<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stability of ISE version 3.2? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835921#M581763</link>
    <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;did you upgrade via &lt;STRONG&gt;CLI&lt;/STRONG&gt; ? If the answer is &lt;STRONG&gt;no&lt;/STRONG&gt;, could you please try via &lt;STRONG&gt;CLI&lt;/STRONG&gt; ?&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;Just an example:&lt;/P&gt;
&lt;PRE&gt;ise/admin# &lt;STRONG&gt;application upgrade prepare&lt;/STRONG&gt; &lt;EM&gt;ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542a.SPA.x86_64.tar.gz&lt;/EM&gt; &amp;lt;REPOSITORY&amp;gt;&lt;BR /&gt;Be sure that all your software is working stable, check your system on UI page (Administration &amp;gt; System &amp;gt; Health Checks) &lt;BR /&gt;Type yes once confirmed that health of the system is good to proceed: (yes/no) [yes] ? &lt;STRONG&gt;yes&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Getting bundle to local machine...&lt;BR /&gt;Unbundling Application Package...&lt;BR /&gt;Verifying Application Signature...&lt;BR /&gt;&lt;BR /&gt;Application upgrade preparation successful&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
    <pubDate>Tue, 16 May 2023 01:59:57 GMT</pubDate>
    <dc:creator>Marcelo Morais</dc:creator>
    <dc:date>2023-05-16T01:59:57Z</dc:date>
    <item>
      <title>Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4834261#M581710</link>
      <description>&lt;P&gt;I am testing out the upgrade on a single node ISE 3.0 patch-7 to ISE 3.2 patch-2.&amp;nbsp; When I run the preparation using ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.tar.gz, it fails at "Configuration at Data Upgrade".&amp;nbsp; To be clear, this node is up and running just fine with ISE 3.0 patch-7 with no issue when using the ISE 3.1 upgrade bundle&amp;nbsp;ise-upgradebundle-2.6.x-3.0.x-to-3.1.0.518b.SPA.x86_64.tar.gz.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also rebooted the ISE several times prior to running the preparation check with&amp;nbsp;ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.tar.gz but it fails every time.&amp;nbsp; This is what I am seeing in the log:&lt;/P&gt;&lt;P&gt;Fri May 12 10:03:13 UTC 2023 : Changing host config entry to standalone...&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 : ORACLE_SID : cpm11&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 : NODECNT :&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 : - Successful&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 : - Successful&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 :&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 : runDBClone method finished executing&lt;BR /&gt;Fri May 12 10:03:13 UTC 2023 : triggerUpgradeOnClonedInstance method started executing&lt;BR /&gt;Fri May 12 10:03:14 UTC 2023 : Modifying upgrade scripts to run on cloned database&lt;BR /&gt;Fri May 12 10:03:14 UTC 2023 : - Successful&lt;BR /&gt;Fri May 12 10:03:36 UTC 2023 :&lt;BR /&gt;Fri May 12 10:03:36 UTC 2023 : Running schema upgrade on cloned database&lt;BR /&gt;Fri May 12 10:06:59 UTC 2023 : - Successful&lt;BR /&gt;Fri May 12 10:06:59 UTC 2023 :&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Fri May 12 10:06:59 UTC 2023 : Running data upgrade on cloned database&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;&lt;U&gt;&lt;EM&gt;&lt;STRONG&gt;Fri May 12 10:07:52 UTC 2023 : - Failed&lt;/STRONG&gt;&lt;/EM&gt;&lt;/U&gt;&lt;BR /&gt;Fri May 12 10:07:52 UTC 2023 : ConfigDBUpgrade : Performing Clean-up&lt;BR /&gt;Fri May 12 10:08:11 UTC 2023 : ConfigDBUpgrade : Clean-up Completed&lt;/P&gt;&lt;P&gt;&amp;nbsp;really don't want to open a TAC case because it will take forever to get the case to a TAC engineer to help me with this issue, weeks and months rather days.&lt;/P&gt;&lt;P&gt;This makes me question the stability of ISE 3.2.&amp;nbsp; Thoughts?&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 10:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4834261#M581710</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-05-12T10:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4834367#M581714</link>
      <description>&lt;P&gt;Get the output of "show logging system ade/ADE.log tail" while doing the upgrade. Also, the logs you have shared seems to be of application upgrade proceed and not application upgrade prepare.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 13:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4834367#M581714</guid>
      <dc:creator>Nancy Saini</dc:creator>
      <dc:date>2023-05-12T13:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835813#M581758</link>
