<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Identity Service Engine (ISE) in AWS cloud in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4758166#M579321</link>
    <description>&lt;P&gt;Both ISE 3.1 (patch1) and 3.2 are available for deployment on AWS for multiple regions. I have a customer that is deploying multiple 3.1 EC2 instances in both the US-East1 and AP-SE2 regions at the moment.&lt;/P&gt;
&lt;P&gt;See the documentation for how to Subscribe and install AWS instances here:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEaaS.html#task_psg_m1m_kqb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEaaS.html#task_psg_m1m_kqb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When building the CloudFormation template, you can specify which ISE version you want to deploy. If you prefer to use APIs or IaC tools instead of CF, you can use this same process to find the AMI ID for your preferred ISE version and region.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-01-20 at 8.51.03 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/173807iA0CBF6934B497212/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-01-20 at 8.51.03 am.png" alt="Screenshot 2023-01-20 at 8.51.03 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Jan 2023 21:56:44 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2023-01-19T21:56:44Z</dc:date>
    <item>
      <title>Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4750442#M579123</link>
      <description>&lt;P&gt;I am currently running Cisco ISE version 3.0 (running on SNS-3655) and version&amp;nbsp; 3.1 (running on SNS-3415).&amp;nbsp; There is a push to move this to AWS cloud in order to reduce the data center footprint.&amp;nbsp; Anyone running Cisco ISE in AWS cloud can share your experience here?&amp;nbsp; Both the Pros and Cons.&amp;nbsp; TIA&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2023 15:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4750442#M579123</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-06T15:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4750482#M579124</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/install_guide/b_ise_InstallationGuide31/m_ISEaaS.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/3-1/install_guide/b_ise_InstallationGuide31/m_ISEaaS.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Be sure to check out the Known Limitations section.&amp;nbsp; Also make sure your transport between the NADs and AWS in encrypted (RADIUS DTLS, IPSec, etc).&amp;nbsp; RADIUS IS NOT a secure protocol and should never be sent over the public internet.&amp;nbsp; Make sure your AWS security groups / firewalls do not expose ISE to the public internet.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2023 16:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4750482#M579124</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2023-01-06T16:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4750523#M579125</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;:&amp;nbsp; Thanks.&amp;nbsp; Look like version 3.2 is also now available on AWS market space.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Jan 2023 18:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4750523#M579125</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-06T18:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752051#M579149</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;:&amp;nbsp; I don't see ISE version 3.1 in AWS marketplace, only version 3.2.&amp;nbsp; Any ideas why?&amp;nbsp; Especially when version 3.1 is the preferred release.&amp;nbsp; Furthermore, the document you provided is for version 3.1 and yet, I can't find version 3.1 in AWS.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 11:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752051#M579149</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-10T11:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752144#M579150</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;please take a look at: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonCloudOverview.html" target="_blank" rel="noopener"&gt;Cisco ISE on Cloud&lt;/A&gt;&amp;nbsp;and also take a look at: &lt;A href="https://www.youtube.com/watch?v=oSOTZIXlYr4" target="_blank" rel="noopener"&gt;Installing ISE 3.1 on AWS&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Note:&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;ISE 3.2&lt;/STRONG&gt; is &lt;U&gt;natively&lt;/U&gt; available on the Cloud Platforms:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="ph"&gt;&lt;STRONG&gt;AWS&lt;/STRONG&gt;,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;Azure Cloud&lt;/STRONG&gt;&amp;nbsp;and &lt;STRONG&gt;OCI&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;Hope this helps !!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 13:41:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752144#M579150</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2023-01-10T13:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752192#M579151</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;:&amp;nbsp; I guess you didn't answer my question.&amp;nbsp; Where can I find Cisco 3.1 on AWS?