<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340736#M598651</link>
    <description>&lt;P&gt;What patch level of 3.4 is this?&lt;/P&gt;</description>
    <pubDate>Tue, 21 Oct 2025 19:15:18 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2025-10-21T19:15:18Z</dc:date>
    <item>
      <title>ISE Secondary node sync up failed on 3.4 after automatic PAN failover</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340666#M598643</link>
      <description>&lt;P&gt;We have a 3 node deployment ISE1-PAN (Admin, MNT, PSN),&amp;nbsp;&amp;nbsp; ISE2-SPAN (Admin, MNT, PSN)&amp;nbsp; and ISE3-HEALTH (Health node)&lt;/P&gt;&lt;P&gt;To test the failover we shut the network ports on the&amp;nbsp;ISE1-PAN, after the configured polling intervals the&amp;nbsp;ISE3-HEALTH triggered the failover to&amp;nbsp;ISE2-SPAN and failover completed successfully. We then unshut the ports on&amp;nbsp;ISE1-PAN went to the process of becoming the was secondary PAN, replication stopped and we did a full sync of the server which was successful. After&amp;nbsp;ISE1-PAN was connected successfully and all the nodes in the deployment was synced and connected.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We then triggered another failover by shutting the ports on the&amp;nbsp;ISE2-SPAN that was now primary so that we can test the automatic PAN failover from new PAN(ISE2-SPAN) back to&amp;nbsp;ISE1-PAN as the primary. Everything appeared to work well, the&amp;nbsp;ISE1-PAN became primary again as before and&amp;nbsp;ISE2-SPAN became secondary. However when we attempted to do full sync on the&amp;nbsp;ISE2-SPAN the sync action did not start as it did when we did the same with&amp;nbsp;ISE1-PAN. The application services on ISE2-SPAN did restart but after they all came back up the server still was in synced and still said a manual sync is required.&lt;/P&gt;&lt;P&gt;We 1st restarted the node, but that made no difference and eventually we attempted to de-register ISE2-SPAN from the deployment. However when we attempted to register the node back to the deployment we got this meesage:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Certificate hierarchy must terminate with certificate in trusted store :&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ISE2-SPAN.domain.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We have checked that the Trusted Certificates and System Certificates on the current PAN&amp;nbsp;ISE1-PAN and&amp;nbsp;ISE2-SPAN are the same, but cannot figure to what the message is referring to.&lt;/P&gt;&lt;P&gt;Can anyone guide us in the a direction of what this message means, what cert do we need to import and to which server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 16:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340666#M598643</guid>
      <dc:creator>francois-smith</dc:creator>
      <dc:date>2025-10-21T16:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340717#M598644</link>
      <description>&lt;P&gt;Why do you have PAN auto-failover enabled?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:46:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340717#M598644</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-10-21T18:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340724#M598648</link>
      <description>&lt;P&gt;It is the design of the deployment architecture. We are still in pre-production and busy testing the failover scenarios and this what happened during testing. We now want to recover back to where all the nodes are back and in sync.&lt;/P&gt;&lt;P&gt;ISE1-PAN is operational and ISE2-HEALTH is operational in the deployment, but we are unable to get the ISE2-SPAN registered. It is currently in standalone mode, with the configs previously that was sync when it was successfully registered&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340724#M598648</guid>
      <dc:creator>francois-smith</dc:creator>
      <dc:date>2025-10-21T18:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340728#M598649</link>
      <description>Why? What exactly are you hoping to gain by using that feature?&lt;BR /&gt;</description>
      <pubDate>Tue, 21 Oct 2025 18:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340728#M598649</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-10-21T18:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340731#M598650</link>
      <description>&lt;P&gt;The purpose is to test the feature to see how it operates and determine if it is suitable for our environment and if not use the manual failover procedure. We have now encountered this issue and we need some guidance on how to recover back to the previous state and test the manual failover procedure.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Do have you any guidance of how we may recover so that we can disable the feature and test the manual failover?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 19:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340731#M598650</guid>
