<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to migrate ISE to new servers in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265746#M564528</link>
    <description>&lt;P&gt;Build out your new ISE deployment using the all new appliances. It should be configured using a backup of the existing deployment's configuration. So all policies, NAD definitions etc. will match. Use 90 day licensing to start.&lt;/P&gt;
&lt;P&gt;Put the new servers all in place - the only difference is that they will have new addresses temporarily. Then decommission each old server starting with the remote PSNs. As you do that, change the address of the new PSN to match. End users and network access devices should not see any change in behavior and users should not have to do anything differently for a basic 802.1X deployment.&lt;/P&gt;
&lt;P&gt;If you are currently using device registration or guest services, there would be some considerations to account for that depend on the particulars of your deployment.&lt;/P&gt;
&lt;P&gt;Your server certificates are also another consideration. As long as you are using CA-issued certificates and allowing the clients to trust them automatically (and haven't, for example, specified particular servers in the 802.1X supplicant configuration) it should be OK. Some more complex issues may arise depending on how you have issued the node certificates (wildcard or other approaches).&lt;/P&gt;
&lt;P&gt;Once you've decommissioned the old servers, migrate that deployment's licenses to the new one.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Jan 2021 03:51:05 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-01-01T03:51:05Z</dc:date>
    <item>
      <title>how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4263554#M564473</link>
      <description>&lt;P&gt;We have SNS-3415-K9 at each branch office and a pair of SNS-3495-K9 at our Headquarters. The branch office servers run policy service persona only, while the 2 HQ servers back up each other and run both the administration and monitoring in addition to the policy service personas. We are running the highest software version the existing hardware can support, 2.3.0.298 patch 7. We have placed an order for a number of SNS-3615-K9 to replace the existing hardware.&amp;nbsp; Each remote office will still get only 1 new server to replace the old one, but HQ will get 4 new servers to replace the current 2 servers.&amp;nbsp; How would you migrate the cluster from the old to the new servers?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Dec 2020 18:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4263554#M564473</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2020-12-24T18:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4263686#M564474</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Check this thread for advices and hints :&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/migrate-to-new-ise-server/td-p/3703083" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/migrate-to-new-ise-server/td-p/3703083&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Dec 2020 08:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4263686#M564474</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-12-25T08:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4264040#M564481</link>
      <description>&lt;P&gt;Adding to&lt;A id="link_17" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://community.cisco.com/t5/user/viewprofilepage/user-id/291804" target="_self"&gt;&lt;SPAN class=""&gt;&amp;nbsp;marce1000&lt;/SPAN&gt;&lt;/A&gt;'s...&lt;/P&gt;
&lt;P&gt;as SNS 36x5 appliances do not support ISE 2.3 and ISE 2.3 has reached the end of support on 2020-June-17, please review the upgrade journey of the target ISE release at &lt;A href="https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-installation-guides-list.html" target="_self"&gt;ISE Install and Upgrade Guides&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Dec 2020 07:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4264040#M564481</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2020-12-27T07:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4264792#M564499</link>
      <description>&lt;P&gt;Thanks for your replies.&amp;nbsp; Since I have new servers to replace every old servers, is there a way to stand up the new servers into a brand new ISE cluster and cutover from the old to new cluster in phases?&amp;nbsp; For example, can I point access switches on one floor / building at a time to the new cluster with multiple maintenance windows, Or is it recommended to cutover the entire enterprise (by reconfiguring all access switches everywhere to point to the new cluster) inside 1 big maintenance window?&amp;nbsp; Will end users devices be able to connect to network as usual, or is user intervention needed (perhaps to accept / trust a new certificate)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have 2 nodes at HQ&lt;BR /&gt;ISE-HQ-1&amp;nbsp; (primary admin / secondary monitoring / PSN)&lt;/P&gt;&lt;P&gt;ISE-HQ-2&amp;nbsp; (secondary admin / primary monitoring / PSN)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also have branch offices with just 1 PSN&lt;/P&gt;&lt;P&gt;ISE-branch-01 (PSN)&lt;/P&gt;&lt;P&gt;ISE-branch-02 (PSN)&lt;/P&gt;&lt;P&gt;ISE-branch-xx (PSN)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Dec 2020 17:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4264792#M564499</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2020-12-29T17:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265502#M564515</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/320195"&gt;@tachyon05&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;1. &lt;STRONG&gt;SNS-36XX&lt;/STRONG&gt; appliances MUST be running &lt;STRONG&gt;ISE 2.6+&lt;/STRONG&gt;.