&amp;nbsp; I am NOT seeing ISE 3.1 in AWS, only 3.2&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 14:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752192#M579151</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-10T14:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752221#M579154</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;you are unable to check the &lt;STRONG&gt;ISE 3.1 P1 &lt;/STRONG&gt;on &lt;STRONG&gt;AWS&lt;/STRONG&gt; ?&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="AWS Cisco ISE.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/172905i571FCCA77DAFF5C4/image-size/large?v=v2&amp;amp;px=999" role="button" title="AWS Cisco ISE.png" alt="AWS Cisco ISE.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 15:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752221#M579154</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2023-01-10T15:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752242#M579157</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;:&amp;nbsp; I only see version 3.2 in AWS marketplace.&amp;nbsp; See the attached screenshot&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 15:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4752242#M579157</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-10T15:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4756755#M579290</link>
      <description>&lt;P&gt;Can anyone from Cisco explain why ISE version 3.1 is not available in AWS marketplace?&amp;nbsp; I guess not too many people is using Cisco ISE in AWS, no?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 13:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4756755#M579290</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-18T13:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4758166#M579321</link>
      <description>&lt;P&gt;Both ISE 3.1 (patch1) and 3.2 are available for deployment on AWS for multiple regions. I have a customer that is deploying multiple 3.1 EC2 instances in both the US-East1 and AP-SE2 regions at the moment.&lt;/P&gt;
&lt;P&gt;See the documentation for how to Subscribe and install AWS instances here:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEaaS.html#task_psg_m1m_kqb" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEaaS.html#task_psg_m1m_kqb&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When building the CloudFormation template, you can specify which ISE version you want to deploy. If you prefer to use APIs or IaC tools instead of CF, you can use this same process to find the AMI ID for your preferred ISE version and region.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-01-20 at 8.51.03 am.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/173807iA0CBF6934B497212/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2023-01-20 at 8.51.03 am.png" alt="Screenshot 2023-01-20 at 8.51.03 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 21:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4758166#M579321</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-01-19T21:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4762255#M579406</link>
      <description>&lt;P&gt;I am finally able to launch ISE in AWS but only with version 3.2.&amp;nbsp; I launched both ISE version 3.1 patch1 and version 3.2 using the exact same method.&amp;nbsp; I am able to ssh into ISE version 3.2 but not version 3.1 Patch1.&amp;nbsp; I got this error whenever I attempted to ssh into ISE version 3.1 Patch 1:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssh -i ISE_key iseadmin@192.168.1.1&lt;BR /&gt;iseadmin@192.168.1.1: Permission denied (publickey).&lt;/P&gt;&lt;P&gt;No issue whatsoever with ISE 3.2 using the same identical key.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 17:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4762255#M579406</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-25T17:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4763593#M579439</link>
      <description>&lt;P&gt;ISE 3.1 and earlier use the default CLI/GUI administrator account of 'admin'. This was only changed to 'iseadmin' from ISE 3.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 21:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4763593#M579439</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-01-26T21:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4766272#M579517</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;:&amp;nbsp; Yes, I did use the "admin" in 3.1 patch-1 and it still fails.&amp;nbsp; see below:&lt;/P&gt;&lt;P&gt;ssh -i AWS_key_2023 admin@10.x.x.x&lt;BR /&gt;Permission denied (publickey).&lt;/P&gt;&lt;P&gt;I use the exact same method for ISE 3.2 and it works without issues with "iseadmin"&lt;/P&gt;&lt;P&gt;ssh -i AWS_key_2023 iseadmin@10.x.x.x&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2023 22:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4766272#M579517</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-01-31T22:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4767082#M579553</link>
      <description>&lt;P&gt;The only thing I can think of is that the keypair didn't attach correctly or something happened with the build. I have two AWS 3.1p1 instances in my lab and both work fine with my public key.&lt;/P&gt;
&lt;P&gt;ssh -i cisco-ise-lab.pem admin@172.32.32.24&lt;BR /&gt;Failed to log in 0 time(s)&lt;BR /&gt;ise31aws1/admin#&lt;/P&gt;
&lt;P&gt;ssh -i cisco-ise-lab.pem admin@172.32.32.132&lt;BR /&gt;Failed to log in 0 time(s)&lt;BR /&gt;ise31aws2/admin#&lt;/P&gt;