      <description>&lt;P&gt;Please let us know the outcome of this - I was looking at a 3.0 to 3.2 - but now I am inclined to rather rebuild the entire deployment from scratch - get rid of years of corruption and also a TAC case that has been open for over a year to sort out why the Profiler Feed doesn't update my Policies.&amp;nbsp; A rebuild gets rid of a lot of junk. And I also tested in the lab that you can export and import Profiling Policies - the nice thing is, that this also includes all the dependencies - will save some time.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 20:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835813#M581758</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-05-15T20:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835850#M581759</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;STRONG&gt;Cisco&lt;/STRONG&gt; released on &lt;STRONG&gt;May 9th&lt;/STRONG&gt; a new&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://software.cisco.com/download/home/283801620/type/283802505/release/3.2.0" target="_blank" rel="noopener"&gt;ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64&lt;/A&gt;, please double check if you are using this new &lt;STRONG&gt;Upgrade Bundle&lt;/STRONG&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.png" style="width: 824px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184669iCD6E6C22381333C1/image-dimensions/824x130?v=v2" width="824" height="130" role="button" title="ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.png" alt="ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is the result when you use &lt;STRONG&gt;URT&lt;/STRONG&gt; (&lt;EM&gt;ise-urtbundle-3.2.0.542a-1.0.0.SPA.x86_64.tar.gz&lt;/EM&gt;) ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Note: I tested the upgrade from&amp;nbsp;&lt;STRONG&gt;ISE 2.7 P8&lt;/STRONG&gt; to &lt;STRONG&gt;3.2 P1&lt;/STRONG&gt; without issues (using the &lt;STRONG&gt;upgrade bundle&lt;/STRONG&gt; and also using &lt;STRONG&gt;backup/restore&amp;nbsp;&lt;/STRONG&gt;method) ... I totally agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;about "&lt;EM&gt; ...&amp;nbsp;A rebuild gets rid of a lot of junk ...&lt;/EM&gt; " !!!&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope this helps !!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 23:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835850#M581759</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2023-05-15T23:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835890#M581760</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I am using this bundle&amp;nbsp;ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.tar.gz&lt;/P&gt;&lt;P&gt;md5sum ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.tar.gz&lt;BR /&gt;ac89dee5fa86377836a497c981d7480c ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542b.SPA.x86_64.tar.gz&lt;/P&gt;&lt;P&gt;I also have a TAC case open with Cisco on another issue after importing 3.0 configuration into 3.2 patch-2 system.&amp;nbsp; Things just stops working after that for some of the most basic functions.&amp;nbsp; I suspect that ISE 3.2 is not widely used yet so there are lot of bugs that are still in the system.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 01:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835890#M581760</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-05-16T01:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835921#M581763</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;did you upgrade via &lt;STRONG&gt;CLI&lt;/STRONG&gt; ? If the answer is &lt;STRONG&gt;no&lt;/STRONG&gt;, could you please try via &lt;STRONG&gt;CLI&lt;/STRONG&gt; ?&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;Just an example:&lt;/P&gt;
&lt;PRE&gt;ise/admin# &lt;STRONG&gt;application upgrade prepare&lt;/STRONG&gt; &lt;EM&gt;ise-upgradebundle-2.7.x-3.1.x-to-3.2.0.542a.SPA.x86_64.tar.gz&lt;/EM&gt; &amp;lt;REPOSITORY&amp;gt;&lt;BR /&gt;Be sure that all your software is working stable, check your system on UI page (Administration &amp;gt; System &amp;gt; Health Checks) &lt;BR /&gt;Type yes once confirmed that health of the system is good to proceed: (yes/no) [yes] ? &lt;STRONG&gt;yes&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Getting bundle to local machine...&lt;BR /&gt;Unbundling Application Package...&lt;BR /&gt;Verifying Application Signature...&lt;BR /&gt;&lt;BR /&gt;Application upgrade preparation successful&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 01:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4835921#M581763</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2023-05-16T01:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4836728#M581768</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;:&amp;nbsp; Ofcourse, I tried both the CLI and UI.&amp;nbsp; Both failed.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 10:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4836728#M581768</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-05-16T10:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4836776#M581772</link>
      <description>&lt;P class="lia-align-justify"&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1191533"&gt;@adamscottmaster2013&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp; good to know ... two last questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="lia-align-justify"&gt;your version was &lt;STRONG&gt;ISE 3.0 P7&lt;/STRONG&gt;, but &lt;STRONG&gt;P7&lt;/STRONG&gt;&amp;nbsp;was the only patch installed (&lt;STRONG&gt;show version&lt;/STRONG&gt; command) ?&lt;/LI&gt;
