<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE Servers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206402#M551626</link>
    <description>&lt;P&gt;New Identity Services Engine Deployment&lt;/P&gt;
&lt;P&gt;Is it possible to mix and match servers?&lt;/P&gt;
&lt;P&gt;Example&lt;/P&gt;
&lt;P&gt;3495 admin node&lt;/P&gt;
&lt;P&gt;3595 policy node&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:37:16 GMT</pubDate>
    <dc:creator>Alex Pfeil</dc:creator>
    <dc:date>2020-02-21T18:37:16Z</dc:date>
    <item>
      <title>ISE Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206402#M551626</link>
      <description>&lt;P&gt;New Identity Services Engine Deployment&lt;/P&gt;
&lt;P&gt;Is it possible to mix and match servers?&lt;/P&gt;
&lt;P&gt;Example&lt;/P&gt;
&lt;P&gt;3495 admin node&lt;/P&gt;
&lt;P&gt;3595 policy node&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206402#M551626</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2020-02-21T18:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206422#M551627</link>
      <description>You can have different hardware in a deployment as long as they run the same software version. The sizing depends on the Admin node hardware type. The sizing for different distributed deployments is here:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/install_guide/b_ise_InstallationGuide22/b_ise_InstallationGuide22_chapter_00.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/install_guide/b_ise_InstallationGuide22/b_ise_InstallationGuide22_chapter_00.pdf&lt;/A&gt;</description>
      <pubDate>Fri, 27 Oct 2017 13:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206422#M551627</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-10-27T13:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206436#M551628</link>
      <description>So,&lt;BR /&gt;I could deploy:&lt;BR /&gt;2 admin - 3495&lt;BR /&gt;2 monitor - 3495&lt;BR /&gt;2 policy  - 3595&lt;BR /&gt;This meets the large deployment model and supports 40,000 clients?&lt;BR /&gt;</description>
      <pubDate>Fri, 27 Oct 2017 13:29:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206436#M551628</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2017-10-27T13:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206463#M551629</link>
      <description>Yes. A 3495 Admin node large deployment can scale at 20000 sessions per PSN. So with 2 PSN's, you can get 40000 concurrent sessions for the deployment.</description>
      <pubDate>Fri, 27 Oct 2017 13:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206463#M551629</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-10-27T13:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206505#M551630</link>
      <description>&lt;P&gt;Based on recent findings and issues in our LARGE distributed environment, you should do the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.-All the PAN and MNT Nodes MUST be the same type of device, in our case 3595's to handle the significant amount of data our Wireless network generates. We realized that 3495 as MNT's is NOT good enough for a large deployment (60k+ endusers/concurrent sessions).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.-Use 3495 preferably as PSN only.&lt;/P&gt;
&lt;P&gt;3.-DO NOT, combine 2 personas on the same node 3495/3595 because the performance goes significantly down. (it does not apply to your case).&lt;/P&gt;
&lt;P&gt;4.-USE Load balancing to efficiently distribute the load between the PSN's.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The most important piece is the version that you would like to run. I would strongly suggest to use 2.3 version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BTW, from your post above if you are using 3595 as PSN's then you have 40K sessions x node so that would cover you without needing another PSN. WHY the Load Balancing mechanism is important??.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.-Round Robin DNS does not work properly when using CWA or WebAuth on the WLC.&lt;/P&gt;
&lt;P&gt;2.-Failover mechanism is straightforward when using for example F5 (our case).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you use 3495 as PSN's, then you would need another PSN to be covered in case of failure&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 15:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206505#M551630</guid>
      <dc:creator>ajc</dc:creator>
      <dc:date>2017-10-27T15:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Servers</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206506#M551631</link>
      <description>&lt;P&gt;Rahul is correct but also note that using both PSNs requires some sort of RADIUS load balancing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco wireless delivered via WLC usually doesn't do this on its own and you would need some sort of Application Delivery controller / load balancer in front of your PSNs (i.e. F5 Big-IP, Citrix Netscaler or such).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco wired has some crude round robin load balancing but still a real ADC is recommended.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You also need to consider failure scenarios. If you require 2 PSNs for your deployment day to day it's recommended to add a 3rd for availability.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2017 14:56:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-servers/m-p/3206506#M551631</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-10-27T14:56:49Z</dc:date>
    </item>
  </channel>
</rss>

