<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Scaling ISE - adding pxGrid / TACACS+ in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705873#M507657</link>
    <description>&lt;P&gt;Please check out the &lt;A href="https://community.cisco.com/t5/security-documents/ise-performance-amp-scale/ta-p/3642148" target="_self"&gt;ISE performance and scale &lt;/A&gt;community page that will give you idea about shared PSNs using PxGrid. This is under PxGrid scaling. The TACACS+ performance is based on dedicated appliance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apart of security, also think about service failure. Do you want device administration service impacted if there is a problem in PxGrid and node goes down?. Viceversa holds good as well.&lt;/P&gt;
&lt;P&gt;My opinion is leave the TACACS+ seperate so that your device administration is smooth and network admins dont have a problem. However if your network is small and you have only a few administrators checking sporadically the status you can consider sharing. However remember that the purpose of using PxGrid is to share the context so that this is consumed by a Cisco or third party device for a specific reason. Think about the importance of that service and make the decision.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Krishnan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Sep 2018 21:08:07 GMT</pubDate>
    <dc:creator>kthiruve</dc:creator>
    <dc:date>2018-09-12T21:08:07Z</dc:date>
    <item>
      <title>Scaling ISE - adding pxGrid / TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705858#M507656</link>
      <description>&lt;P&gt;Hey team, I'm searching for a good reference document that shows scalability within distributed environment 2.4 (separate PAN/MnT/PSN) now adding TACACS+ and pxGrid functions. What I'm searching for - pro/cons/#s IF I add TACACS+ to existing PSNs that are used for wired/wireless and the same for pxGrid. VS. Building brand new pair of PSNs for pxGrid ONLY and brand new pair of PSNs for TACACS+ ONLY. I understand the security good/bad - BUT I'm looking for actual #s and any limitations. Thanks for feedback!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 20:39:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705858#M507656</guid>
      <dc:creator>MS-JK</dc:creator>
      <dc:date>2018-09-12T20:39:38Z</dc:date>
    </item>
    <item>
      <title>Re: Scaling ISE - adding pxGrid / TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705873#M507657</link>
      <description>&lt;P&gt;Please check out the &lt;A href="https://community.cisco.com/t5/security-documents/ise-performance-amp-scale/ta-p/3642148" target="_self"&gt;ISE performance and scale &lt;/A&gt;community page that will give you idea about shared PSNs using PxGrid. This is under PxGrid scaling. The TACACS+ performance is based on dedicated appliance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apart of security, also think about service failure. Do you want device administration service impacted if there is a problem in PxGrid and node goes down?. Viceversa holds good as well.&lt;/P&gt;
&lt;P&gt;My opinion is leave the TACACS+ seperate so that your device administration is smooth and network admins dont have a problem. However if your network is small and you have only a few administrators checking sporadically the status you can consider sharing. However remember that the purpose of using PxGrid is to share the context so that this is consumed by a Cisco or third party device for a specific reason. Think about the importance of that service and make the decision.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Krishnan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Sep 2018 21:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705873#M507657</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2018-09-12T21:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Scaling ISE - adding pxGrid / TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705989#M507662</link>
      <description>&lt;P&gt;Thanks Krishnan for feedback.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know IF adding pxGrid function on existing standalone PSN nodes(that are handling wire/wireless) could have effect on performance for existing radius/802.1x servers that they are already providing?&amp;nbsp;&amp;nbsp; Same with TACACS+.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The debate is:&lt;/P&gt;
&lt;P&gt;NOW: (scaled down - there are actually more PSNs)&lt;/P&gt;
&lt;P&gt;DC1: pan(a) mnt(a) (psn1)&lt;/P&gt;
&lt;P&gt;DC2: pan(s) mnt(s) (psn2)&lt;/P&gt;
&lt;P&gt;vs: (keeping it distributed all nodes separated)&lt;/P&gt;
&lt;P&gt;DC1: pan(a) mnt(a) (psn1) (pxgrid) (tacacs+)&lt;/P&gt;
&lt;P&gt;DC2: pan(s) mnt(s) (psn2) (pxgrid) (tacacs+)&lt;/P&gt;
&lt;P&gt;vs:&lt;/P&gt;
&lt;P&gt;DC1: pan(a) mnt(a) (psn1+pxgrid) (tacacs+)&lt;/P&gt;
&lt;P&gt;DC2: pan(s) mnt(s) (psn2+pxgrid) (tacacs+)&lt;/P&gt;
&lt;P&gt;vs:&lt;/P&gt;
&lt;P&gt;DC1: pan(a) mnt(a) (psn1+pxgrid+tacacs+)&lt;/P&gt;
&lt;P&gt;DC2: pan(s) mnt(s) (psn2+pxgrid+tacacs+)&lt;/P&gt;
&lt;P&gt;vs:&lt;/P&gt;
&lt;P&gt;DC1: pan(a) mnt(a) (psn1+tacacs+) (pxgrid)&lt;/P&gt;
&lt;P&gt;DC2: pan(s) mnt(s) (psn2+tacacs+) (pxgrid)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 04:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3705989#M507662</guid>
      <dc:creator>MS-JK</dc:creator>
      <dc:date>2018-09-13T04:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: Scaling ISE - adding pxGrid / TACACS+</title>
      <link>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3706004#M507665</link>
      <description>&lt;P&gt;I have colocated those services with PSNs in large deployment models in the past without issue, but every customer flows/patterns are different.&amp;nbsp; My general recommendation (and those of our solution architects) are if you are large enough to build a large deployment model (separate PAN/M&amp;amp;T/PSNs) then build separate TACACS and pxGrid nodes.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not sure if you will find specific data as in many (probably most) cases colocating will work just fine, but the best practice is to split them off.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2018 04:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/scaling-ise-adding-pxgrid-tacacs/m-p/3706004#M507665</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-09-13T04:23:41Z</dc:date>
    </item>
  </channel>
</rss>