&lt;BR /&gt;2. test the new &lt;STRONG&gt;SNS-36XX&lt;/STRONG&gt; and &lt;STRONG&gt;ISE&lt;/STRONG&gt; version on a &lt;STRONG&gt;LAB SW&lt;/STRONG&gt; first&lt;BR /&gt;3. I suggest at least two maintenance window:&lt;BR /&gt; a. the first is a &lt;STRONG&gt;%&lt;/STRONG&gt; of your &lt;STRONG&gt;Enterprise&lt;/STRONG&gt; (&lt;STRONG&gt;5%&lt;/STRONG&gt;, &lt;STRONG&gt;10%&lt;/STRONG&gt; or other)&lt;BR /&gt; b. the second, third, etc is the &lt;STRONG&gt;rest&lt;/STRONG&gt; of you &lt;STRONG&gt;Enterprise&lt;/STRONG&gt;.&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 07:05:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265502#M564515</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2020-12-31T07:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265653#M564527</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp; That is what I like to do, however, I am trying to determine what happens to users' devices as they physically move between old and new ISE.&amp;nbsp; For example, he goes from a floor/building on the old ISE to a floor/building on the new ISE, and vice versa.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 16:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265653#M564527</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2021-01-04T16:01:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265746#M564528</link>
      <description>&lt;P&gt;Build out your new ISE deployment using the all new appliances. It should be configured using a backup of the existing deployment's configuration. So all policies, NAD definitions etc. will match. Use 90 day licensing to start.&lt;/P&gt;
&lt;P&gt;Put the new servers all in place - the only difference is that they will have new addresses temporarily. Then decommission each old server starting with the remote PSNs. As you do that, change the address of the new PSN to match. End users and network access devices should not see any change in behavior and users should not have to do anything differently for a basic 802.1X deployment.&lt;/P&gt;
&lt;P&gt;If you are currently using device registration or guest services, there would be some considerations to account for that depend on the particulars of your deployment.&lt;/P&gt;
&lt;P&gt;Your server certificates are also another consideration. As long as you are using CA-issued certificates and allowing the clients to trust them automatically (and haven't, for example, specified particular servers in the 802.1X supplicant configuration) it should be OK. Some more complex issues may arise depending on how you have issued the node certificates (wildcard or other approaches).&lt;/P&gt;
&lt;P&gt;Once you've decommissioned the old servers, migrate that deployment's licenses to the new one.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jan 2021 03:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4265746#M564528</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-01-01T03:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4266609#M564549</link>
      <description>&lt;P&gt;Thanks for the detailed reply.&amp;nbsp; We have CA issued certs on the old servers that will expire in a few month.&amp;nbsp; In the past, users always see some popups and have to accept the new certs whenever we renew ISE certs.&amp;nbsp; Would it make sense to use CA issued new certs on the new servers (with new and permanent IPs and hostnames), so users see those popups the first time their devices connect to a floor/building that has been cutover to new ISE?&amp;nbsp; And if they go back to a floor/building that is still on the old ISE, they won't see any popups and their devices would auto connect successfully since they have seen and accepted the certs on the old servers in the past?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 18:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4266609#M564549</guid>
      <dc:creator>tachyon05</dc:creator>
      <dc:date>2021-01-04T18:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4922148#M584010</link>
      <description>&lt;P&gt;Hi Marvin,&amp;nbsp; Old post but useful as I'm facing this scenario now.&amp;nbsp; Can you clarify some items for me please - you mention building all 5 new servers for the deployment (2 x PAN appliances and 3 x PSN VMs) and restoring each node from backup with a temporary IP, then decommissioning the current and changing IP on the new node. My questions:&lt;/P&gt;
&lt;P&gt;1 - Does decommission = shutdown the current node and then re-IP the new node to the current ones IP.&amp;nbsp; I take it rollback would be just power the shutdown node back up?&lt;/P&gt;
&lt;P&gt;2 - Viewing this method as being similar to a hardware failure recovery would the restore from backup operation do everything required (minus IP restore) to not require the node to be registered again to the PAN/AD?&lt;/P&gt;
&lt;P&gt;3 - If PSNs are done one at a time and then the PANs one at a time too I believe always having one active PAN holding all the config means it should all just work or am I thinking too simply?&lt;/P&gt;
&lt;P&gt;Thanks in advance for your response!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 15:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4922148#M584010</guid>
      <dc:creator>n.elms</dc:creator>
      <dc:date>2023-09-12T15:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4922741#M584025</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/75060"&gt;@n.elms&lt;/a&gt; yes/correct for all three questions.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 13:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4922741#M584025</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-09-13T13:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4922778#M584026</link>
      <description>&lt;P&gt;Star man!&amp;nbsp; Thanks for the quick response.&amp;nbsp; Much appreciated &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;!&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2023 14:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4922778#M584026</guid>