&lt;LI class="lia-align-justify"&gt;was there any &lt;STRONG&gt;Hot Patch&lt;/STRONG&gt; (&lt;STRONG&gt;show logging application hotpatch.log&lt;/STRONG&gt;&amp;nbsp;or &lt;STRONG&gt;show version history&lt;/STRONG&gt; command) ?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 12:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4836776#M581772</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2023-05-16T12:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4836791#M581773</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;:&amp;nbsp; I originally had the ISE 3.0 patch-3 and everything was working fine.&amp;nbsp; I patched the box with patch-5 a few months ago to fix some ssh issue.&amp;nbsp; Then I patched it with P7 a few days ago before upgrading it to 3.2.&amp;nbsp; No hot patch on the system.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 12:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4836791#M581773</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-05-16T12:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4847633#M582059</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;:&amp;nbsp; Unfortunately I have no good news to report.&amp;nbsp; TAC support is still looking into the issue.&amp;nbsp; Today marks the 21 days since I opened the first ticket and still has no solution from Cisco TAC.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just want to give you an update to this.&amp;nbsp; ISE version 3.2, even with the latest patch-2,&lt;BR /&gt;is full of bugs and not definitely for prime time.&amp;nbsp; I have multiple TAC cases open with Cisco&lt;BR /&gt;and they are to reproduce the issue and they are currently working through them.&amp;nbsp; I really don't&lt;BR /&gt;want to use ISE 3.1 witch patches because the life cycle of ISE 3.1 will be a lot shorter than&lt;BR /&gt;version 3.2.&amp;nbsp; I would rather use version 3.2 now so that I don't have to deal with another upgrade&lt;BR /&gt;for another three years.&amp;nbsp; I don't think there are many ISE 3.2 deployment so there are not that&lt;BR /&gt;many feedbacks to Cisco, and because of that, Cisco can't fix what it doesn't know.&lt;/P&gt;&lt;P&gt;Here are some of the issues I ran into with version 3.2:&lt;/P&gt;&lt;P&gt;- can no longer ssh into the ISE.&amp;nbsp; Had to toggle/untoggle the ACL for UI and CLI,&lt;/P&gt;&lt;P&gt;- ISE application crashes whenever I need to edit the network devices such as changing the network&lt;BR /&gt;device name or pre-share key. As soon as I hit the save button, the application server crashes,&lt;/P&gt;&lt;P&gt;- Integration with Active Directory does not work,&lt;/P&gt;&lt;P&gt;- Integration with External radius server does not work. It works if I clone the existing external radius&lt;BR /&gt;but as soon the application crashes, it stops working,&lt;/P&gt;&lt;P&gt;- Radius service is not responding. This is a big red flag,&lt;/P&gt;&lt;P&gt;I am sure there are many other things that are not working but I have not been able to test&lt;BR /&gt;due to all of the above issues I am having with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 13:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4847633#M582059</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-06-02T13:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4847929#M582067</link>
      <description>&lt;P&gt;Oh dear that is not good feedback. Did the URT eventually run clean?&lt;/P&gt;
&lt;P&gt;See, this is why I plan to build 3.2 from scratch. No upgrade. I still don’t trust them.&amp;nbsp;&lt;BR /&gt;I have had 3.2 running in lab which was built from scratch and no issues.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2023 21:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4847929#M582067</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-06-02T21:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4917662#M583905</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Actually 3.1and 3.2 life cycle should have the same duration , I am pretty sure that there no longer&amp;nbsp; difference between odd and even subversions life cycle.&lt;BR /&gt;Now it seems that 3.2 version is the recommended one (the "star" is apperead near the name) but personally I am struggling with a 2.4 -&amp;gt; 3.1 migration since November 2022. I chose to built a parallel deployment: being our PSNs served by a load balancer the actual migration would have been just a matter of NLB configuration&lt;BR /&gt;When I started 3.1 was the reccomanded version but during tests I met lots of bugs resulting in at least 5 cases opened with TAC. I think the Cisco should "reset" the beginning of 3.1 lyfe&amp;nbsp; cycle to April 2023 because at least one bug was destructive and IMHO that version was not ready for production in complex environment before patch 6. Anyway I have still an opened case that gets back to January 2023 so I am afraid I am going to upgrade my parallel deployment to 3.2. I am quite upset because I met very similar bugs in version 2.x and my project is almost one year late ....&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;&lt;P&gt;p.s urt run successfully on my ISE 3.1 deployment&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 07:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4917662#M583905</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2023-09-05T07:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4924783#M584095</link>
