<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE primary and secondary PSN authentication order in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4584908#M573855</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1337246"&gt;@shaheryar.khan&lt;/a&gt; the switch will use the RADIUS Server (PSN) in the order they are configured, until marked as dead, then will use the next configured RADIUS server. You can use the &lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_rad/configuration/xe-16/sec-usr-rad-xe-16-book/sec-rad-load-bal.html" target="_self"&gt;RADIUS Server Load Balancin&lt;/A&gt;g feature which spreads the aaa load or preferrably a 3rd party Load Balancer, such as F5.&lt;/P&gt;</description>
    <pubDate>Mon, 04 Apr 2022 10:09:25 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-04-04T10:09:25Z</dc:date>
    <item>
      <title>ISE primary and secondary PSN authentication order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4584879#M573852</link>
      <description>&lt;P&gt;&lt;BR /&gt;Hello, everyone!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Can someone explain how the switch decides whether to use the primary or secondary PSN when sending Tacacs or Radius authentication requests? It depends on how the switch is configured or something else.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 09:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4584879#M573852</guid>
      <dc:creator>shaheryar.khan</dc:creator>
      <dc:date>2022-04-04T09:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE primary and secondary PSN authentication order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4584908#M573855</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1337246"&gt;@shaheryar.khan&lt;/a&gt; the switch will use the RADIUS Server (PSN) in the order they are configured, until marked as dead, then will use the next configured RADIUS server. You can use the &lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_rad/configuration/xe-16/sec-usr-rad-xe-16-book/sec-rad-load-bal.html" target="_self"&gt;RADIUS Server Load Balancin&lt;/A&gt;g feature which spreads the aaa load or preferrably a 3rd party Load Balancer, such as F5.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Apr 2022 10:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4584908#M573855</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-04-04T10:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE primary and secondary PSN authentication order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4585694#M573882</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1337246"&gt;@shaheryar.khan&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;is correct regarding the RADIUS process - there is a concept of dead timer and dead criteria etc.&lt;/P&gt;
&lt;P&gt;But what about TACACS+ ? It's my experience on all Catalyst platforms, IOS-XE 16.x and greater, that there is no dead timer or dead criterion to work with. This means that when Primary TACACS+ server fails, then the IOS-XE device goes to the next candidate, until it finds success. Once the TCP transaction is completed, and the next TACACS+ auth comes along, the IOS-XE doesn't remember that Primary Server didn't respond, and it tries it again, top down.&amp;nbsp; This is why we typically need a feature like deadtime to "hold down" the failing server until we think it's safe to use it again.&lt;/P&gt;
&lt;P&gt;The consequence of not having this dead "hold-down" timer is that the TACACS+ sessions becomes quite sluggish, as auth and authorization suffer a timeout penalty. The IOS-XE device will continue using on the Secondary TACACS+ server, but the CLI responses will feel sluggish.&lt;/P&gt;
&lt;P&gt;I have always wondered whether I am missing a trick, or whether this is by design in IOS-XE TACACS+ implementation.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2022 01:01:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/4585694#M573882</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-04-05T01:01:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE primary and secondary PSN authentication order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/5024344#M587658</link>
      <description>&lt;P&gt;Dears&lt;/P&gt;
&lt;P&gt;I have the same issue with TACACS+ auth, I have ISE1 and ISE2, on the switch I ordered ISE2 then ISE1, and ISE2 is primary, ISE1 is secondary.&lt;/P&gt;
&lt;P&gt;why does the switch automatically authenticate from the secondary?&lt;/P&gt;
&lt;P&gt;NOTE: I did not run radius, only i test TACACS.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 10:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/5024344#M587658</guid>
      <dc:creator>Ib_Reda</dc:creator>
      <dc:date>2024-02-26T10:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: ISE primary and secondary PSN authentication order</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/5024717#M587687</link>
      <description>&lt;P&gt;Share your IOS config here&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show run | section tacacs
show run | include aaa
show tacacs&lt;/LI-CODE&gt;
&lt;P&gt;As was mentioned before, deadtimer concept does not apply to TACACS AAA. It only applies to RADIUS AAA.&lt;/P&gt;
&lt;P&gt;TACACS will always &lt;STRONG&gt;try&lt;/STRONG&gt; the first server you define in your tacacs Group, even if that server is unavailable.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 22:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-primary-and-secondary-psn-authentication-order/m-p/5024717#M587687</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-26T22:01:01Z</dc:date>
    </item>
  </channel>
</rss>

