<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Small Deployment High Availability in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084496#M560337</link>
    <description>&lt;P&gt;This small deployment HA makes no sense to me.&amp;nbsp;&lt;BR /&gt;With such a great Team at Cisco ... such a huge product Cisco ISE - not possible to do automatic failover with two nodes (in year 2020)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guys, I'm a network engineer. If ISE1 goes down... it will be faster for me to fix ISE1 versus go to ISE2 and promote it manually as primary node...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE eats so many resources, but has so many issues! This two node automatic HA not possible! vMotion on VMware - not possible, snapshots / backups on VMware - not possible! and list goes on... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 May 2020 23:08:52 GMT</pubDate>
    <dc:creator>EvaldasOu</dc:creator>
    <dc:date>2020-05-12T23:08:52Z</dc:date>
    <item>
      <title>Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514911#M536146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 13.3333px;"&gt;Hi All,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;I want to ask some question regarding Cisco ISE HA in Small Deployment Network (with two node of ISE):&lt;/P&gt;&lt;OL style="font-size: 13.3333px;"&gt;&lt;LI&gt;Is it true that in Small Deployment, Secondary node need to be promoted manually when Primary node down? Since I read a document that says auto-failover can only be enabled in Distributed Node&lt;/LI&gt;&lt;LI&gt;If failover is manual, what is the purpose of secondary admin persona since you will need to promote it manually and can not configure policy when it still in secondary position.&lt;/LI&gt;&lt;LI&gt;Will the failover change the IP address of Secondary to Primary node IP address? Must I input Primary and Secondary node IP address to all the NAD?&lt;/LI&gt;&lt;/OL&gt;&lt;P style="font-size: 13.3333px;"&gt;Thanks for your answers in advance.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Regards,&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2017 08:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514911#M536146</guid>
      <dc:creator>Kevin Raditheo</dc:creator>
      <dc:date>2017-02-10T08:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514912#M536150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Is it true that in Small Deployment, Secondary node need to be promoted manually when Primary node down? Since I read a document that says auto-failover can only be enabled in Distributed Node&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, this is true.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;If failover is manual, what is the purpose of secondary admin persona since you will need to promote it manually and can not configure policy when it still in secondary position.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The policies and settings (The entire PAN database) is synchronized with the Secondary Admin Node and is kept in synchronization.&amp;nbsp; Once the Secondary is promoted, all the settings and policies previously configured on the Primary Node will be there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Remember to add both the Primary and Secondary Admin Nodes to ALL Licenses installed, as these are synchronized as well.&amp;nbsp; If you do not have them both registered on the license you can "Re-Host" the license(s) by following this process:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/74202"&gt;Re-Host ISE Licenses&lt;/A&gt;*&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;TABLE border="1"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;
&lt;P&gt;Will the failover change the IP address of Secondary to Primary node IP address? Must I input Primary and Secondary node IP address to all the NAD?&lt;/P&gt;
&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Both nodes should be added to the NAD in this deployment (Standalone), as each node hosts a Policy Service Persona.&amp;nbsp; It is only the PSNs that are added to the nodes for RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Charles Moreton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2017 12:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514912#M536150</guid>
      <dc:creator>Charlie Moreton</dc:creator>
      <dc:date>2017-02-10T12:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514913#M536154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Charles for your answers.&lt;/P&gt;&lt;P&gt;It helps very well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Feb 2017 07:53:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514913#M536154</guid>
      <dc:creator>Kevin Raditheo</dc:creator>
      <dc:date>2017-02-17T07:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514914#M536156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Charles,&lt;/P&gt;&lt;P&gt;I have follow up questions.&lt;/P&gt;&lt;P&gt;Currently I have ISE deployment with 2 node:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ISE 1 : Primary Admin, Secondary Monitoring, PSN&lt;/LI&gt;&lt;LI&gt;ISE 2 : Secondary Admin, Primary Monitoring, PSN&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When ISE 1 still up, I can use ISE 2 as radius server for some of my NAD, it's split deployment, isn't it?&lt;/P&gt;&lt;P&gt;When ISE 1 is down, my NAD that use ISE 2 as primary radius server can not authenticate, nor the NAD that use ISE 2 as secondary radius server.&lt;/P&gt;&lt;P&gt;I need to promote ISE 2 to become primary admin to be able to authenticate through ISE 2.&lt;/P&gt;&lt;P&gt;Is this a normal behavior? Do we need to manually promote secondary admin node to make use of redundancy of PSN?&lt;/P&gt;&lt;P&gt;Or do I miss something in my configuration?&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2017 16:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514914#M536156</guid>
      <dc:creator>Kevin Raditheo</dc:creator>
      <dc:date>2017-02-22T16:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514915#M536157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, something else must be happening.  Assuming it’s just a standard authentication to either the internal data store or an external data store (i.e. not trying to create a guest account) ISE 2 should authenticate clients while ISE 1 down.  I’d probably start by looking at the live log while in that state.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2017 19:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3514915#M536157</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2017-02-24T19:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3907427#M536159</link>
