<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE SNS3515 Assistance in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023025#M587588</link>
    <description>&lt;P&gt;Well, the task of exporting all the NADs from the VM ISE to the SNS ISE is easy. But. Check first that you have the necessary Network Device Group structure in place, or else the NAD import will fail. You can export the Network Device Group from VM ISE and import into SNS ISE as a first step, then import the NADs.&lt;/P&gt;
&lt;P&gt;The Policy Sets you'll have to hand-craft into the SNS ISE - no import function there.&lt;/P&gt;
&lt;P&gt;As for the performance ... how does the saying go ?&amp;nbsp; It depends - LOL.&lt;/P&gt;
&lt;P&gt;How busy is are the VM's? Can you go into your hypervisor and check the CPU stats over a week/month?&amp;nbsp; That might give some indication - but also remember that there will be a baseline CPU load from ISE itself - but have a look anyway.&lt;/P&gt;
&lt;P&gt;I had a look and even in ISE 3.2 the Reports &amp;gt; Diagnostics counters all relate to RADIUS performance, and not TACACS+. So perhaps your best bet is to see how active your TACACS really is with a TACACS report and then just thumb suck it.&lt;/P&gt;
&lt;P&gt;Reports &amp;gt; Device Administration &amp;gt; Summary&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The number of NAD devices is not the problem - it's how many of those devices choose to talk to ISE at the same time. Being TACACS, the only real culprit of hammering ISE is usually NMS platforms (DNAC, Solarwinds, etc.) - they are constantly logging into devices and hence, make work for ISE.&lt;/P&gt;
&lt;P&gt;If you have such NMS logins, you can try reducing the MNT load by implementing Collection Filters&lt;/P&gt;
&lt;P&gt;Admin &amp;gt; System &amp;gt; Logging &amp;gt; Collection Filters&lt;/P&gt;
&lt;P&gt;By filtering these hundreds or thousands of constant Successful logins of your NMS username(s), you won't see them in LiveLogs any longer, and your MNT will thank you for it. Make the Collection filter only match of the auth was successful - you will want to see the failed auths just in case something went wrong one day.&lt;/P&gt;
&lt;P&gt;Final tip is about your Policy Set. Use the hit counters not sure if your ISE has those) to order the most often hit policies in descending order. The means, ISE spends less CPU time hunting down the Policy Set looking for the match.&lt;/P&gt;
&lt;P&gt;BUT&lt;/P&gt;
&lt;P&gt;Very important - don't be tempted to willy-nilly move Policies around - pay attention to the Conditions and logic and ensure that what you're doing is correct - somethings certain Policies MUST be placed in a certain order for Boolean/Logical reasons. But having an efficient Policy Set is a very good idea to reduce CPU load on busy systems.&lt;/P&gt;
&lt;P&gt;And then finally, plan on building an ISE 3.2 system!&amp;nbsp; There, I said it - because others will chime in and tell you the same thing. But there's nothing wrong in trying to consolidate and optimise regardless.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Feb 2024 20:41:36 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-02-22T20:41:36Z</dc:date>
    <item>
      <title>ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5022999#M587586</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;I was hoping someone could provide some guidance for me. Here is my issue:&lt;/P&gt;&lt;P&gt;I currently have 2x SNS3515 hardware appliances in a "small" deployment configuration. Both devices are acting with all 3 personas. This deployment is for TACACS only and has 865 devices registered to it.&lt;/P&gt;&lt;P&gt;I also have a separate TACACS deployment that is made up of VMs that is in another region and has a similar # of devices. This deployment however, is in very bad shape and could have issues at any time.&lt;/P&gt;&lt;P&gt;I wanted to see if I could import the 800+ devices and the dozen or so policies from the "bad deployment" into my SNS3515 deployment but I am not sure the 3515's can handle it. Can someone lend me some guidance on how I might go about ascertaining the SNS3515 deployment can support adding hundreds more devices and a dozen or so extra policies?&lt;/P&gt;&lt;P&gt;I understand the SNS3515s are EOL, this is just a stopgap measure until we can upgrade the SNS3515s to the newest models. Any help is appreciated! Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 20:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5022999#M587586</guid>
      <dc:creator>craddockchristopher</dc:creator>
      <dc:date>2024-02-22T20:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023011#M587587</link>
      <description>&lt;P&gt;that should able to handle if that is only for device admin - bare in mind that model end of life.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/eos-eol-notice-c51-742122.html" target="_blank"&gt;https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/eos-eol-notice-c51-742122.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 20:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023011#M587587</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-02-22T20:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023025#M587588</link>
      <description>&lt;P&gt;Well, the task of exporting all the NADs from the VM ISE to the SNS ISE is easy. But. Check first that you have the necessary Network Device Group structure in place, or else the NAD import will fail. You can export the Network Device Group from VM ISE and import into SNS ISE as a first step, then import the NADs.&lt;/P&gt;
&lt;P&gt;The Policy Sets you'll have to hand-craft into the SNS ISE - no import function there.&lt;/P&gt;
&lt;P&gt;As for the performance ... how does the saying go ?&amp;nbsp; It depends - LOL.&lt;/P&gt;
&lt;P&gt;How busy is are the VM's? Can you go into your hypervisor and check the CPU stats over a week/month?&amp;nbsp; That might give some indication - but also remember that there will be a baseline CPU load from ISE itself - but have a look anyway.&lt;/P&gt;