      <description>&lt;P&gt;I have been using 3.2 for the past 2 months, unfortunately i dont have good news about. I even patched to the latest patch 3, but it did not improve anything. A week cant pass without the application service for the primary admin node restarting. and when it restarts during production, it takes for over an hour initializing, and you cant ssh to it when its initializing. i have opened a tac case with ISE engineers, i keep on sending logs but with no solution. the main problem is application services, and when you reboot the node, it takes up to an hour to restart. i hope they could resolve it, because going back to 3.1 is not an option&lt;/P&gt;</description>
      <pubDate>Sun, 17 Sep 2023 22:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4924783#M584095</guid>
      <dc:creator>Tiroyaone72926925</dc:creator>
      <dc:date>2023-09-17T22:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4925930#M584133</link>
      <description>&lt;P&gt;I also have been having a lot of issues with 3.2&amp;nbsp; I was on 3.0, and 3.1 previously without issues. I've even rebuilt my nodes, which I did previously for 3.0.&amp;nbsp; I am disappointed that it shows up as a recommended version.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 17:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4925930#M584133</guid>
      <dc:creator>patherton</dc:creator>
      <dc:date>2023-09-19T17:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4926022#M584134</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/20602"&gt;@patherton&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/246529"&gt;@Tiroyaone72926925&lt;/a&gt;:&amp;nbsp; Can you provide specifically issues you're facing with?&amp;nbsp; I am about to deploy ISE 3.2 patch-3 in my production in replacing the legacy ISE 3.0 and you guys are making me nervous.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 17:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4926022#M584134</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-09-19T17:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4926253#M584136</link>
      <description>&lt;P&gt;Everyone will have their own horror stories but that doesn't mean there is a fundamental problem with that version of ISE. I have good news so far (touch wood).&lt;/P&gt;
&lt;P&gt;I built a customer two node guest wifi solution recently, and granted, it's just RADIUS and Portals, but it's working beautifully. The only issue I had so far has been with SNMPv3, which is a real developer hack-job. It seems to be a bit better in ISE 3.3.&lt;/P&gt;
&lt;P&gt;I see a real use-case for the new API in ISE 3.3 now. In an ideal world, I would like to have the entire ISE VM build process, cert creation and deploy, and config in something like Ansible. The Cisco TMEs (Charlie and Thomas) have great YouTube videos on that - it's an eye-opener!&amp;nbsp; The dream seems to be possible now. I think the initial creation of such a playbook would be hard work, but in the end, we could blow away any version of ISE, and rebuild from ground zero. Never again having to restore from a config backup (which I believe is partly to blame for issues seen in ISE deployments). The other culprit in VM deployments is potentially VM Snapshots (happening without our knowledge or consent) and live vMotions (again, happening without our knowledge). Throw in the odd power failure here and there (disk corruption) and you have a nice mess in the database.&lt;/P&gt;
&lt;P&gt;How do I know this?&amp;nbsp; 99% of the time when I have gotten to the end of a TAC case, and the engineers run the CLI root access, they invariably fix something in the Oracle database.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;My gut feeling is also that, under the hood, ISE is a pile of cobbled together Java code that is haemorrhaging errors at an alarming rate. I am amazed it even works.&amp;nbsp; And it's disappointing to thinks how inefficient the whole thing is (why does it take 10 min to start application services with all that horsepower??). Look at the logs of a system that is "running smoothly" (as far as you're concerned) and you'll be amazed at how many ERROR messages you see logged 24/7.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's not forget that despite all that, when we're working in the Policy Set and making new Profiler Policies, etc, ISE is a great tool. When it does the job, it does it well. And if we find issues then we should report them to TAC to allow them to fix it.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4926253#M584136</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-19T20:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927021#M584173</link>
