<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Regarding ISE HA deployment design in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973888#M585614</link>
    <description>&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;One additional question: Would it be okay if two nodes operate as primary for the Admin node?&lt;/P&gt;
&lt;P&gt;In other words, it is assumed that when the HQ Primary PAN fails, the DR PAN status is also operating as Primary, not Standby. (In the case of DR PAN, it is not Standby, so there is no need to promote it)&lt;/P&gt;</description>
    <pubDate>Fri, 08 Dec 2023 08:19:30 GMT</pubDate>
    <dc:creator>Bluevery1103</dc:creator>
    <dc:date>2023-12-08T08:19:30Z</dc:date>
    <item>
      <title>Regarding ISE HA deployment design</title>
      <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973806#M585609</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JinHyeokPark_3-1702011664458.png" style="width: 570px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/204394iEC08C7611A2E5D7E/image-dimensions/570x235?v=v2" width="570" height="235" role="button" title="JinHyeokPark_3-1702011664458.png" alt="JinHyeokPark_3-1702011664458.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;We plan to operate two nodes.&lt;BR /&gt;I have one concern regarding design. If ISE HA is not implemented and two NODEs with PAN/MNT/PSN persona roles are operated as ACTIVE/ACTIVE as shown in the configuration diagram, will there be any problems?&lt;/P&gt;
&lt;P&gt;From a service perspective, when HQ collapses, we plan to implement DR so that the service can be restored to normal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2023 05:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973806#M585609</guid>
      <dc:creator>Bluevery1103</dc:creator>
      <dc:date>2023-12-08T05:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding ISE HA deployment design</title>
      <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973820#M585610</link>
      <description>&lt;P&gt;The two node design in your diagram is a classic 2 node design and it's perfectly acceptable. You can suffer an outage of one of the ISE nodes, and the RADIUS/TACACS+ services will still run on the other node. If you get unlucky and the Primary Admin Node fails, then you won't see any Live Logs. You can promote the Standby PAN to be Primary, and then you will have Live Logs again.&lt;/P&gt;
&lt;P&gt;RADIUS and TACACS+ HA is implemented in the Network Devices and not in ISE. The "Services" are enabled on both nodes and each node has the same programming.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2023 05:56:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973820#M585610</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-12-08T05:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding ISE HA deployment design</title>
      <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973888#M585614</link>
      <description>&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;One additional question: Would it be okay if two nodes operate as primary for the Admin node?&lt;/P&gt;
&lt;P&gt;In other words, it is assumed that when the HQ Primary PAN fails, the DR PAN status is also operating as Primary, not Standby. (In the case of DR PAN, it is not Standby, so there is no need to promote it)&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2023 08:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4973888#M585614</guid>
      <dc:creator>Bluevery1103</dc:creator>
      <dc:date>2023-12-08T08:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding ISE HA deployment design</title>
      <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4974124#M585616</link>
      <description>That type of setup would mean that the ISE nodes are not related to each other. Each one is a PAN and therefore is the authority on the database. You have to configure each ISE node separately. Not much fun. &lt;BR /&gt;&lt;BR /&gt;Being PAN is not the most important achievement in the life of an ISE node. You benefit more by joining the nodes and having them sync the config from Primary to Secondary. if the PAN fails then you promote the standby. It’s a very rare event. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Dec 2023 11:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4974124#M585616</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-12-08T11:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding ISE HA deployment design</title>
      <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4975203#M585629</link>
      <description>&lt;P&gt;Thanks to you, my curiosity has been somewhat resolved.&lt;/P&gt;
&lt;P&gt;I agree with you saying it's not fun. I think we need to re-establish our goal in the direction of forming HA.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 01:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4975203#M585629</guid>
      <dc:creator>Bluevery1103</dc:creator>
      <dc:date>2023-12-11T01:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: Regarding ISE HA deployment design</title>
      <link>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4975222#M585630</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;, even though it's possible to run two seperate instances, I don't see the benefit since you would have to manually keep everything in sync between the two. &amp;nbsp;With the normal deployment of a two node cube, you can promote the secondary which is easy. &amp;nbsp;You also have an option with configuring PAN failover which will do that automatically , but not really recommended. Keep in mind that the PSN is active on both and your network devices would have entries for both.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 03:58:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/regarding-ise-ha-deployment-design/m-p/4975222#M585630</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2023-12-11T03:58:15Z</dc:date>
    </item>
  </channel>
</rss>

