<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE DR DC Deployment in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5367467#M599715</link>
    <description>&lt;P&gt;Its seems they are being uploaded automatically when we add new ISE nodes to the deployment from the admin node&lt;/P&gt;</description>
    <pubDate>Wed, 04 Feb 2026 12:40:24 GMT</pubDate>
    <dc:creator>Kamran Mustafayev</dc:creator>
    <dc:date>2026-02-04T12:40:24Z</dc:date>
    <item>
      <title>Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5286543#M596164</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;We have two small physical ISE appliances in main Data Center, both are using same personas (MnT, PSN, PAN and etc), in case I want to add two VM ISE (same model as physical) to the Disaster Recovery Data Center, does it mean I need to add them to the existing cluster and there is no way to make it "active" and "standby" manner, nodes in DR DC will have a different IP addresses&lt;/P&gt;&lt;P&gt;If I create united cluster including DC and DR DC ISE nodes then I suppose load will be distributed between all 4 nodes (of course if I configure it on each NAS), I wonder what is the best practice in this case&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 10:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5286543#M596164</guid>
      <dc:creator>Kamran Mustafayev</dc:creator>
      <dc:date>2025-04-30T10:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5286638#M596171</link>
      <description>&lt;P&gt;I would suggest having all ISE nodes in the same deployment, it just makes sense from a configuration perspective and then create deployment groups for the PSNs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on a 4 node deployment, Cisco suggests splitting the PSN functionality from the PAN/MnT beyond 2 nodes. In this case your deployment would have to be 2 PAN/MnT and 2 PSNs.&lt;/P&gt;&lt;P&gt;Considering that, your deployment should look like this once completed:&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 physical nodes - 1 primary PAN/MnT and 1 PSN&lt;/P&gt;&lt;P&gt;2 DR VM nodes - 1 secondary PAN/MnT&amp;nbsp; and 1 PSN&amp;nbsp;&lt;/P&gt;&lt;P&gt;Point your NADs at the PSNs and just have the physical PSN as the first choice although I would personally include the second PSN and have the devices load balance sessions between them where possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this setup it can scale to add up to 6 PSNs if you ever need to expand.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 15:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5286638#M596171</guid>
      <dc:creator>Ben Walters</dc:creator>
      <dc:date>2025-04-30T15:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5287094#M596194</link>
      <description>&lt;P&gt;Thank you for your answer, just one additional question, once I deploy new two ISE nodes in DC and will change roles i.e will move MnT and Adm roles to DR DC ISE nodes will it create any downtime?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2025 07:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5287094#M596194</guid>
      <dc:creator>Kamran Mustafayev</dc:creator>
      <dc:date>2025-05-02T07:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5287518#M596208</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/224038"&gt;@Kamran Mustafayev&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;beyond what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/449686"&gt;@Ben Walters&lt;/a&gt;&amp;nbsp;said ... please take a look at:&amp;nbsp;&lt;A href="https://cs.co/ise-scale" target="_blank" rel="noopener"&gt;Performance and Scalability Guide for Cisco Identity Services Engine&lt;/A&gt;, search for&amp;nbsp;&lt;STRONG&gt;Table 2. Types of Cisco ISE Deployments&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;About your question related to &lt;U&gt;downtime&lt;/U&gt; ... please take a look at:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-4/admin_guide/b_ise_admin_3_4/b_ISE_admin_deployment.html" target="_blank" rel="noopener"&gt;Cisco Identity Services Engine Administrator Guide, Release 3.4&lt;/A&gt;, search for&amp;nbsp;&lt;STRONG&gt;High Availability for Administrative Node&lt;/STRONG&gt; (pay special attention to&amp;nbsp;&lt;STRONG&gt;Table 10. Availability of Features&lt;/STRONG&gt;)&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 03 May 2025 07:16:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5287518#M596208</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-05-03T07:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288082#M596245</link>
      <description>&lt;P&gt;Thank you so in summary&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I turn off secondary node in main DC MnT and ADM roles and move it to tertiary node in backup DC - this won't make any impact anyway&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just one additional question - when I add new nodes to the deployment will it automatically deploy system certificates to new nodes from the admin node,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 05:42:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288082#M596245</guid>
      <dc:creator>Kamran Mustafayev</dc:creator>
      <dc:date>2025-05-06T05:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288177#M596247</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/224038"&gt;@Kamran Mustafayev&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;at &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Certificate Management &amp;gt;&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;System Certificates &amp;gt; &lt;/STRONG&gt;are you using a &lt;STRONG&gt;Self-Signed Certificate&lt;/STRONG&gt; or a &lt;STRONG&gt;CA&lt;/STRONG&gt;&amp;nbsp;(take a look at the &lt;STRONG&gt;Used By&lt;/STRONG&gt; column) ?&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: remember to delete &lt;STRONG&gt;Old Certificates&lt;/STRONG&gt; please take a look at:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;A href="https://community.cisco.com/t5/artigos-seguran%C3%A7a/ise-cscwo05386-baltimore-cybertrust-root-expirando-ise-3-x/ta-p/5260569" target="_blank" rel="noopener"&gt;ISE - CSCwo05386 - Baltimore CyberTrust Root expirando (ISE 3.x)&lt;/A&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/ise-queue-link-error/ta-p/4625179" target="_blank" rel="noopener"&gt;ISE - Queue Link Error&lt;/A&gt;, search for: "delete Old Internal Certificates&lt;STRONG&gt;"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 10:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288177#M596247</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-05-06T10:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288537#M596252</link>
      <description>&lt;P&gt;Hello Marcello&lt;/P&gt;&lt;P&gt;We use some CA certificates&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 09:20:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288537#M596252</guid>
      <dc:creator>Kamran Mustafayev</dc:creator>
      <dc:date>2025-05-07T09:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288751#M596254</link>
      <description>&lt;P class="lia-align-justify"&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/224038"&gt;@Kamran Mustafayev&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;whenever you add new &lt;STRONG&gt;Nodes&lt;/STRONG&gt; to the &lt;STRONG&gt;Deployment&lt;/STRONG&gt;, you must import the &lt;STRONG&gt;Certificates&lt;/STRONG&gt; for these&amp;nbsp;&lt;STRONG&gt;Nodes&lt;/STRONG&gt; generated by your &lt;STRONG&gt;CA&lt;/STRONG&gt; in &lt;STRONG&gt;Administration &amp;gt; System &amp;gt; Certificates &amp;gt; Certificate Management &amp;gt; System Certificates&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 May 2025 17:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5288751#M596254</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2025-05-07T17:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE DR DC Deployment</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5367467#M599715</link>
      <description>&lt;P&gt;Its seems they are being uploaded automatically when we add new ISE nodes to the deployment from the admin node&lt;/P&gt;</description>
      <pubDate>Wed, 04 Feb 2026 12:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-dr-dc-deployment/m-p/5367467#M599715</guid>
      <dc:creator>Kamran Mustafayev</dc:creator>
      <dc:date>2026-02-04T12:40:24Z</dc:date>
    </item>
  </channel>
</rss>

