<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE upgrade from 1.3 to 2.1 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515179#M519849</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct. The info is on using the ISE admin web UI to apply the patches.&lt;/P&gt;&lt;P&gt;When using CLI, the ISE admin has the control which one ISE node got applied first and when to start patching on any of the ISE nodes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Dec 2017 01:37:21 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-12-13T01:37:21Z</dc:date>
    <item>
      <title>ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515162#M519830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Champs!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A quick question: We are running ISE 1.3 and would like to upgrade.&lt;/P&gt;&lt;P&gt;Is there any stable version we could upgrade to?&lt;/P&gt;&lt;P&gt;I see we can directly update from 1.3 to 2.1, but not to 2.2.&lt;/P&gt;&lt;P&gt;Is it a good idea to update to 2.1?&lt;/P&gt;&lt;P&gt;We are running ISE in distributed environment with multiple nodes.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Nov 2017 23:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515162#M519830</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-11-15T23:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515163#M519831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Moin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the release notes for ISE 2.1 and 2.2 to see what version you can upgrade to.&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/release_notes/ise21_rn.html&lt;/P&gt;&lt;P&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/release_notes/ise22_rn.html&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, it is recommended to upgrade to the latest patch.&lt;/P&gt;&lt;P&gt;Curious to know if there are there specific reasons why you want to upgrade?&lt;/P&gt;&lt;P&gt;Also good to know features and functionalities that you are using in ISE 1.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISE 2.2 is a two step upgrade and Patch 4 is the latest.&lt;/P&gt;&lt;P&gt;For ISE 2.1, please see another thread related to the patches in the community forum.&lt;/P&gt;&lt;P&gt;https://communities.cisco.com/thread/84256?start=15&amp;amp;tstart=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 01:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515163#M519831</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-11-16T01:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515164#M519832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;Krishnan Thiruvengadam wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Moin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please see the release notes for ISE 2.1 and 2.2 to see what version you can upgrade to.&lt;/P&gt;
&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/release_notes/ise21_rn.html" onclick="" rel="nofollow" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/release_notes/ise21_rn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/release_notes/ise22_rn.html" onclick="" rel="nofollow" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/release_notes/ise22_rn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In general, it is recommended to upgrade to the latest patch.&lt;/P&gt;
&lt;P&gt;Curious to know if there are there specific reasons why you want to upgrade?&lt;/P&gt;
&lt;P&gt;Also good to know features and functionalities that you are using in ISE 1.3.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ISE 2.2 is a two step upgrade and Patch 4 is the latest.&lt;/P&gt;
&lt;P&gt;For ISE 2.1, please see another thread related to the patches in the community forum.&lt;/P&gt;
&lt;P&gt;&lt;A _jive_internal="true" data-containerid="5301" data-containertype="14" data-objectid="84256" data-objecttype="1" href="https://community.cisco.com/thread/84256?start=15&amp;amp;tstart=0" onclick=""&gt;https://communities.cisco.com/thread/84256?start=15&amp;amp;tstart=0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Krishnan&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi Krishnan,&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Curious to know if there are there specific reasons why you want to upgrade?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Customer requirement to update the software versions on ISE, WLC and Prime.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Also good to know features and functionalities that you are using in ISE 1.3.&lt;/STRONG&gt;&lt;BR /&gt;We are using ISE for Wired/Wireless User Authentication/Authorization using External Identity Source (AD), Certificate based Authentication, VPN User Authentication etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 01:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515164#M519832</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-11-16T01:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515165#M519833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For customer deployment still in ISE 1.x.x, our general recommendation is to upgrade it to ISE 2.2 latest patch (Patch 4 is the current latest) as Krishnan suggested.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 22:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515165#M519833</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-11-16T22:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515166#M519834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;hslai wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For customer deployment still in ISE 1.x.x, our general recommendation is to upgrade it to ISE 2.2 latest patch (Patch 4 is the current latest) as Krishnan suggested.&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Would you suggest if the latest patch is stable version or would it be a good idea to upgrade to 2.1?&lt;/P&gt;&lt;P&gt;If upgrading to 2.2, we would have to update 1.3--&amp;gt;1.4--&amp;gt;2.2?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 23:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515166#M519834</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-11-16T23:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515167#M519835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That would work but I would suggest 1.3 -&amp;gt; 1.3 latest patch -&amp;gt; 2.1 -&amp;gt; 2.1 latest patch-&amp;gt; 2.2 -&amp;gt; 2.2 latest patch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It could be a time saving, in case of operational data not important, by&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;taking an ISE CFG backup of ISE 1.3 with latest patch,&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;restoring (1) to either a new ISE node or a de-registered ISE node from ISE 1.3 deployment and freshly installed with ISE 2.1 and applied the latest patch&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;upgrading (2) to ISE 2.2 and then applying the latest patch or taking a CFG backup of (2) and restoring it to a fresh installed ISE 2.2 latest patch.