&lt;P&gt;You might need to try rebuilding the 3.1p1 instance. If you built it using the AMI with user_data, you might try building it using the CloudFormation template instead to mitigate any potential issues with the manual user_data file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 22:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4767082#M579553</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-02-01T22:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4768278#M579622</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;:&amp;nbsp; I've tried to rebuilt the 3.1p1 instance multiple times without much access with the exact same method I did with 3.2.&amp;nbsp; I am using the Cisco market place AMI.&amp;nbsp; I do have a TAC case opened with Cisco and it said there are issues with the 3.1p1 according to Cisco internal bug document.&amp;nbsp; I guess it is not yet stable in AWS, no?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 18:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4768278#M579622</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-03T18:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4768790#M579654</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;Likely you need wait longer.&lt;/P&gt;
&lt;P&gt;ISE 3.1 on AWS takes ~ 25 minutes after the instance first started before we may use SSH to login. ISE 3.2 reduces this to ~ 15 minutes.&lt;/P&gt;
&lt;P&gt;If that is not the case, please share the SR number so I may review the case notes.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2023 03:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4768790#M579654</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-02-05T03:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4769056#M579666</link>
      <description>&lt;P&gt;The 'issues with 3.1p1' could also be due to the many bugs that have been fixed in the 5 patches that have been released for 3.1 so far.&lt;/P&gt;
&lt;P&gt;I have a customer that I've worked with to deploy a global ISE cluster with 3.1 (patch 5) on AWS using Terraform. They have 10 nodes in the us-east-1 region and 4 nodes in the ap-se2 region. We did not experience SSH issues with any of those nodes.&lt;/P&gt;
&lt;P&gt;As &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/113005"&gt;@hslai&lt;/a&gt; mentioned, it takes time for the SSH login to be available. From the time the node build starts, I would give it a good 30 minutes before trying to access it via SSH or GUI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2023 21:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4769056#M579666</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-02-05T21:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4770765#M579702</link>
      <description>&lt;P&gt;I waited 75 minutes after the instance is launched and attempted to ssh into the ISE 3.1 p1 and still without success.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 23:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4770765#M579702</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-07T23:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4770797#M579704</link>
      <description>&lt;P&gt;Are you able to access the GUI after that time? If not, there is most likely something going wrong with the build and it is not completing.&lt;/P&gt;
&lt;P&gt;When building directly from the AMI, you should confirm that you are using only the key-value pairs and meet all the guidelines for the User Data content as defined here:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEaaS.html#launch-cisco-ise-ami" target="_blank" rel="noopener"&gt;Deploy Cisco Identity Services Engine Natively on Cloud Platforms&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have not tried building using the CloudFormation Template option, you might try that to see if it works better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 00:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4770797#M579704</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-02-08T00:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Identity Service Engine (ISE) in AWS cloud</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4770809#M579705</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;:&amp;nbsp; As mentioned before, I am using THE SAME METHOD to build ISE 3.2 as I did with ISE 3.1 patch-1.&amp;nbsp; ISE 3.2 has no issues but 3.1 p1 does not work.&amp;nbsp; I couldn't access the GUI.&amp;nbsp; Yes, I am using the same key pairs for both ISE 3.1p1 as I did with ISE 3.2.&amp;nbsp; I launched both of them in the same AWS VPC and the same subnet.&amp;nbsp; Only 3.2 works.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why should I need to use CloudFormation Template option when the other option is also supported by Cisco as clearly stated in the documentation?&amp;nbsp; I opened a TAC case with Cisco but the TAC doesn't seem to understand ISE in AWS.&amp;nbsp; He sent me back some documentation for me to try but it is the same documentation that I attached to the ticket when I first opened the ticket.&amp;nbsp; Doesn't seem like Cisco TAC engineer understand much about ISE in AWS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 01:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-identity-service-engine-ise-in-aws-cloud/m-p/4770809#M579705</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-02-08T01:24:23Z</dc:date>
    </item>
  </channel>
</rss>

