<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cisco ISE Azure Application in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4806078#M580886</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1051287"&gt;@iran &lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Both options create and initialize an ISE VM with one and only one network interface. We may add additional interfaces afterwards.&lt;/P&gt;
&lt;P&gt;The doc you cited above has the info there.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonAzureServices.html#concept_gd4_rzr_tsb" target="_self"&gt;Deploy Cisco Identity Services Engine Natively on Cloud Platforms / Chapter: Cisco ISE on Azure Cloud Services / Known Limitations of Cisco ISE in Microsoft Azure Cloud Services&lt;/A&gt;&amp;nbsp;says,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;...&lt;BR /&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;To add a secondary NIC to any VM in Microsoft Azure, you must first power off the VM.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
...&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Then, follow Azure doc on&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-network-interface-vm" target="_self"&gt;Microsoft Learn / Azure Networking / Virtual Network / Add network interfaces to or remove network interfaces from virtual machines&lt;/A&gt;&amp;nbsp;to add another interface.&lt;/P&gt;
&lt;P&gt;Finally, power on the ISE VM and use ISE admin CLI to configure the private IP address for the new interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 02 Apr 2023 19:13:03 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2023-04-02T19:13:03Z</dc:date>
    <item>
      <title>cisco ISE Azure Application</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4805912#M580883</link>
      <description>&lt;P&gt;I have seen here&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonAzureServices.html" target="_blank" rel="noopener"&gt;Deploy Cisco Identity Services Engine Natively on Cloud Platforms - Cisco ISE on Azure Cloud Services [Cisco Identity Services Engine] - Cisco&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;That Cisco ISE has two variants in Azure.&lt;BR /&gt;1.&amp;nbsp;&lt;SPAN&gt;Azure Application&lt;/SPAN&gt;&lt;BR /&gt;2.&amp;nbsp;&lt;SPAN&gt;Virtual Machine variant&lt;BR /&gt;&lt;BR /&gt;In the first option is it possible to add or assign an IP address to a second interface after the deployment?&lt;BR /&gt;&lt;BR /&gt;I did not find any documentation about it&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Apr 2023 23:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4805912#M580883</guid>
      <dc:creator>iran</dc:creator>
      <dc:date>2023-04-01T23:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ISE Azure Application</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4806078#M580886</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1051287"&gt;@iran &lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Both options create and initialize an ISE VM with one and only one network interface. We may add additional interfaces afterwards.&lt;/P&gt;
&lt;P&gt;The doc you cited above has the info there.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonAzureServices.html#concept_gd4_rzr_tsb" target="_self"&gt;Deploy Cisco Identity Services Engine Natively on Cloud Platforms / Chapter: Cisco ISE on Azure Cloud Services / Known Limitations of Cisco ISE in Microsoft Azure Cloud Services&lt;/A&gt;&amp;nbsp;says,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;...&lt;BR /&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;To add a secondary NIC to any VM in Microsoft Azure, you must first power off the VM.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
...&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Then, follow Azure doc on&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-network-interface-vm" target="_self"&gt;Microsoft Learn / Azure Networking / Virtual Network / Add network interfaces to or remove network interfaces from virtual machines&lt;/A&gt;&amp;nbsp;to add another interface.&lt;/P&gt;
&lt;P&gt;Finally, power on the ISE VM and use ISE admin CLI to configure the private IP address for the new interfaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Apr 2023 19:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4806078#M580886</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-04-02T19:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ISE Azure Application</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4806130#M580888</link>
      <description>&lt;P&gt;Thank you for your quick reply.&lt;BR /&gt;&lt;BR /&gt;One more question.&lt;BR /&gt;I am a little bit confused between the difference from&amp;nbsp;&lt;SPAN&gt;Azure Application and&amp;nbsp;Virtual Machine variant.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;In&amp;nbsp;&lt;SPAN&gt;Azure Application variant, it is a virtual machine like any other virtual machines in which we can access the console, edit/add interfaces... ?&lt;BR /&gt;&lt;/SPAN&gt;Still not very clear to me, the difference between the two variants and the advantages of each one.&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Apr 2023 22:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4806130#M580888</guid>
      <dc:creator>iran</dc:creator>
      <dc:date>2023-04-02T22:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ISE Azure Application</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4807033#M580914</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1051287"&gt;@iran &lt;/a&gt;, both methods deploy the same resulting ISE virtual instance in Azure with the same features and capabilities. The only difference is how the node is deployed.&lt;BR /&gt;With the Azure Application method, you are presented with a template and prompted to enter each value that will be used to configure the ISE application (hostname, DNS name, etc). Azure uses this to build an ARM template that is then used to build the node.&lt;BR /&gt;With the VM variant, you must provide those details in the User Data field. This option is typically easier to use if you are deploying ISE nodes using your own orchestration tools like Ansible/Terraform.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 00:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/4807033#M580914</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2023-04-04T00:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ISE Azure Application</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/5147134#M590723</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;, we plan to migrate ISEs to Azure cloud and upgrade to 02 dedicated PAN/MNT and 02 dedicated PSN nodes.&lt;/P&gt;
&lt;P&gt;Could you pls advise what are best network/security practice for implementation such&lt;/P&gt;
&lt;P&gt;put them on the same Azure Group Resource, Region, Virtual network, Subnet ... or on the different resources and how?&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;Tony&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 06:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/5147134#M590723</guid>
      <dc:creator>Tony-Nguyen</dc:creator>
      <dc:date>2024-07-19T06:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ISE Azure Application</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/5147837#M590769</link>
      <description>&lt;P&gt;Please open a new conversation for questions that are not specifically related to the same topic.&lt;/P&gt;
&lt;P&gt;Your question is also more of a general Azure architecture best practice and depends greatly on your Azure environment, so you should discuss this with your Azure architects. At a minimum, you would at least want high-availability across two AZs, if not two Regions.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2024 22:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-azure-application/m-p/5147837#M590769</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2024-07-21T22:07:52Z</dc:date>
    </item>
  </channel>
</rss>

