cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1009
Views
1
Helpful
5
Replies

TACACS+ Performance question

yongwli
Cisco Employee
Cisco Employee

Hi Team,

How many rules is below table based on?

ISE TACACS+ Performance

Platform performance specs are for a dedicated PSN.

PAN and MNT nodes are deployed as separate node(s).

Scenario

Cisco SNS-3415

Appliance

Cisco SNS-3495

Appliance

Cisco SNS-3515

Appliance

Cisco SNS-3595

Appliance

ISE VersionISE 2.0ISE 2.0ISE 2.1ISE 2.1
TACACS+ Function: PAP1,400 / second2,800 / second3,236 / second4,884 / second
TACACS+ Function: CHAP1,500 / second2,900 / second2,413 / second4,961 / second
TACACS+ Function: Enable700 / second1,200 / second1631/second1,984 / second
TACACS+ Function: Session AuthZ900 / second1,700 / second2,191 / second3,453 / second
TACACS+ Function: Command AuthZ900 / second1,700 / second2,359 / second3,467 / second
TACACS+ Function: Accounting2,900 / second4,900 / second3,209 / second9,128 / second

Thanks

DL

1 Accepted Solution

Accepted Solutions

Refer here for policy table limits: ISE Performance & Scale

View solution in original post

5 Replies 5

Craig Hyps
Level 10
Level 10

Would require some digging to learn from QA the size of specific rule set used in testing, but I would ask if there is a specific concern over the size of rule set you are using.

Craig

Customer cannot provide policy number at this time, but since they have more than 60K network device, and need to use different condition for different type of network device or location. So policy number will be larger as they said.

Refer here for policy table limits: ISE Performance & Scale

Hi Craig,


Customer don't have oversize policies, just need to know the performance number we list based on how many rules. 1 rule or 100 rules? Did you mean the performance number I list in first post is based on max policy number?


Thanks

DL

Hi DL,

The link below is the same as the one Craig copy/pasted. If you look at the first table, you will see the limits of authentication/ authorization rules per deployment

https://communities.cisco.com/docs/DOC-68347

-Krishnan