      <description>&lt;P&gt;Hi Aren,&lt;/P&gt;&lt;P&gt;personally I had been able to migrate our AAA servers from ACS 4.x to ACS 5.3 then to ISE 2.3, ISE 2.4 . Every time headaches seem to increase along with the release number. I am stuck with 3.x migration since last December. First I tried with at the time reccomended version that was 3.1, I had to open 6 SR to TAC, two of which were blocking ones. At the beginning of September, after waiting for the TAC 8 months&amp;nbsp; to solve a minor issue with&amp;nbsp; 3.1, I decided to upgrade to the new reccomended release before actual migration from 2.4&amp;nbsp;. The very next day I had to open other 2 SRs , one of which was identical to one I had opened for version 3.1&amp;nbsp;. Please note that we are using ISE just as radius server to perform basic wired/wireless 802.1x authentication and wireless guest authentication.&amp;nbsp; I can't even imagine how many SRs I would have had to open if we used advanced feature as PIXGRID or profiling. Yes ISE is a good product and actually we did not meet any critical issue with 2.4 but maybe It would be the same with freeradius or Microsoft NPS ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 08:22:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927021#M584173</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2023-09-21T08:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927045#M584175</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I upgrade from 3.1 last patch to 3.2 patch 3 with "full upgrade procedure" since the NADs are still pointing to our 2.4 deployment . So far I meet three issues:&lt;/P&gt;&lt;P&gt;1)mnt reports stopped to work, I am not able to say whether it was because of the upgrade or because the restore of the previous MNT database but reports show just pre upgrade data&lt;/P&gt;&lt;P&gt;2)live logs seem to register just session events due to accounting packets but not auth events even if some fail attempt&amp;nbsp; &amp;nbsp;seems to be logged randomly&lt;/P&gt;&lt;P&gt;3) For sponsor portal we hit this bug&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd97582" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd97582&lt;/A&gt;&amp;nbsp;we alredy met in 3.1 and that was actually solved.&lt;/P&gt;&lt;P&gt;Of course if your nodes are not dual homed you have not to worry about 3).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MM&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 08:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927045#M584175</guid>
      <dc:creator>marco.merlo</dc:creator>
      <dc:date>2023-09-21T08:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927470#M584185</link>
      <description>&lt;P&gt;I feel that the more we discuss these upgrade issues, the more we're becoming desensitized to this topic, and eventually so worn down by it that we just accept that it will happen. That's how I feel anyway. When I upgrade my Windows or iPhone I don't give it a second thought. Imagine having to worry if you can login after a patch/upgrade or whether your phone can still send an SMS after upgrading to iOS 17?&amp;nbsp; Seriously.&lt;/P&gt;
&lt;P&gt;There is no excuse for Cisco to keep breaking the fundamentals of ISE (RADIUS/802.1X/TACACS+) - but this is an ongoing theme. The customer can't get access to the Linux CLI to even help themselves when things go wrong.&amp;nbsp; We are beholden to the TAC and their slow processes to fix issues.&lt;/P&gt;
&lt;P&gt;My solution to this is to never upgrade ISE in the traditional way (using the upgrade bundle). Sad but true, I have chosen to always build new VMs (or re-image the SNS) because the upgrade process is such a dumpster fire. Maybe it will work better in ISE 5.x - but by then we'll all have our Ansible Playbooks ready to deploy our ISE as "Infrastructure as code" - no need to upgrade.&lt;/P&gt;
&lt;P&gt;My personal view is that ISE has become a sprawl of spaghetti code that is now so hard to maintain, that even Cisco have no way to keep quality control over it. One small change here breaks something else over there. Maybe they should consider re-working the architecture from scratch instead of piling onto that house of cards.&amp;nbsp;Customers are the test bed, and these forums are proof of that. Many of us don't deploy cutting edge ISE features - we just want the basic stuff from version 1.0 - it should be taken for granted that this is rock-solid and maintained to the highest quality assurance testing in Cisco.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 20:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927470#M584185</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-09-21T20:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Stability of ISE version 3.2?</title>
      <link>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927854#M584209</link>
      <description>&lt;P&gt;The worst mistake Cisco did to the ISE is to run Oracle database in the backend.&amp;nbsp; mySQL, MongoDB or Postgres would have been a much better choice than Oracle.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 14:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/stability-of-ise-version-3-2/m-p/4927854#M584209</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2023-09-22T14:39:13Z</dc:date>
    </item>
  </channel>
</rss>