      <dc:creator>n.elms</dc:creator>
      <dc:date>2023-09-13T14:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4932557#M584347</link>
      <description>&lt;P&gt;Hi Marvin, The ISE PAN is the only 'proper' backup created in the deployment as it holds all the config for the deployment and for the PSNs we have the ADE-OS CLI config backed up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So am I right in thinking that a fresh ISE install with 90 day eval license followed by the ADE-OS CLI config restored and certs from the node to be replaced installed via Web-UI will be enough for this node to come back into the deployment as the old node it is replacing (which will be shutdown)?&lt;/P&gt;
&lt;P&gt;As in does the PAN poll/connect to the node and apply the config/policy as the PAN drives everything?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2023 10:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4932557#M584347</guid>
      <dc:creator>n.elms</dc:creator>
      <dc:date>2023-10-02T10:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4932668#M584350</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/75060"&gt;@n.elms&lt;/a&gt; yes the Primary Policy Administration Node (PPAN or PAN is it's commonly called) "drives" everything. When you restopre a backup and certificates from the old deployment onto it it will have everything needed to assume the role as PPAN is a new deployment. To migrate any old nodes to that deployment, you would need to deregister them from the old and then join to the new (or just build net new VMs).&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2023 14:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4932668#M584350</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-10-02T14:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4932680#M584352</link>
      <description>&lt;P&gt;Thanks Marvin, So at present our plan is to do the PSNs first which is what my query relates to as there is no PSN backup.&amp;nbsp; I have installed a new VM to same level as current hardware to be replaced.&amp;nbsp; So now I need to down the hardware and get the VM in as its replacement on the same IP/name - what is the best patch for this?&amp;nbsp; As mentioned before it's replicating a hardware failure scenario and recovering to a VM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2023 14:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4932680#M584352</guid>
      <dc:creator>n.elms</dc:creator>
      <dc:date>2023-10-02T14:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4935749#M584455</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/75060"&gt;@n.elms&lt;/a&gt;&amp;nbsp;Since ISE 3.2 is our current recommended release, please use ISE 3.2 Patch 3 if all possible.&lt;/P&gt;
&lt;P&gt;For ISE policies and elements, a secondary ISE node gets a copy of them from the primary ISE after it is registered to the ISE deployment, restarted, and synchronized. So, no PSN backup. However, for PSNs, please do the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Take a note of the services enabled on each PSN&lt;/LI&gt;
&lt;LI&gt;Take a note of the profiling probes enabled on each PSN&lt;/LI&gt;
&lt;LI&gt;Take a note of the node group membership of each PSN&lt;/LI&gt;
&lt;LI&gt;Export the server certificates with the corresponding private keys of each secondary ISE node.&lt;/LI&gt;
&lt;LI&gt;Engage AD team to join the new ISE nodes to Active Directory if needed.&lt;/LI&gt;
&lt;LI&gt;Take a note of any other configurations specific to each ISE node, such as IP addresses, DNS, NTP, and static IP hosts entries.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 06 Oct 2023 21:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4935749#M584455</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-10-06T21:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4936450#M584485</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt;,&amp;nbsp;the migration of the install is to facilitate a migration to 3.2 patch 3.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the PSN migration, Marvin mentioned we can shutdown and bring back a PSN quite simply (like in a failure scenario) - how would you tackle replacing a PSN so we don't have to reconfigure all switches/wireless etc.&amp;nbsp; My thought was treat it as a failure - so whats the best way to recover a PSN?&lt;/P&gt;
&lt;P&gt;The latest our hardware supports is 3.1 so we will migrate PSNs to VMs from SNS-3515 appliances then the whole deployment will be upgraded to 3.1 patch 7.&amp;nbsp; The PPAN and SPAN will me migrated from SNS-3595 to SNS-3755 and then final upgrade to 3.2 patch 3.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4936450#M584485</guid>
      <dc:creator>n.elms</dc:creator>
      <dc:date>2023-10-09T08:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4944089#M584714</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;Is there an option to edit in the Backup file?&lt;/P&gt;
&lt;P&gt;Best Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 08:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4944089#M584714</guid>
      <dc:creator>gizasystems</dc:creator>
      <dc:date>2023-10-19T08:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: how to migrate ISE to new servers</title>
      <link>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4944248#M584716</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/7214"&gt;@gizasystems&lt;/a&gt; you cannot edit the backup file in any meaningful way that would result in a usable backup.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 12:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-to-migrate-ise-to-new-servers/m-p/4944248#M584716</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-10-19T12:47:09Z</dc:date>
    </item>
  </channel>
</rss>

