<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: When a Policy Service ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3813953#M55374</link>
    <description>When you reload a PSN, no COA is sent to the switch.  The node goes down silently from the NAD and endpoint perspective.  The completed authentication sessions remain as they did while the node was up. New sessions will be sent to the remaining PSN's based on the radius server configuration on the switch (or load balancer). &lt;BR /&gt;&lt;BR /&gt;The second piece, if you change the radius server order on your switch it will not reset the authentication sessions.  Any authenticated sessions remain untouched, new sessions and accounting updates will leverage the new primary server when the switch goes to send them. Alternatively, if you leave your radius server config untouched, take down the primary node for that switch, the NAD will have to detect that the PSN is down, either via automated tester or radius timeouts.</description>
    <pubDate>Tue, 05 Mar 2019 03:04:30 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2019-03-05T03:04:30Z</dc:date>
    <item>
      <title>Cisco ISE - Session failover</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/2716675#M55366</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;Even after creating Node group between PSN's, session failover is not happening. Any help is really appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 05:45:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/2716675#M55366</guid>
      <dc:creator>Prasan Venky</dc:creator>
      <dc:date>2019-03-11T05:45:46Z</dc:date>
    </item>
    <item>
      <title>Node groups do not enable</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/2716676#M55368</link>
      <description>&lt;P&gt;Node groups do not enable session failover, for other sessions than the ones that are in the progress of being authenticated when the node down is detected. Don't expect any kind of replication of sessions between psn's. A session that is already authenticated&amp;amp;authorized, will stay that way until someone pulls the cable, or the re-auth timer expires, in which case the switch will detect that the psn is down, and change to the next psn in your radius group.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2015 14:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/2716676#M55368</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2015-05-28T14:33:49Z</dc:date>
    </item>
    <item>
      <title>When a Policy Service ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/2716677#M55370</link>
      <description>&lt;P&gt;&lt;SPAN class="content"&gt;When a Policy Service ISE node that has a few active sessions goes down, the endpoints are stuck in an &lt;STRONG&gt;intermediate state&lt;/STRONG&gt;.one of its peers from the node group learns about the active sessions on the failed node and issues a CoA to disconnect those sessions. As a result, restarts and the sessions are handled by another Policy Service ISE node that is available . &lt;STRONG&gt;The session failover does not automatically move the sessions over from a Policy Service ISE node that has gone down to one that is available, but issues a CoA to achieve that. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2015 10:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/2716677#M55370</guid>
      <dc:creator>Venkatesh Attuluri</dc:creator>
      <dc:date>2015-06-03T10:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: When a Policy Service ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3813075#M55373</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324350"&gt;@Venkatesh Attuluri&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I am planning to have my deployment to be upgraded and i need to minimize the interruption. Technically, the other PSNs will take it over by using CoA but is it transparent from the user's perspective?&lt;/P&gt;
&lt;P&gt;Also, is it true that if I change manually the radius authentication order from my primary PSN to my other PSN in my NAD, the users will be disconnected?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 03 Mar 2019 06:19:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3813075#M55373</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-03-03T06:19:23Z</dc:date>
    </item>
    <item>
      <title>Re: When a Policy Service ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3813953#M55374</link>
      <description>When you reload a PSN, no COA is sent to the switch.  The node goes down silently from the NAD and endpoint perspective.  The completed authentication sessions remain as they did while the node was up. New sessions will be sent to the remaining PSN's based on the radius server configuration on the switch (or load balancer). &lt;BR /&gt;&lt;BR /&gt;The second piece, if you change the radius server order on your switch it will not reset the authentication sessions.  Any authenticated sessions remain untouched, new sessions and accounting updates will leverage the new primary server when the switch goes to send them. Alternatively, if you leave your radius server config untouched, take down the primary node for that switch, the NAD will have to detect that the PSN is down, either via automated tester or radius timeouts.</description>
      <pubDate>Tue, 05 Mar 2019 03:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3813953#M55374</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-03-05T03:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: When a Policy Service ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3814445#M55375</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320219"&gt;@Damien Miller&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the feedback.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry but regarding the second concern, is that tested that if I change the radius server order of my NAD the authenticated user sessions will not be dropped? I just want to confirm because I have mix answers roaming around here in the community and even TAC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank a lot.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 18:49:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-session-failover/m-p/3814445#M55375</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2019-03-05T18:49:47Z</dc:date>
    </item>
  </channel>
</rss>