&lt;P&gt;I had a look and even in ISE 3.2 the Reports &amp;gt; Diagnostics counters all relate to RADIUS performance, and not TACACS+. So perhaps your best bet is to see how active your TACACS really is with a TACACS report and then just thumb suck it.&lt;/P&gt;
&lt;P&gt;Reports &amp;gt; Device Administration &amp;gt; Summary&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The number of NAD devices is not the problem - it's how many of those devices choose to talk to ISE at the same time. Being TACACS, the only real culprit of hammering ISE is usually NMS platforms (DNAC, Solarwinds, etc.) - they are constantly logging into devices and hence, make work for ISE.&lt;/P&gt;
&lt;P&gt;If you have such NMS logins, you can try reducing the MNT load by implementing Collection Filters&lt;/P&gt;
&lt;P&gt;Admin &amp;gt; System &amp;gt; Logging &amp;gt; Collection Filters&lt;/P&gt;
&lt;P&gt;By filtering these hundreds or thousands of constant Successful logins of your NMS username(s), you won't see them in LiveLogs any longer, and your MNT will thank you for it. Make the Collection filter only match of the auth was successful - you will want to see the failed auths just in case something went wrong one day.&lt;/P&gt;
&lt;P&gt;Final tip is about your Policy Set. Use the hit counters not sure if your ISE has those) to order the most often hit policies in descending order. The means, ISE spends less CPU time hunting down the Policy Set looking for the match.&lt;/P&gt;
&lt;P&gt;BUT&lt;/P&gt;
&lt;P&gt;Very important - don't be tempted to willy-nilly move Policies around - pay attention to the Conditions and logic and ensure that what you're doing is correct - somethings certain Policies MUST be placed in a certain order for Boolean/Logical reasons. But having an efficient Policy Set is a very good idea to reduce CPU load on busy systems.&lt;/P&gt;
&lt;P&gt;And then finally, plan on building an ISE 3.2 system!&amp;nbsp; There, I said it - because others will chime in and tell you the same thing. But there's nothing wrong in trying to consolidate and optimise regardless.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 20:41:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023025#M587588</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-22T20:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023037#M587589</link>
      <description>&lt;P&gt;Arne,&lt;/P&gt;&lt;P&gt;Thank you so much for the detailed response. I did want to key in on one aspect:&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;&lt;EM&gt;I had a look and even in ISE 3.2 the Reports &amp;gt; Diagnostics counters all relate to RADIUS performance, and not TACACS+. So perhaps your best bet is to see how active your TACACS really is with a TACACS report and then just thumb suck it&lt;/EM&gt;."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This was exactly what I was attempting to do as well, was figure out how many TACACS requests are these deployments seeing in a given time period as well as how many concurrent TACACS auths the deployments were seeing. I didnt see any good way of ascertaining this info. I was going to use the reports as you suggested. It sounds like there isnt any good way in ISE to see this info for TACACS correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 20:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023037#M587589</guid>
      <dc:creator>craddockchristopher</dc:creator>
      <dc:date>2024-02-22T20:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023044#M587590</link>
      <description>&lt;P&gt;Yes, sadly the TACACS Key Performance Metrics are non existent in ISE. If you're desperate then you could run a tcpdump on both nodes and use a filter such as 'tcp port 49' for as long as ISE will let you (older versions it was 5 min max). And then run that through wireshark (filter on 'tacplus'). But your easiest approach is the look at LiveLogs and extrapolate from there.&lt;/P&gt;
&lt;P&gt;If it's any consolation, I have customers with close on 10,000 network devices - I think the system limits as far as the raw number of devices is not even close to exhaustion.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 21:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023044#M587590</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-22T21:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023058#M587593</link>
      <description>&lt;P&gt;Arne,&lt;/P&gt;&lt;P&gt;Thanks again! Are you saying you have clients with SNS3515 that have 10k devices resgitered?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I logged into the CIMC of my SNS3515 and found that the CPU and overall utilization is about 5% so its not even breaking a sweat currently. Unfortunately I am not able to see any reports or live logs on my "bad deployment" because its still running 2.7 and requires Adobe Flash player....yikes!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 21:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023058#M587593</guid>
      <dc:creator>craddockchristopher</dc:creator>
      <dc:date>2024-02-22T21:20:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE SNS3515 Assistance</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023085#M587594</link>
      <description>&lt;P&gt;ha ha - I don't have any customers with SNS-3515 ... but the customer in question uses a Small VM spec (32 GB RAM, 16 vCPU) on those TACACS PSNs.&lt;/P&gt;
&lt;P&gt;The CIMC CPU utilisation is also a good indicator of load. And those old SNS-3515 (single disk) have pretty slow IO - if you're moving to VMs you might find that IO is improved if the underlying VM data storage is RAID or SSD based.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 21:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-sns3515-assistance/m-p/5023085#M587594</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-02-22T21:48:45Z</dc:date>
    </item>
  </channel>
</rss>