      <description>&lt;P&gt;hi .&lt;/P&gt;&lt;P&gt;I guess this setup is no more&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;small deployment , but distributed deployment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 11:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/3907427#M536159</guid>
      <dc:creator>takedo2008</dc:creator>
      <dc:date>2019-08-13T11:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084496#M560337</link>
      <description>&lt;P&gt;This small deployment HA makes no sense to me.&amp;nbsp;&lt;BR /&gt;With such a great Team at Cisco ... such a huge product Cisco ISE - not possible to do automatic failover with two nodes (in year 2020)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Guys, I'm a network engineer. If ISE1 goes down... it will be faster for me to fix ISE1 versus go to ISE2 and promote it manually as primary node...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISE eats so many resources, but has so many issues! This two node automatic HA not possible! vMotion on VMware - not possible, snapshots / backups on VMware - not possible! and list goes on... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 23:08:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084496#M560337</guid>
      <dc:creator>EvaldasOu</dc:creator>
      <dc:date>2020-05-12T23:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084509#M560339</link>
      <description>&lt;P&gt;ISE two node work just fine.&amp;nbsp; The PSN functionality work independently of the other functions.&amp;nbsp; If your primary admin node goes down in a two node deployment you lose access to administer and monitor the system until you promote the secondary to primary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't want automatic promotion in a two node setup because when the promotion happens services restart and all functionality is lost.&amp;nbsp; If you had a primary admin node go down in the middle of the day and Cisco allowed automatic failover you would have a 10-20 minute outage.&amp;nbsp; With manual promotion you get to control when the outage occurs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is link is from the 2.3 guide but scroll down to the table that shows what services are available when the Admin node is down:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_011.html#ID57" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/admin_guide/b_ise_admin_guide_23/b_ise_admin_guide_23_chapter_011.html#ID57&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 May 2020 23:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084509#M560339</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2020-05-12T23:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084960#M560378</link>
      <description>&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;, this is great answer!&lt;/P&gt;&lt;P&gt;I was actually so upset ... as I configured small ISE deployment easily (but 2nd PSN is not responding to RADIUS requests at all when 1st node is UP or DOWN). And in GUI/CLI everything seems to be fine, all services running on 2nd node... using latest ISE 2.6 with latest Patch 6.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 14:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4084960#M560378</guid>
      <dc:creator>EvaldasOu</dc:creator>
      <dc:date>2020-05-13T14:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4085081#M560387</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/192011"&gt;@paul&lt;/a&gt;&amp;nbsp;I have actually fixed my first issue... it was firewall ... Policies needed to be updated to allow communication with ISE2 server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I found another issue which I think cannot be re-solved in this HA mode.&amp;nbsp;&lt;BR /&gt;What if ISE1 generated certificate for the user? It has separate CA and as I see these certificates are not synchronized across in HA and ISE2 is not aware of this at all?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 15:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4085081#M560387</guid>
      <dc:creator>EvaldasOu</dc:creator>
      <dc:date>2020-05-13T15:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4085419#M560406</link>
      <description>&lt;P&gt;See the following link in the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/b_ise_admin_guide_26/b_ise_admin_guide_26_chapter_0111.html#concept_F9408C3DDBAA4EDCB48BE2FE9AC04731" target="_self"&gt;Admin Guide&lt;/A&gt; showing the ISE Internal CA hierarchy in a distributed deployment.&lt;/P&gt;
&lt;P&gt;Although the Primary and Secondary nodes have separate Node CA and Endpoint CA certificates, they should be signed by the Root CA of the Primary PAN.&lt;/P&gt;
&lt;P&gt;If you are not seeing the same (or if you have upgraded from an earlier version of ISE), you might need to regenerate the ISE CA Chain.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 23:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4085419#M560406</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-05-13T23:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Small Deployment High Availability</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4085927#M560427</link>
      <description>Hi, Kevin.&lt;BR /&gt;&lt;BR /&gt;I have the exact setup. On each NAD specify both ISE IPs as primary and secondary. When the primary ISE goes down, authentication should happen as normal via secondary ISE because both ISE nodes are PSN.&lt;BR /&gt;&lt;BR /&gt;You don't' have to promote the PSN because PSN is active/active. You will only need to manually promote the ISE02 PAN so you can have the Admin GUI access. If you need auto-failover you will need 3 nodes where the third node will check the health of the other two.&lt;BR /&gt;&lt;BR /&gt;The IP addresses won't change during the failover.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Suresh</description>
      <pubDate>Thu, 14 May 2020 15:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-small-deployment-high-availability/m-p/4085927#M560427</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2020-05-14T15:47:35Z</dc:date>
    </item>
  </channel>
</rss>

