<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SXP on ISE distributed deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4616536#M574937</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm looking for advice on a distributed PSN deployment with SXP services enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When enabling the SXP service on two PSNs,&amp;nbsp; I understand that I have to duplicate the SXP connections on each network device pointing to each PSN IP address, correct? Both SXP connections will be in ON state and exchanging the same IP-SGT mappings, right?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case of failure of any of the PSN nodes, the IP-SGT mapping should remain intact and once the PSN node is recovered it will not affect either the mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anything I should take care of?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Tue, 24 May 2022 14:08:42 GMT</pubDate>
    <dc:creator>Antonio Macia</dc:creator>
    <dc:date>2022-05-24T14:08:42Z</dc:date>
    <item>
      <title>SXP on ISE distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4616536#M574937</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm looking for advice on a distributed PSN deployment with SXP services enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When enabling the SXP service on two PSNs,&amp;nbsp; I understand that I have to duplicate the SXP connections on each network device pointing to each PSN IP address, correct? Both SXP connections will be in ON state and exchanging the same IP-SGT mappings, right?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case of failure of any of the PSN nodes, the IP-SGT mapping should remain intact and once the PSN node is recovered it will not affect either the mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anything I should take care of?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2022 14:08:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4616536#M574937</guid>
      <dc:creator>Antonio Macia</dc:creator>
      <dc:date>2022-05-24T14:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: SXP on ISE distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4617365#M574949</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/292144"&gt;@Antonio Macia&lt;/a&gt; you correct, each NAD (switch) would peer with both PSN SXP nodes. The switch would have 2 IP-SGT bindings, one for each ISE SXP peer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the TrustSec matrix to determine the number of SXP bindings your model access layer switch can support.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/software-platform-capability-matrix.pdf" target="_blank"&gt;https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/software-platform-capability-matrix.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 09:01:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4617365#M574949</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-05-25T09:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: SXP on ISE distributed deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4617417#M574953</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for your assistance.&lt;/P&gt;
&lt;P&gt;Since this thread is somehow related to the situation I'm facing, kindly clarify if the following is correct.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a distributed deployment, in case of hardware refresh:&lt;/P&gt;
&lt;P&gt;Replacing the nodes with from 34xx (old) to 36xx (new) with same IP address and hostnames (FQDNs)&lt;/P&gt;
&lt;P&gt;1. Configure first the 36xx in an offline environment with the same IP addresses as the nodes to be replaced.&lt;/P&gt;
&lt;P&gt;2. Generate the CSRs of the 36xx and have them sign those certificates.&lt;/P&gt;
&lt;P&gt;3. Bind the signed certificate to the CSRs of the 36xx.&lt;/P&gt;
&lt;P&gt;4. De-register 34xx secondary node, then take it out of the network.&lt;/P&gt;
&lt;P&gt;5. Register the configured 36xx as the secondary node (PAN, MNT, PSN).&lt;/P&gt;
&lt;P&gt;6. Have your AD admin join the node to the Active Directory domain.&lt;/P&gt;
&lt;P&gt;7. Promote the 36xx secondary node as the new Primary Node.&lt;/P&gt;
&lt;P&gt;8. De-register the 34xx primary node, then take it out of the network.&lt;/P&gt;
&lt;P&gt;9. Register the other prepared 36xx as the secondary node (PSN).&lt;/P&gt;
&lt;P&gt;10. Have your AD admin join the node to the Active Directory domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding TACACS+ network device administration:&lt;/P&gt;
&lt;P&gt;a. There are 2 TACACS+ servers configured on IOS devices (router, switch etc...).&lt;/P&gt;
&lt;P&gt;b. Each TACACS+ server has different key hash on running-config on IOS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is all information is propagated from PRI -&amp;gt; SEC ISE node, including both TACACS+ keys for network device administration?&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2022 10:57:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/sxp-on-ise-distributed-deployment/m-p/4617417#M574953</guid>
      <dc:creator>b.haxhiaj</dc:creator>
      <dc:date>2022-05-25T10:57:54Z</dc:date>
    </item>
  </channel>
</rss>

