11-18-2024 09:39 AM - edited 11-18-2024 09:43 AM
Yes we are using old school ISE 2.4 but it's what i have to deal with
We have ISE 1 PAN Primary 192.168.1.10 running 2.4 - Admin, Monitor
ISE 1 192.168.1.20 running 2.4 just Policy
We need to add the second ISE which has not be sync for over 2 years
ISE 2 Admin, Monitor 192.168.2.10
ISE 2 policy 192.168.2.20
They have not been sync for two years and I'm ready to update the certs for second ISE 2 admin/ monitor server and ISE policy server
When i click on Muil-use for admin , EAP and portal it say it need to reboot the ISE Servers but It doesn't reboot the primary ISE 1 but only affects ISE 2 for each server i update?
Since they have sync for long time is there special commands I need to run or just use the GUI to sync the two ISE 1 and ISE 2
11-18-2024 10:05 AM
I notice that Subject Alternative Names doesn't have all the ISE
ISE 1 server admin, Monitor and ISE 1 policy server doesn't have ISE 2 admin, Monitor server and ISE 2 polcy SERVER
I'm thinking that Failover will be a problem since they don't match?
Can't open up support because out of support and end of life
11-18-2024 01:32 PM
You have not said whether you have a PKI or not. I assume you must, because you mentioned EAP. Therefore, if you have a PKI infrastructure (e.g. Windows CA server) then my recommended approach is as follows - let's assume you have a Root CA, and one or more Issuing CAs:
11-18-2024 02:26 PM
Certs are unit specific, so if you change it on the second node, only the second note reboots for the cert to change. This is good as your whole system will not go offline for a cert change. Downside is you need to load the cert for each admin node.
11-19-2024 04:37 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide