<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MnT Node not receiving logs from PSN in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/mnt-node-not-receiving-logs-from-psn/m-p/4536397#M572363</link>
    <description>&lt;P&gt;Yes, each ISE node needs to trust the others so the other nodes' self-signed certificate(s) and must be in the other node's Trusted Certificates store.&amp;nbsp; This is one of the many reasons why you should never use self-signed certificates in a production deployment. When you joined the Secondary node to the primary, you had to accept the following ⚠ Warning:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;The node you are trying to register uses a self-signed certificate which is not trusted. &lt;BR /&gt;Are you sure you want to trust this certificate and proceed with registration?&lt;BR /&gt;If you are unsure, please click 'Cancel Registration'. Manually import relevant certificate chain of Node that is being registered into 'Trusted Certificates' and ensure 'Trust within ISE' checkbox is selected.&lt;BR /&gt;Please note that this certificate will by default be trusted only for authentication within ISE. &lt;STRONG&gt;If the same certificate needs to be used for other purposes (e.g. client authentication and syslog), please enable those options by editing the certificate under the 'Trusted Certificates' page.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, I don't know what your datacenter colocation or distribution setup is but in the ISE Admin Guide, &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_deployment.html#id_100229" target="_blank"&gt;Syslog over Cisco ISE Messaging Service&lt;/A&gt; provides guidance for which ports are used to communicate :&lt;/P&gt;
&lt;H3 id="ariaid-title46" class="title topictitle3 lia-indent-padding-left-30px"&gt;Syslog over Cisco ISE Messaging Service&lt;/H3&gt;
&lt;SECTION class="body taskbody lia-indent-padding-left-30px"&gt;
&lt;SECTION id="id_100229__d88525e5429" class="section context"&gt;Cisco ISE, Release 2.6, offers MnT WAN survivability for the default, built-in UDP syslog collection targets, LogCollector and LogCollector2. This survivability can be enabled by the option &lt;SPAN class="ph uicontrol"&gt;Use "ISE Messaging Service" for UDP Syslogs delivery to MnT&lt;/SPAN&gt; (&lt;SPAN class="ph"&gt;In the Cisco ISE GUI, click the &lt;SPAN class="ph uicontrol"&gt;Menu&lt;/SPAN&gt; icon (𑁔&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;) and choose&lt;/SPAN&gt; &lt;SPAN class="ph menucascade"&gt;&lt;SPAN class="ph uicontrol"&gt;System&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Logging&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Log Settings&lt;/SPAN&gt;&lt;/SPAN&gt;). After you enable this option, the UDP syslogs are protected by Transport Layer Security (TLS).
&lt;P class="p"&gt;The &lt;SPAN class="ph uicontrol"&gt;Use "ISE Messaging Service" for UDP Syslogs delivery to MnT&lt;/SPAN&gt; option is disabled by default in Cisco ISE, Release 2.6, First Customer Ship (FCS). This option is enabled by default in Cisco ISE, Release 2.6, Cumulative Patch 2 and later releases.&lt;/P&gt;
&lt;P class="p"&gt;Using the Cisco ISE messaging service for UDP syslogs retains the operational data for a finite duration even when the MnT node is unreachable. The MnT WAN survivability period is approximately 2 hours and 30 mins.&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG&gt;This service uses TCP port 8671. Configure your network accordingly and allow the connections to TCP port 8671 on each Cisco ISE node from all other Cisco ISE nodes in the deployment.&lt;/STRONG&gt; The following features also use Cisco ISE messaging service: Light Session Directory (see the section "Light Session Directory" in Chapter "Set Up Cisco ISE in a Distributed Environment" in the &lt;EM class="ph i"&gt;Cisco Identity Service Engine Administrator Guide&lt;/EM&gt; &lt;SPAN class="ph"&gt;, and Profiler Persistence Queue. &lt;/SPAN&gt;.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;P&gt;You may also refer to the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/install_guide/b_ise_InstallationGuide31/b_ise_InstallationGuide31_chapter_7.html" target="_blank"&gt;Cisco ISE Ports Reference&lt;/A&gt; for other required ports.&lt;/P&gt;</description>
    <pubDate>Sat, 22 Jan 2022 20:07:16 GMT</pubDate>
    <dc:creator>thomas</dc:creator>
    <dc:date>2022-01-22T20:07:16Z</dc:date>
    <item>
      <title>MnT Node not receiving logs from PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/mnt-node-not-receiving-logs-from-psn/m-p/4532767#M572262</link>
      <description>&lt;P&gt;Hi CSC,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a 2 Node deployment -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Node A - Admin (Pri) MnT (Sec), PSN&lt;/P&gt;&lt;P&gt;Node B - Admin (Sec) MnT (Pri), PSN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using Node A for TACACs - all logs visible within ISE&lt;/P&gt;&lt;P&gt;When using Node B for TACACs - Authentication etc.. is all good but logs are not being sent to the primary MnT node.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using self signed certificates for messaging service. Does each node require the others Messaging Service Certificate to be exported and installed to each other?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm assuming it is indeed the messaging service responsible for this logging element that isn't working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also have the following checked -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Use "ISE Messaging Service" for UDP Syslogs delivery to MnT"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 16:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mnt-node-not-receiving-logs-from-psn/m-p/4532767#M572262</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2022-01-17T16:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: MnT Node not receiving logs from PSN</title>
      <link>https://community.cisco.com/t5/network-access-control/mnt-node-not-receiving-logs-from-psn/m-p/4536397#M572363</link>
      <description>&lt;P&gt;Yes, each ISE node needs to trust the others so the other nodes' self-signed certificate(s) and must be in the other node's Trusted Certificates store.&amp;nbsp; This is one of the many reasons why you should never use self-signed certificates in a production deployment. When you joined the Secondary node to the primary, you had to accept the following ⚠ Warning:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;The node you are trying to register uses a self-signed certificate which is not trusted. &lt;BR /&gt;Are you sure you want to trust this certificate and proceed with registration?&lt;BR /&gt;If you are unsure, please click 'Cancel Registration'. Manually import relevant certificate chain of Node that is being registered into 'Trusted Certificates' and ensure 'Trust within ISE' checkbox is selected.&lt;BR /&gt;Please note that this certificate will by default be trusted only for authentication within ISE. &lt;STRONG&gt;If the same certificate needs to be used for other purposes (e.g. client authentication and syslog), please enable those options by editing the certificate under the 'Trusted Certificates' page.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, I don't know what your datacenter colocation or distribution setup is but in the ISE Admin Guide, &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/admin_guide/b_ise_admin_3_1/b_ISE_admin_31_deployment.html#id_100229" target="_blank"&gt;Syslog over Cisco ISE Messaging Service&lt;/A&gt; provides guidance for which ports are used to communicate :&lt;/P&gt;
&lt;H3 id="ariaid-title46" class="title topictitle3 lia-indent-padding-left-30px"&gt;Syslog over Cisco ISE Messaging Service&lt;/H3&gt;
&lt;SECTION class="body taskbody lia-indent-padding-left-30px"&gt;
&lt;SECTION id="id_100229__d88525e5429" class="section context"&gt;Cisco ISE, Release 2.6, offers MnT WAN survivability for the default, built-in UDP syslog collection targets, LogCollector and LogCollector2. This survivability can be enabled by the option &lt;SPAN class="ph uicontrol"&gt;Use "ISE Messaging Service" for UDP Syslogs delivery to MnT&lt;/SPAN&gt; (&lt;SPAN class="ph"&gt;In the Cisco ISE GUI, click the &lt;SPAN class="ph uicontrol"&gt;Menu&lt;/SPAN&gt; icon (𑁔&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;) and choose&lt;/SPAN&gt; &lt;SPAN class="ph menucascade"&gt;&lt;SPAN class="ph uicontrol"&gt;System&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Logging&lt;/SPAN&gt; &amp;gt; &lt;SPAN class="ph uicontrol"&gt;Log Settings&lt;/SPAN&gt;&lt;/SPAN&gt;). After you enable this option, the UDP syslogs are protected by Transport Layer Security (TLS).
&lt;P class="p"&gt;The &lt;SPAN class="ph uicontrol"&gt;Use "ISE Messaging Service" for UDP Syslogs delivery to MnT&lt;/SPAN&gt; option is disabled by default in Cisco ISE, Release 2.6, First Customer Ship (FCS). This option is enabled by default in Cisco ISE, Release 2.6, Cumulative Patch 2 and later releases.&lt;/P&gt;
&lt;P class="p"&gt;Using the Cisco ISE messaging service for UDP syslogs retains the operational data for a finite duration even when the MnT node is unreachable. The MnT WAN survivability period is approximately 2 hours and 30 mins.&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG&gt;This service uses TCP port 8671. Configure your network accordingly and allow the connections to TCP port 8671 on each Cisco ISE node from all other Cisco ISE nodes in the deployment.&lt;/STRONG&gt; The following features also use Cisco ISE messaging service: Light Session Directory (see the section "Light Session Directory" in Chapter "Set Up Cisco ISE in a Distributed Environment" in the &lt;EM class="ph i"&gt;Cisco Identity Service Engine Administrator Guide&lt;/EM&gt; &lt;SPAN class="ph"&gt;, and Profiler Persistence Queue. &lt;/SPAN&gt;.&lt;/P&gt;
&lt;/SECTION&gt;
&lt;/SECTION&gt;
&lt;P&gt;You may also refer to the &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/install_guide/b_ise_InstallationGuide31/b_ise_InstallationGuide31_chapter_7.html" target="_blank"&gt;Cisco ISE Ports Reference&lt;/A&gt; for other required ports.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jan 2022 20:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/mnt-node-not-receiving-logs-from-psn/m-p/4536397#M572363</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-01-22T20:07:16Z</dc:date>
    </item>
  </channel>
</rss>

