<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE radius auth via secondary node in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730137#M578555</link>
    <description>&lt;P&gt;Could you please post output of the "show run aaa-server your_RADIUS_group", "show aaa-server your_RADIUS_group" and "show run tunnel-group relevant_tunnel-group"?&lt;/P&gt;
&lt;P&gt;If DR ISE is configured as primary server on ASA, and all is ok with ISE (e.g. PSN role enabled, network device added, etc.), then there is no obvious reason why DC ISE would be contacted instead of DR ISE.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
    <pubDate>Wed, 30 Nov 2022 07:03:29 GMT</pubDate>
    <dc:creator>Milos_Jovanovic</dc:creator>
    <dc:date>2022-11-30T07:03:29Z</dc:date>
    <item>
      <title>ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729108#M578521</link>
      <description>&lt;P&gt;We have a 2 node setup with primary ISE node in DC and secondary ISE nod ein DR. All personas(admin, policy, monitoring) are in one node.&lt;/P&gt;
&lt;P&gt;Anyconnect VPN users connect to ASA and then to ISE for authentication, so far everything working fine when users connect to DC ASA and ISE.&lt;/P&gt;
&lt;P&gt;We are confused, whether Anyconnect auth work if users connect to DR ASA and then to DR ISE. DC ISE is primary for all personas.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 13:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729108#M578521</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2022-11-28T13:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729351#M578529</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/161770"&gt;@manvik&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You need to enable all pesonas on second ISE node too (if not already, it's bit unclear from original post). Once enabled, DR ISE will also be able to process AAA traffic, so your scenarion where you are using DR ASA and DR ISE would work.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 20:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729351#M578529</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-28T20:03:38Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729359#M578532</link>
      <description>&lt;P&gt;all authentication is go to ISE in primary DC by default unless you have some kind of load balancing going on, since its DR site I highly doubt that.&lt;/P&gt;
&lt;P&gt;The radius server (auth server group) should be configured under tunnel-group on the ASA, for test under maintenance window you can change the ISE server order making DR ISE as primary and see if the authentication starts going through DR and it works.&lt;/P&gt;
&lt;P&gt;if the secondary ISE is in server-group and working fine, it should work, usually these things are tested before deployment, but you can always test it simply by changing DR ISE as primary radius on ASA.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Nov 2022 20:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729359#M578532</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2022-11-28T20:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729629#M578539</link>
      <description>&lt;P&gt;all personas are enabled on both nodes. DC ISE is primary role and DR ISE is secondary role.&lt;/P&gt;
&lt;P&gt;When a user connects to DR VPN, ISE log shows policy server as DC ISE.&lt;/P&gt;
&lt;P&gt;Is there a way for DR ISE to be policy server.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 11:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729629#M578539</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2022-11-29T11:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729685#M578540</link>
      <description>&lt;P&gt;An ASA will use the configured AAA servers (ISE nodes in your case with PSN role) in the order they are specified in the configuration (aaa-server-group). As long as the first server is responding to RADIUS requests, the ASA will always use it.&lt;/P&gt;
&lt;P&gt;To perform a test of the secondary ISE node you can do a manual test from the ASA (ASDM or cli) specifying that node or temporarily remove the primary node from your config (or block reachability to the primary node in some other way).&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 13:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729685#M578540</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-11-29T13:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729697#M578541</link>
      <description>&lt;P&gt;Alternatively to what &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; suggested, you can manually change order of aaa-server configuration on your DR ASA - to use DR ISE first, and DC ISE as a second. That way, your DR ASA will always talk to nearest ISE, and you should also be able to see it in the logs.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 13:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4729697#M578541</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-29T13:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730037#M578553</link>
      <description>&lt;P&gt;&lt;SPAN&gt;thank you all, ASA has DR ISE as primary AAA, still the DC ISE servers as policy node.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is there a way DR ISE serves as policy node for requesting coming to it.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 04:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730037#M578553</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2022-11-30T04:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730137#M578555</link>
      <description>&lt;P&gt;Could you please post output of the "show run aaa-server your_RADIUS_group", "show aaa-server your_RADIUS_group" and "show run tunnel-group relevant_tunnel-group"?&lt;/P&gt;
&lt;P&gt;If DR ISE is configured as primary server on ASA, and all is ok with ISE (e.g. PSN role enabled, network device added, etc.), then there is no obvious reason why DC ISE would be contacted instead of DR ISE.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 07:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730137#M578555</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-30T07:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730143#M578556</link>
      <description>&lt;P&gt;DR ISE has&amp;nbsp;&lt;SPAN&gt;PSN role enabled, network device added, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In ISE deployment, DC ISE is primary and DR ISE is secondary role.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 07:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730143#M578556</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2022-11-30T07:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730150#M578557</link>
      <description>&lt;P&gt;What is the server status on ASA with "show aaa-server" - active or failed?&lt;/P&gt;
&lt;P&gt;If active, and everything else seems to be ok, then I would advise to open a TAC case, as there isn't much that community can help with.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 07:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4730150#M578557</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-30T07:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE radius auth via secondary node</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4737748#M578808</link>
      <description>&lt;P&gt;The TAC had looked into this, issue was related to certificates. New self signed cert was generated and wass placed in both DC&amp;amp;DR ISE.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 10:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-radius-auth-via-secondary-node/m-p/4737748#M578808</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2022-12-13T10:27:29Z</dc:date>
    </item>
  </channel>
</rss>

