02-16-2024 01:31 AM
Hi,
We currently run Cisco ISE on on-premises VMWare infrastructure however as part of our cloud only strategy, we're looking to build and migrate to a new ISE deployment in Azure (via ExpressRoute) and remove the on-premise infrastructure.
I have had a look at the Cisco guide - Cisco ISE on Azure Cloud Services however I am slightly confused about the best way to design this in Azure for high availability.
To give some context, this is how we're currently setup on VMWare:
The guide here shows 4 ISE VMs in Availability Zone 1 and 2 ISE VMs in Availability Zone 2 unless i'm misunderstood.
My question (based on our current setup) is how would you set this up in Azure? My thought process would be to deploy 4 x ISE VMs in Azure (2 VMs in each availability zone) and then place them behind an Azure Load Balancer? Would you recommend that we enable PAN failover in this deployment and how would you spread the personas for HA?
Apologies for the long post but looking for some advice from fellow professionals.
02-16-2024 08:42 AM
You should consider a 3 node or a medium deployment at a minimum. Should you ever need to promote secondary admin node to primary admin node, that requires a service restart. Meaning ISE would be completely down during this time.
I never recommend PAN autofailover unless the deployment has continuous automations or integrations that require a PAN to be active.
02-29-2024 03:42 AM
Hi @ahollifield thanks for the response - based on our current environment, if we was to go down the route of a medium deployment (i.e 3 nodes) how would you split the roles for resiliency and HA? or would you go to a 4 node deployment and how would you then split the roles?
02-29-2024 05:57 AM
3 nodes is not a medium deployment. Its an "expanded" small deployment: PAN/MnT/PSN + PAN/MnT/PSN + PSN
A medium deployment with four nodes would be: PAN/MnT + PAN/MnT + PSN + PSN
02-29-2024 12:26 PM
Really helpful, thanks for the advice.
02-18-2024 01:06 PM
When deploying ISE in Azure, you should also be aware of this behaviour on the Microsoft side. You will need to contact MS support to enable the workaround.
https://community.cisco.com/t5/network-access-control/eap-tls-to-azure-ise-is-failing-but-not-with-an-ise-node-in-the/td-p/4739038
You should also be aware of the limitations with cloud provider load balancers when it comes to RADIUS/TACACS+ traffic.
Cloud Load Balancers with ISE
02-29-2024 12:29 PM
Hi @Greg Gibbs thanks for the heads up regarding the Microsoft issue. We have expressroute connection from our office to Azure vWAN, have other customers been able to get Microsoft to enable the workaround with a similar setup to ours? I've been reading this evening, and it looks like the MTU issue is the same on both VPNs and SD-WAN so i'm hopeful we can get MS to resolve otherwise it's a non-starter!
02-29-2024 02:19 PM
For the issue with MS dropping out of sequence UDP, my understanding is that MS has agreed to enable the workaround for customers using Cisco ISE. However, I don't have visibility of other customer deployments.
If you get pushback from MS support, I would suggest doing everything you can to escalate within MS as this is an issue they clearly have created by not understanding (or caring) how standard protocols work.
03-05-2024 02:05 AM
Hi @Greg Gibbs,
Understood, we will raise it with MS when we setup our test environment.
I have a couple more questions i am hoping you can help me with or at least point me in the right direction:
03-05-2024 01:22 PM
1. I assume you're talking about this reference... "For example, working with DHCP SPAN profiler probes and CDP protocol functions through the Cisco ISE CLI are functions that are currently not supported."
CDP/LLDP for profiling of endpoints comes from the Device Sensor on the switch. The above limitation has no bearing on that function.
2. You would need enough VM licenses in your smart account to cover any concurrent VMs you intend to use. See the ISE Licensing Guide for more details on licensing.
3. You would use the config backup/restore (without restoring the ADE-OS). The new nodes will have different FQDNs, so you'll need new certificates, etc. See the backup procedures in the ISE Upgrade Journey guide for additional pre- and post-backup/restore steps required.
Please submit a new post for any additional questions that are not specifically related to the original topic and refrain from using the same post for multiple topics/questions in the future. Doing so makes it more difficult for others with similar questions to find the answers.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide