<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE PSN Node groups and F5 load balancing in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-psn-node-groups-and-f5-load-balancing/m-p/4771592#M579731</link>
    <description>&lt;P&gt;While you can build an architecture like your second image, I would not recommend doing it that way. You do not gain much in the way of HA by load balancing two F5 pools to the same four nodes vs two F5 pools to two nodes each. This just requires more configuration and complexity on the F5 side and creates further challenges when troubleshooting any issues that arise. It's also possible that the DC networking would be much more complicated to get it to work since the F5 is typically deployed inline when load balancing ISE/RADIUS where the F5 acts as a default gateway for the ISE nodes.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The first image is the recommended method for load balancing ISE. It is the simplest and most common method of deployment. It also provided you predicable authentication flow when troubleshooting since you know a request directed at the VIP in DC1 is being handled by ISE PSN nodes in the same DC1. You can perform maintenance without the NADs/endpoints being aware, and you can sustain a DC failure via primary/secondary RADIUS server config on the NADs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In either scenario you have to configure the F5 the same way, the endpoint authentication sessions have to persist to the same ISE node, responses have to be directed from that specific ISE node back to the NAD. This guide is getting a bit long in the teeth now but the information and design is all still accurate.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-cisco-amp-f5-deployment-guide-ise-load-balancing-using/ta-p/3631159" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-cisco-amp-f5-deployment-guide-ise-load-balancing-using/ta-p/3631159&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Feb 2023 19:34:09 GMT</pubDate>
    <dc:creator>Damien Miller</dc:creator>
    <dc:date>2023-02-08T19:34:09Z</dc:date>
    <item>
      <title>ISE PSN Node groups and F5 load balancing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-psn-node-groups-and-f5-load-balancing/m-p/4771192#M579717</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We have an ISE distributed deployment of 8 nodes, distributed as shown below,&lt;/P&gt;
&lt;TABLE border="1" width="59.90029056627843%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-1&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3695-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Primary Admin Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-1&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3695-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Primary Monitoring Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-1&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3655-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Policy Service Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-1&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3655-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Policy Service Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-2&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3695-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Secondary Admin Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-2&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3695-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Secondary Monitoring Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-2&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3655-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Policy Service Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="1.0741138560687418%" height="30px"&gt;&lt;FONT size="2"&gt;DC-2&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="8.700322234156818%" height="30px"&gt;&lt;FONT size="2"&gt;SNS-3655-K9&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD width="16.79069204357245%" height="30px"&gt;&lt;FONT size="2"&gt;Policy Service Node&lt;/FONT&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;OL&gt;
&lt;LI&gt;In DC-1 the Policy Service Nodes are put into DC-Node-Group-1&lt;/LI&gt;
&lt;LI&gt;In DC-2 the Policy Service Nodes are put into DC-Node-Group-2&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For high availability, we have currently put the Policy service nodes behind F5 LB, as shown below,&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="girish_gavandi_0-1675857534336.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176099iF4EF374513B70889/image-size/medium?v=v2&amp;amp;px=400" role="button" title="girish_gavandi_0-1675857534336.png" alt="girish_gavandi_0-1675857534336.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Customer is suggesting to keep the 4 x PSN behind LB in DC-1 and same 4 x PSN behind LB in DC-2&amp;nbsp; as per below design.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="girish_gavandi_1-1675857872116.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176100i80CD4B8B49502DAB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="girish_gavandi_1-1675857872116.png" alt="girish_gavandi_1-1675857872116.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Are there any challenges from ISE perspective, when there are PSN node groups configured?&lt;/LI&gt;
&lt;LI&gt;Will this setup be beneficial from service high availability and session replication perspective?&lt;/LI&gt;
&lt;LI&gt;Any other caveats that I am missing?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Any help in this regard is much appreciated.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Girish&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 12:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-psn-node-groups-and-f5-load-balancing/m-p/4771192#M579717</guid>
      <dc:creator>girish_gavandi</dc:creator>
      <dc:date>2023-02-08T12:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE PSN Node groups and F5 load balancing</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-psn-node-groups-and-f5-load-balancing/m-p/4771592#M579731</link>
      <description>&lt;P&gt;While you can build an architecture like your second image, I would not recommend doing it that way. You do not gain much in the way of HA by load balancing two F5 pools to the same four nodes vs two F5 pools to two nodes each. This just requires more configuration and complexity on the F5 side and creates further challenges when troubleshooting any issues that arise. It's also possible that the DC networking would be much more complicated to get it to work since the F5 is typically deployed inline when load balancing ISE/RADIUS where the F5 acts as a default gateway for the ISE nodes.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;The first image is the recommended method for load balancing ISE. It is the simplest and most common method of deployment. It also provided you predicable authentication flow when troubleshooting since you know a request directed at the VIP in DC1 is being handled by ISE PSN nodes in the same DC1. You can perform maintenance without the NADs/endpoints being aware, and you can sustain a DC failure via primary/secondary RADIUS server config on the NADs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In either scenario you have to configure the F5 the same way, the endpoint authentication sessions have to persist to the same ISE node, responses have to be directed from that specific ISE node back to the NAD. This guide is getting a bit long in the teeth now but the information and design is all still accurate.&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/how-to-cisco-amp-f5-deployment-guide-ise-load-balancing-using/ta-p/3631159" target="_blank"&gt;https://community.cisco.com/t5/security-knowledge-base/how-to-cisco-amp-f5-deployment-guide-ise-load-balancing-using/ta-p/3631159&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 19:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-psn-node-groups-and-f5-load-balancing/m-p/4771592#M579731</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2023-02-08T19:34:09Z</dc:date>
    </item>
  </channel>
</rss>

