<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need suggestion for ISE distributed deployment model in data centers with autonomy requirement in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3332012#M550221</link>
    <description>&lt;P&gt;My 2 cents,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-You cannot have more than 1 Primary PAN + MNT and 1 Secondary PAN + MNT for the whole deployment.&lt;/P&gt;
&lt;P&gt;-Running multiple personas on the same node reduces significantly the number of sessions x node. I mean, if you have for example a 3495 PSN running as well PAN and MNT then you will not get the 25K sessions for that node. I would post later the table showing what happens with the specific appliance/VM when running different personas. SO at the end, the best way to go is separate PSN from Admin Nodes.&lt;/P&gt;
&lt;P&gt;-PSN's can run no matter if PRIMARY PAN and SECONDARY PAN are both down but no live logs/troubleshooting options available. The only problem is that you would have to rebuild the whole&amp;nbsp;deployment if one of them is not recovered. If Primary / Secondary MNT are down but PAN's are up, the authentication would still work but no live logs/reports.&lt;/P&gt;
&lt;P&gt;-Do not use ISE 2.2, wait for 2.4 which is expected to be more stable. However,&amp;nbsp;2.3 does the work.&lt;/P&gt;
&lt;P&gt;-Only option, place Primary PAN/MNT on DC1 + PSN's, Secondary PAN/MNT + PSN's on DC2 and DC3 just for PSN's. If you have resources, RUN each persona on independent appliances or VM's. DO NOT combine multiple personas on 1 appliance as I mentioned before. I have seen that running multiple personas on 3495 does not work properly. Poor performance and multiple issues.&lt;/P&gt;
&lt;P&gt;-Deploy 3595 VM's or appliances. By far more powerful and not end of life product.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Feb 2018 19:49:39 GMT</pubDate>
    <dc:creator>ajc</dc:creator>
    <dc:date>2018-02-15T19:49:39Z</dc:date>
    <item>
      <title>Need suggestion for ISE distributed deployment model in data centers with autonomy requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3331488#M550206</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I'm looking for a suggestion for an ISE deployment model for our three data centers. These three data centers have autonomy requirements each. This means that every data center must fully deliver all the services in case of the lost of two data centers. If I place PAN and MnT centrally and PSNs in all the three data centers I will not be able to manage the ISE infrastructure in case I lost the central data center. If I spread the PAN and MnT&amp;nbsp;over two of the three data centers that needs autonomy and PSNs in all the three data centers I will not be able to manage the ISE infrastructure in case I lost the two data centers where the PAN and MnT personas are.&lt;/P&gt;
&lt;P&gt;Of course there are more data centers in our infrastructure but with no such autonomy requirements. There I think i'm fine with placing PSNs?&lt;/P&gt;
&lt;P&gt;What can I do? What do I miss?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3331488#M550206</guid>
      <dc:creator>maettu</dc:creator>
      <dc:date>2020-02-21T18:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Need suggestion for ISE distributed deployment model in data centers with autonomy requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3331935#M550213</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;What is the estimated deployment size? More than 20K endpoints?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could have a 1 x PAN and 1 x MnT in one of these 3 DCs and a Secondary PAN/MnT in another DC (not one of the original 3 DCs). This way if one of those 3 DCs goes down you'd still have connectivity to a PAN/MnT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the event of a failure of both DCs where the PAN/MnT are located, the PSN can still authenticate existing AD connections. Features such as Guest registration, Profiling, CWA, BYOD onboarding, Pxgrid would NOT be unavailable. Checkout the table in the&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-0/admin_guide/b_ise_admin_guide_20/b_ise_admin_guide_20_chapter_010.html#ID193" target="_self"&gt;High Availability for the Administrative Node&lt;/A&gt; section for a list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as the PSN's are concerned have 1 x PSN per DC, ensure the other PSNs are listed as backups and you should have connectivity in the event of failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2018 18:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3331935#M550213</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-15T18:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Need suggestion for ISE distributed deployment model in data centers with autonomy requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3331944#M550215</link>
      <description>Does this help?&lt;BR /&gt;&lt;BR /&gt;Number of sites? 8&lt;BR /&gt;Number of users? ~1,000 staff, ~5,500 students&lt;BR /&gt;Number of endpoints? ~ 10,000&lt;BR /&gt;Virtual or Physical Hardware? ~Virtual (they have VMWare)&lt;BR /&gt;Do you require High Availability? Yes&lt;BR /&gt;Will there be integration with any MDM? They have Jam Pro MDM&lt;BR /&gt;802.1X wired authentication? NO&lt;BR /&gt;MAC address mapping/authentication? NO&lt;BR /&gt;Wireless authentication? YES&lt;BR /&gt;Guest provisioning? YES&lt;BR /&gt;Device registration/and provisioning for BYOD? YES&lt;BR /&gt;Device profiling? NO&lt;BR /&gt;TACACS for managing network infrastructure equipment? YES&lt;BR /&gt;Context sharing pxGrid? NO&lt;BR /&gt;Posture assessment: NO&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 18:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3331944#M550215</guid>
      <dc:creator>jasond</dc:creator>
      <dc:date>2018-02-15T18:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Need suggestion for ISE distributed deployment model in data centers with autonomy requirement</title>
      <link>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3332012#M550221</link>
      <description>&lt;P&gt;My 2 cents,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-You cannot have more than 1 Primary PAN + MNT and 1 Secondary PAN + MNT for the whole deployment.&lt;/P&gt;
&lt;P&gt;-Running multiple personas on the same node reduces significantly the number of sessions x node. I mean, if you have for example a 3495 PSN running as well PAN and MNT then you will not get the 25K sessions for that node. I would post later the table showing what happens with the specific appliance/VM when running different personas. SO at the end, the best way to go is separate PSN from Admin Nodes.&lt;/P&gt;
&lt;P&gt;-PSN's can run no matter if PRIMARY PAN and SECONDARY PAN are both down but no live logs/troubleshooting options available. The only problem is that you would have to rebuild the whole&amp;nbsp;deployment if one of them is not recovered. If Primary / Secondary MNT are down but PAN's are up, the authentication would still work but no live logs/reports.&lt;/P&gt;
&lt;P&gt;-Do not use ISE 2.2, wait for 2.4 which is expected to be more stable. However,&amp;nbsp;2.3 does the work.&lt;/P&gt;
&lt;P&gt;-Only option, place Primary PAN/MNT on DC1 + PSN's, Secondary PAN/MNT + PSN's on DC2 and DC3 just for PSN's. If you have resources, RUN each persona on independent appliances or VM's. DO NOT combine multiple personas on 1 appliance as I mentioned before. I have seen that running multiple personas on 3495 does not work properly. Poor performance and multiple issues.&lt;/P&gt;
&lt;P&gt;-Deploy 3595 VM's or appliances. By far more powerful and not end of life product.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2018 19:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-suggestion-for-ise-distributed-deployment-model-in-data/m-p/3332012#M550221</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2018-02-15T19:49:39Z</dc:date>
    </item>
  </channel>
</rss>

