<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Upgrade - best practices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869854#M582718</link>
    <description>&lt;P&gt;If you restore from the backup, that should restore the certificates as well.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jul 2023 16:12:21 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2023-07-07T16:12:21Z</dc:date>
    <item>
      <title>ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869775#M582714</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I prepared 2 ISE VM in v 3.1 + install the last Patch in view of a future upgrade Principal/Secondary.&lt;/P&gt;&lt;P&gt;The two ISE VMs have been prepared with two test IP addresses and hostname (ex. hostname_test.local)&lt;/P&gt;&lt;P&gt;I count :&lt;BR /&gt;- Stop the Secondary VM (old employment)&lt;BR /&gt;- Modify in CLI the IP address + hostname of the test VM with the IP and hostname of Secondary VM (with the correct IP and hostname) =&amp;gt; as indicated by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/easiest-way-to-upgrade-a-two-node-deployment-2-4-to-3-0/m-p/4868298#M582694" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/easiest-way-to-upgrade-a-two-node-deployment-2-4-to-3-0/m-p/4868298#M582694&lt;/A&gt; Thank you Arne Bier.&lt;BR /&gt;- Restore ISE configuration&lt;BR /&gt;- Import certificate, join AD, ....&lt;BR /&gt;- Stop Primary (old employment)&lt;BR /&gt;- Modify in CLI the IP address + hostname of the test VM with the IP and the hostname of the Primary VM (with the correct IP and hostname)&lt;BR /&gt;- Join the VM to new deployment&lt;BR /&gt;- Promote Primary/Secondary&lt;/P&gt;&lt;P&gt;My question :&lt;BR /&gt;Should I remove all certificates with the test hostname? or is importing certificates enough?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 13:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869775#M582714</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2023-07-07T13:42:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869854#M582718</link>
      <description>&lt;P&gt;If you restore from the backup, that should restore the certificates as well.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 16:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869854#M582718</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-07T16:12:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869991#M582721</link>
      <description>&lt;P&gt;Once you have the Deployment up and running, you can delete any System Certificates that are marked as Not Used. That should be the case after you have imported or created new Admin certs and any others (like EAP certs).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 22:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4869991#M582721</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-07-07T22:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4871896#M582798</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your help &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;,&amp;nbsp;the upgrade went well in general,&lt;/P&gt;&lt;P&gt;I encountered this bug: Bug CSCvt14248 =&amp;gt; fixed by Cisco&lt;/P&gt;&lt;P&gt;When I "Promote to Primary", all the services on both nodes (Primary/Secondary) have restarted, so all authentication failed, normal? is there a way to circumvent this?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 16:58:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4871896#M582798</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2023-07-11T16:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4871950#M582806</link>
      <description>&lt;P&gt;Out of interest, how Cisco TAC fixed that issue reported in the bug?&lt;/P&gt;
&lt;P&gt;When you switch the PAN roles it is expected to restart ISE application services, but I don't think the whole nodes would restart. Either way, it is expected not to be able to serve any new authentication requests until the services are fully restarted.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 19:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4871950#M582806</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-07-11T19:29:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4872006#M582812</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;After taking root, and accessing a directory (CA certificate), he deleted several cert, key files: rm -f xxx, and stop/restart CA service.&lt;/P&gt;&lt;P&gt;I didn't expect the ise app services to restart on both nodes at the same time.&lt;/P&gt;&lt;P&gt;we have two nodes to avoid these problems, not clean &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 21:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4872006#M582812</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2023-07-11T21:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4872015#M582813</link>
      <description>&lt;P&gt;yep this is normal for a Admin promotion to cause both Admin nodes to restart. Of course, in a distributed deployment (where PSNs are running as separate VMs/Appliances) this is not an issue. But if you only have two nodes doing everything (Admin/Monitoring/Services) then you put all your eggs in one basket.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other things that cause spontaneous restarts of the entire deployment (ALL NODES) are things like updating the Admin cert of the Active PAN.&amp;nbsp; I generally never update the Admin cert of the Active PAN. I would rather promote the Secondary and then update the Admin cert.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lastly, when you change things like TLS and SHA versions under the Security menu, it will also restart all nodes at the same time. Perhaps one day they will change this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jul 2023 22:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4872015#M582813</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-07-11T22:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4873890#M582857</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thank you for this detail, very interesting&lt;/P&gt;&lt;P&gt;I am using EAP-TLS to authenticate clients, increasing the timeout (ex. 2 or 3 days) of EAP TLS Session Resume under:&lt;BR /&gt;- Settings &amp;gt; Protocols, and/or&lt;BR /&gt;- Policy &amp;gt; Policy Elements &amp;gt; Results &amp;gt; Authentication &amp;gt; Allowed Protocols&lt;/P&gt;&lt;P&gt;The client does not renew its authentication request during the upgrade window or when the services restart on both nodes?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 21:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4873890#M582857</guid>
      <dc:creator>cisco.13</dc:creator>
      <dc:date>2023-07-13T21:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Upgrade - best practices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4873897#M582858</link>
      <description>&lt;P&gt;Session Resume is simply an optimisation to reduce the time and effort required to perform a full 802.1X authentication. If a wireless 802.1X supplicant roams from AP to AP, it will cause an 802.1X auth (unless some wireless optimisations are in place - but in general, a roam causes an 802.1X auth event) - to limit the impact on ISE, we enable Session Resume. If you reboot the PSN that the endpoint was registered on, then I believe the next re-auth will be a full one - but I might be wrong - either way, the auth might take a few milliseconds longer than if Session Resume was still active for that endpoint.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jul 2023 21:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-upgrade-best-practices/m-p/4873897#M582858</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-07-13T21:44:27Z</dc:date>
    </item>
  </channel>
</rss>