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;using (3) as the primary ISE admin node and fresh installing all other nodes and joining them to the ISE 2.2 deployment. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If operational data is important to keep, then we will also need to take an OPS backup, to restore it to ISE 2.1 latest patch, and then to upgrade it to ISE 2.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Nov 2017 23:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515167#M519835</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-11-16T23:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515168#M519836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;hslai wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That would work but I would suggest 1.3 -&amp;gt; 1.3 latest patch -&amp;gt; 2.1 -&amp;gt; 2.1 latest patch-&amp;gt; 2.2 -&amp;gt; 2.2 latest patch.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It could be a time saving, in case of operational data not important, by&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;taking an ISE CFG backup of ISE 1.3 with latest patch,&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;restoring (1) to either a new ISE node or a de-registered ISE node from ISE 1.3 deployment and freshly installed with ISE 2.1 and applied the latest patch&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;upgrading (2) to ISE 2.2 and then applying the latest patch or taking a CFG backup of (2) and restoring it to a fresh installed ISE 2.2 latest patch.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;using (3) as the primary ISE admin node and fresh installing all other nodes and joining them to the ISE 2.2 deployment. &lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If operational data is important to keep, then we will also need to take an OPS backup, to restore it to ISE 2.1 latest patch, and then to upgrade it to ISE 2.2.&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;1. taking an ISE CFG backup of ISE 1.3 with latest patch,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Taking config backup of only Primary Admin Node?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2. &lt;SPAN style="font-size: 10pt;"&gt;restoring (1) to either a new ISE node or a de-registered ISE node from ISE 1.3 deployment and freshly installed with ISE 2.1 and applied the latest patch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;When we de-register Primary Admin Node, the Primary and Secondary PSNs would still be serving the client requests?&lt;/SPAN&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Nov 2017 23:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515168#M519836</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-11-22T23:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515169#M519837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On (1), yes, please take the config backup from the primary admin node.&lt;/P&gt;&lt;P&gt;On (2), we usually de-register one of the ISE secondary nodes (including the ISE secondary admin), instead of the ISE primary admin node. If you do prefer to de-register the ISE primary admin node, then first promote the secondary admin to primary and de-register the original primary admin node. The deployment will always have one and only one primary admin node, unless standalone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Nov 2017 00:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515169#M519837</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-11-25T00:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515170#M519838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was busy with WLCs upgrade which went good.&lt;/P&gt;&lt;P&gt;Now we'll be updating ISE. While reading the upgrade guide for ISE 2.1; at one stage it says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;&lt;SPAN style="font-style: inherit; font-weight: inherit; font-size: inherit; font-family: inherit;"&gt;Release 2.1&lt;/SPAN&gt; supports Red Hat Enterprise Linux (RHEL) 7.0.&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;If you are upgrading Cisco ISE nodes on VMware virtual machines, &lt;STRONG&gt;after upgrade is complete&lt;/STRONG&gt;, ensure that you change the Guest Operating System to Red Hat Enterprise Linux (RHEL) 7. To do this, you must power down the VM, change the Guest Operating System to RHEL 7, and power on the VM after the change.&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;On another place, it says:&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;If you are upgrading Cisco ISE nodes on virtual machines, ensure that you change the Guest Operating System to Red Hat Enterprise Linux (RHEL) 7. To do this, you must power down the VM, change the Guest Operating System to RHEL 7, and power on the VM after the change. RHEL 7 supports only E1000 and VMXNET3 network adapters. Be sure to &lt;STRONG&gt;change the network adapter type before you upgrade.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-top: 12px; margin-bottom: 12px; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; color: #58585b;"&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;STRONG&gt;Doe it mean to change adapter first, upgrade and then change the guest operating system?&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 09:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515170#M519838</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-12-11T09:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515171#M519839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You change the adapter before upgrade and the operating system after&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2017 12:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515171#M519839</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-12-11T12:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515172#M519840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Champs!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What order should we apply the patch if we are using CLI?&lt;/P&gt;&lt;P&gt;Would there be any downtime when applying the patch individually on each node?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515172#M519840</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-12-13T01:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515173#M519841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Primary PAN first. Then, the rest can be in any order.&lt;/P&gt;&lt;P&gt;Yes, there would be downtime but you would have the control over which ISE nodes down when doing it via CLI. ISE patching usually will restart ISE services and some patches will reboot the O/S.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515173#M519841</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-13T01:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515174#M519842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please check the admin guide on this process, it’s all explained&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515174#M519842</guid>