      <dc:creator>francois-smith</dc:creator>
      <dc:date>2025-10-21T19:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340736#M598651</link>
      <description>&lt;P&gt;What patch level of 3.4 is this?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 19:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340736#M598651</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-10-21T19:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340738#M598652</link>
      <description>&lt;P&gt;Patch 3&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 19:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340738#M598652</guid>
      <dc:creator>francois-smith</dc:creator>
      <dc:date>2025-10-21T19:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340761#M598653</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1912303"&gt;@francois-smith&lt;/a&gt;&amp;nbsp;- whether or not automatic PAN failover is good or bad, that's up to the individual - my personal opinion is that it's not worth it, because it doesn't solve any problems, unless ISE also had a built-in FHRP/VIP concept that allowed me to always hit the same IP/DNS. Anyway ..&lt;/P&gt;
&lt;P&gt;The issue you describe sounds like corrupted config that smells like a TAC case. My own experience with 3.4p3 is that after a 3.3 to 3.4 upgrade, all was well while I was on SPAN, and then to conclude the upgrade, I manually promoted PPAN back to Primary. That's when the wheels came off. The PPAN was active, and all other nodes had a red icon against them. I waited but they didn't recover. I had to sync each one manually - and even after that, I now have daily sync failures on all nodes, that the TAC say are "cosmetic" - that gold star that the BU assigns to software versions means very little in my opinion.&amp;nbsp; The solution works, but it doesn't give you the impression that it deserves any gold stars.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 20:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340761#M598653</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2025-10-21T20:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340771#M598655</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1912303"&gt;@francois-smith&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;every time I encounter these types of errors, I prefer to reset the &lt;STRONG&gt;ISE Application&lt;/STRONG&gt; configuration to factory defaults, including the &lt;STRONG&gt;Certificates&lt;/STRONG&gt;:&lt;/P&gt;
&lt;PRE&gt;ise/admin# &lt;FONT color="#3366FF"&gt;application reset-config ise&lt;/FONT&gt;&lt;BR /&gt; Initialize your Application configuration to &lt;U&gt;factory defaults&lt;/U&gt;? (y/n): &lt;FONT color="#3366FF"&gt;Y&lt;/FONT&gt;&lt;BR /&gt; Leaving currently connected AD domains if any...&lt;BR /&gt; Please rejoin to AD domains from the administrative GUI&lt;BR /&gt; Retain existing Application &lt;U&gt;server certificates&lt;/U&gt;? (y/n): &lt;FONT color="#3366FF"&gt;N&lt;/FONT&gt;&lt;BR /&gt; ...&lt;/PRE&gt;
&lt;P class="lia-align-justify"&gt;Note 1: to be done in your &lt;STRONG&gt;SPAN&lt;/STRONG&gt;&amp;nbsp;(which is now a&amp;nbsp;&lt;STRONG&gt;Standalone Node&lt;/STRONG&gt;), before re-registering to the &lt;STRONG&gt;PPAN Cluster&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Note 2: this procedure always cleans "invisible garbage"&amp;nbsp; :&amp;nbsp; )&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 20:37:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5340771#M598655</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-10-21T20:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Secondary node sync up failed on 3.4 after automatic PAN failo</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5348480#M599021</link>
      <description>&lt;P&gt;I just recently had something similar happen with a migration to Azure project.&amp;nbsp; Turns out, the CA used to sign the ISE node Admin certificate was a CA preloaded in ISE. The Root CA cert only had "Cisco Service" selected.&amp;nbsp; I selected "Infrastructure" and it allowed me to join the nodes&amp;nbsp; Specifically the CA cert was the "DigiCert Global Root G2 CA".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 19:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-secondary-node-sync-up-failed-on-3-4-after-automatic-pan/m-p/5348480#M599021</guid>
      <dc:creator>Justin-Walker</dc:creator>
      <dc:date>2025-11-19T19:11:44Z</dc:date>
    </item>
  </channel>
</rss>

