<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE failover in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3367006#M549270</link>
    <description>&lt;P&gt;Just to add my 2c worth to what the others have said.&amp;nbsp; When the PAN is unavailable, then the Guest Sponsor Portal does not work (sponsors cannot login, because the central database lives in the PAN).&amp;nbsp; Guest authentications continue to operate normally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a distributed environment you can enable automatic PAN failover but you need an external node such as a MnT or PSN to act as a health monitor of the PAN.&amp;nbsp; I use this because it's handy when PAN crashes at 2AM and nobody is around to promote the other PAN to Primary.&amp;nbsp; These things are not fast&amp;nbsp;- the detection should be intentionally slow to avoid any flip flopping between PAN's - usually 10min to detect a failure, and then the&amp;nbsp;X minutes it takes for you PAN to restart its services (on Secondary and Primary).&lt;/P&gt;
&lt;P&gt;Automatic PAN failover must be temporarily disabled if you plan to patch your system, or if you plan to restart the PAN services (e.g. for a TAC case or whatever).&amp;nbsp; But mostly it's an insurance policy that I like to have in place.&lt;/P&gt;
&lt;P&gt;One last thing - we are lucky enough to have a big F5 deployment and we use the GTM (Global Traffic Manager) to act as a kind of DNS for the auto failover.&amp;nbsp; Our ISE admins don't care which PAN is active - they can always browse to (made up name) iseadmin.company.com and this resolves to the correct PAN (spread across two data centres).&amp;nbsp; The GTM uses a RESTful API call to both PAN nodes to check which is active, and becomes authoritative for that FQDN.&amp;nbsp; It's one less hassle for the operations people to deal with.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Apr 2018 22:34:40 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2018-04-16T22:34:40Z</dc:date>
    <item>
      <title>ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366481#M549262</link>
      <description>&lt;P&gt;Hi.. i have recently deployed another ISE node as secondary so that incase primary node is down there should&amp;nbsp; be no impact, i have two node (primary and secondary) in ISE distributed environment.&lt;/P&gt;
&lt;P&gt;I have a bit confusion on failover, if incase primary node is down then do i need to promote secondary node as primary so that dot1x auth and tacacs..etc should work OR it will still work without promoting secondary node to primary.&lt;/P&gt;
&lt;P&gt;please suggest.&lt;/P&gt;
&lt;P&gt;Node-1 - Primary - (Role- Primary admin and Primary monitoring)&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Node-2 - Secondary - (Role- Secondary admin and Primary monitoring)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366481#M549262</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2020-02-21T18:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366562#M549264</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PAN failover is needed for other services, not for radius and tacacs. You won't be able to change anything in policies and all, but the service itself will be working. It's just a matter of NAD to detect radius/tacacs is down for the first ISE node configured in CLI and switch to the second node.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If other services are in place, it depends..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise-failover.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/10389i52CE9AAB7269D78B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise-failover.PNG" alt="ise-failover.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_011.html#ID15" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_011.html#ID15&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 08:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366562#M549264</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-04-16T08:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366604#M549267</link>
      <description>&lt;P&gt;Hi Octavian.. Thanks, so in my case services(radius and tacacs) will run on secondary ISE without promoting it to primary.&lt;/P&gt;
&lt;P&gt;One more thing when primay node comes up, will it automatically take role of primary, i mean what would be its current role post it comes up.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 09:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366604#M549267</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2018-04-16T09:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366618#M549268</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Your primary PAN will still be primary after it comes back online. You can restart each node independently and each one will retain its former ISE persona/function.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Octavian&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 10:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366618#M549268</guid>
      <dc:creator>Octavian Szolga</dc:creator>
      <dc:date>2018-04-16T10:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366683#M549269</link>
      <description>&lt;P&gt;In a 2-node deployment such as yours, the normal persona (role) setup is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Node 1: Primary PAN, Secondary MnT, PSN, Device Admin (TACACS)&lt;/P&gt;
&lt;P&gt;Node 2: Secondary PAN, Primary MnT, PSN, Device Admin (TACACS)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your network access devices are configured to use both nodes for RADIUS and TACACS services so the loss of either one does not affect those services.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As noted earlier, when the primary PAN is down you lose the ability to change settings (and a few more obscure things like automatic profiler updates from cisco.com) but everything else works fine.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 12:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3366683#M549269</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-16T12:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3367006#M549270</link>
      <description>&lt;P&gt;Just to add my 2c worth to what the others have said.&amp;nbsp; When the PAN is unavailable, then the Guest Sponsor Portal does not work (sponsors cannot login, because the central database lives in the PAN).&amp;nbsp; Guest authentications continue to operate normally.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a distributed environment you can enable automatic PAN failover but you need an external node such as a MnT or PSN to act as a health monitor of the PAN.&amp;nbsp; I use this because it's handy when PAN crashes at 2AM and nobody is around to promote the other PAN to Primary.&amp;nbsp; These things are not fast&amp;nbsp;- the detection should be intentionally slow to avoid any flip flopping between PAN's - usually 10min to detect a failure, and then the&amp;nbsp;X minutes it takes for you PAN to restart its services (on Secondary and Primary).&lt;/P&gt;
&lt;P&gt;Automatic PAN failover must be temporarily disabled if you plan to patch your system, or if you plan to restart the PAN services (e.g. for a TAC case or whatever).&amp;nbsp; But mostly it's an insurance policy that I like to have in place.&lt;/P&gt;
&lt;P&gt;One last thing - we are lucky enough to have a big F5 deployment and we use the GTM (Global Traffic Manager) to act as a kind of DNS for the auto failover.&amp;nbsp; Our ISE admins don't care which PAN is active - they can always browse to (made up name) iseadmin.company.com and this resolves to the correct PAN (spread across two data centres).&amp;nbsp; The GTM uses a RESTful API call to both PAN nodes to check which is active, and becomes authoritative for that FQDN.&amp;nbsp; It's one less hassle for the operations people to deal with.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 22:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3367006#M549270</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-04-16T22:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3368833#M549383</link>
      <description>&lt;P&gt;Thanks Marvin, Octavian &amp;amp; Arne for your helpful suggestion,&lt;/P&gt;
&lt;P&gt;Aside to marvin ..could you please brief about difference if i setup Primary MnT on Primary node versus Secondary MnT on Primary node as you mentioned in your post.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 09:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3368833#M549383</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2018-04-19T09:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: ISE failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3369071#M549384</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325962"&gt;@Anukalp S&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm following Cisco're recommendation for a standard 2-node deployment. The rationale that's been explained to me is that MnT is a more resource-intensive function so moving it off of the primary PAN helps system performance overall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to Cisco Live presentation "BRKSEC-3699 Designing ISE for Scale and High Availability" for much much more about this topic.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 15:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-failover/m-p/3369071#M549384</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-04-19T15:14:08Z</dc:date>
    </item>
  </channel>
</rss>

