<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ISE fall-back in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392573#M88588</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I doubt you can force a re-auth when the first ise becomes available again, but it should change back to it once the re-auth timer expires for the dot1x sessions on the switch, and the client will be re-authenticated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Jan 2014 00:33:47 GMT</pubDate>
    <dc:creator>jan.nielsen</dc:creator>
    <dc:date>2014-01-29T00:33:47Z</dc:date>
    <item>
      <title>ISE fall-back</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392571#M88586</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have 2 ISE 1.2&lt;/P&gt;&lt;P&gt;I configured ISE1(192.168.1.1) as primary for PAN, MNT and PSN and it work fine&lt;/P&gt;&lt;P&gt;Now I am configuring ISE2(192.168.2.1) as secondary PAN, MNT and PSN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In normal situation, the user are authenticated on ISE1&lt;/P&gt;&lt;P&gt;My goal : &lt;/P&gt;&lt;P&gt;If ISE1 is unavailable, user are authenticated on ISE2&lt;/P&gt;&lt;P&gt;Then as soon as ISE1 become again available, user must be authenticated again on ISE1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured it,&amp;nbsp; but it dont work (see below my configuration)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;radius-server dead-criteria time 5 tries 3&lt;/P&gt;&lt;P&gt;radius-server host 192.168.1.1 auth-port 1812 acct-port 1813 key Password123&lt;/P&gt;&lt;P&gt;radius-server host 192.168.2.1 auth-port 1812 acct-port 1813 key Password123&lt;/P&gt;&lt;P&gt;radius-server retry method reorder&lt;/P&gt;&lt;P&gt;radius-server transaction max-tries 3&lt;/P&gt;&lt;P&gt;radius-server retransmit 1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;When ISE1 become again available, user remain authenticated on ISE2&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;How to configure the switch to achieve My goal (&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;ISE1 become again available, user must be authenticated again on ISE1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Please help&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392571#M88586</guid>
      <dc:creator>nicanor00</dc:creator>
      <dc:date>2019-03-11T04:18:25Z</dc:date>
    </item>
    <item>
      <title>ISE fall-back</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392572#M88587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; As per my knowledge When a primary Monitoring ISE node goes down, the secondary Monitoring&amp;nbsp; ISE node takes over all monitoring and troubleshooting information. The&amp;nbsp; secondary node provides read-only capabilities, which means you cannot&amp;nbsp; make configuration changes to that node. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp1101486"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; To make configuration changes on the secondary node, the administrator&amp;nbsp; must first manually promote the secondary node to a primary role. If the&amp;nbsp; primary node comes back up after the secondary node has been promoted,&amp;nbsp; it assumes the secondary role. If the secondary node was not promoted,&amp;nbsp; the primary Monitoring ISE node will resume its role after it comes back&amp;nbsp; up. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For configuration help you can see the below link&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.html#wp1087439"&gt;http://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_dis_deploy.html#wp1087439&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jan 2014 22:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392572#M88587</guid>
      <dc:creator>Ravi Singh</dc:creator>
      <dc:date>2014-01-28T22:36:04Z</dc:date>
    </item>
    <item>
      <title>ISE fall-back</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392573#M88588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I doubt you can force a re-auth when the first ise becomes available again, but it should change back to it once the re-auth timer expires for the dot1x sessions on the switch, and the client will be re-authenticated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jan 2014 00:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-fall-back/m-p/2392573#M88588</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2014-01-29T00:33:47Z</dc:date>
    </item>
  </channel>
</rss>

