ise_InstallationGuide24_chapter_00.html#ID-1413-00000018&lt;/A&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 08 Jan 2019 23:58:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-auto-failover/m-p/3775578#M486526</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2019-01-08T23:58:13Z</dc:date>
    </item>
  </channel>
</rss>