      <dc:creator>Jason Kunst</dc:creator>
      <dc:date>2017-12-13T01:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515175#M519843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks hslai,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we do the Primary PAN first, wouldn't there be a patch mismatch between Primary PAN and all other nodes?&lt;/P&gt;&lt;P&gt;Would this cause any issues?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515175#M519843</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-12-13T01:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515176#M519844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;During patching, it's fine that not all ISE nodes in the same patch level as that is expected.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515176#M519844</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-13T01:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515177#M519845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The guide says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-size: 14px; font-family: CiscoSans, Arial, sans-serif; text-decoration: underline;"&gt;When you install a patch from the Primary PAN that is part of a distributed deployment, Cisco ISE installs the patch on the primary node and then all the secondary nodes in the deployment. If the patch installation is successful on the Primary PAN, Cisco ISE then continues patch installation on the secondary nodes. If it fails on the Primary PAN, the installation does not proceed to the secondary nodes. However, if the installation fails on any of the secondary nodes for any reason, it still continues with the next secondary node in your deployment. Secondary Cisco ISE nodes are restarted consecutively after the patch is installed on those nodes. While installing a patch on secondary nodes, you can continue to perform tasks on the Primary PAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;whichh I believe is true when we use GUI. I'd be using CLI to apply patch on individual nodes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;Any thoughts?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515177#M519845</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-12-13T01:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515178#M519846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have 2 PSNs running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. We update patch on Primary PAN.&lt;/P&gt;&lt;P&gt;2. Update patch on 1st PSN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point of time Primary PAN has latest patch and 2nd PSN is on older patch. Would 2nd PSN still be working and authenticating the clients while 1st PSN patch update is in progress?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515178#M519846</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-12-13T01:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515179#M519849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct. The info is on using the ISE admin web UI to apply the patches.&lt;/P&gt;&lt;P&gt;When using CLI, the ISE admin has the control which one ISE node got applied first and when to start patching on any of the ISE nodes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515179#M519849</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-13T01:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515180#M519853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 01:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515180#M519853</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-12-13T01:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE upgrade from 1.3 to 2.1</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515181#M519857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This change of Guest OS is so confusing:&lt;/P&gt;&lt;P&gt;The Upgrade Guide 2.1 says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline;"&gt;Prep for the Upgrade Section: &lt;/STRONG&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/upgrade_guide/b_ise_upgrade_guide_21/b_ise_upgrade_guide_21_chapter_01.html#id_18074" title="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/upgrade_guide/b_ise_upgrade_guide_21/b_ise_upgrade_guide_21_chapter_01.html#id_18074"&gt;Cisco Identity Services Engine Upgrade Guide, Release 2.1&amp;nbsp; - Prepare for Upgrade [Cisco Identity Services Engine] - Cis…&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;If you are upgrading Cisco ISE nodes on virtual machines, ensure that you change the Guest Operating System to Red Hat Enterprise Linux (RHEL) 7. To do this, you must power down the VM, change the Guest Operating System to RHEL 7, and power on the VM after the change. RHEL 7 supports only E1000 and VMXNET3 network adapters. Be sure to change the network adapter type before you upgrade.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;STRONG style="text-decoration: underline;"&gt;Post-Upgrade Tasks Section:&lt;/STRONG&gt; &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/upgrade_guide/b_ise_upgrade_guide_21/b_ise_upgrade_guide_21_chapter_0100.html#reference_FE2938C15CD64E48B4CB19BF843C624A" title="https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/upgrade_guide/b_ise_upgrade_guide_21/b_ise_upgrade_guide_21_chapter_0100.html#reference_FE2938C15CD64E48B4CB19BF843C624A"&gt;Cisco Identity Services Engine Upgrade Guide, Release 2.1&amp;nbsp; - Post-Upgrade Tasks [Cisco Identity Services Engine] - Cisc…&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;Ensure that the Guest Operating System on the VMware virtual machine is set to Red Hat Enterprise Linux (RHEL) 7 and the network adapter is set to E1000 or VMXNET3.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #58585b; font-family: CiscoSans, Arial, sans-serif; font-size: 14px;"&gt;Should this be doen before or after?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Dec 2017 04:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-from-1-3-to-2-1/m-p/3515181#M519857</guid>
      <dc:creator>dot1x</dc:creator>
      <dc:date>2017-12-13T04:48:41Z</dc:date>
    </item>
  </channel>
</rss>

