cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2153
Views
5
Helpful
8
Replies

Migration from ACS 5.8.1 to ISE 2.3

rajeshp20
Level 1
Level 1

Hi,

I am trying to do migration from ACS 5.8.1 to ISE 2.3. It is giving an error while trying to establish a connection to ACS while exporting. Attached error message for reference. I have uploaded the self signed certs in the migration tool for ACS and ISE and have also added the hostname in the DNS. The only issue I see here is the hostname mismatch in DN of the cert and the ACS hostname.

Cert name (DN) - MUMBRCIPAAA002--reset ( I had to run the reset-managemen-tinterface-certificate command in ACS cli as the GUI stopped responding when I created a new self signed certificate)

Hostname of ACS - MUMBRCIPAAA002


If my understanding is correct and hostname is an issue, then will changing the ACS hostname from command line disrupt the ACS service?


Also, I am currently doing the migration in  ISE standalone mode and once the migration is complete, I will change the ISE node to Primary PAN and then add other nodes. (1 node in PAN secondary, 3 PSN's and 2 MnT (primary and secondary).


Will it affect the migrated config?

Need inputs/Suggestions to resolve this.



Regards

Rajesh

1 Accepted Solution

Accepted Solutions

hslai
Cisco Employee
Cisco Employee

Enabling Trusted Certificates in the Migration Tool says,

In Cisco Secure ACS, ensure that the server certificate is in the System Administration > Configuration > Local Server Certificates > Local Certificates page. The Common Name (CN attribute in the Subject field) or DNS Name (in the Subject Alternative Name field) in the certificate is used in the ACS5 Credentials dialog box to establish the connection and export data from Cisco Secure ACS.

Yes, I expect it to restart ACS services after changing the hostname.

You may change ISE from standalone to distributed with multiple ISE nodes after migration is done.

View solution in original post

8 Replies 8

hslai
Cisco Employee
Cisco Employee

Enabling Trusted Certificates in the Migration Tool says,

In Cisco Secure ACS, ensure that the server certificate is in the System Administration > Configuration > Local Server Certificates > Local Certificates page. The Common Name (CN attribute in the Subject field) or DNS Name (in the Subject Alternative Name field) in the certificate is used in the ACS5 Credentials dialog box to establish the connection and export data from Cisco Secure ACS.

Yes, I expect it to restart ACS services after changing the hostname.

You may change ISE from standalone to distributed with multiple ISE nodes after migration is done.

Hello,

Many thanks for your response.

Will changing the ACS hostname affect the current profiles, groups and configuration of ACS?

Regards

Rajesh

If possible, it's best to take a backup, restore it to an ACS running in your lab, and use that as the source instead of your production ACS.

It seems to me that it would be easier to create another self-signed certificate to match the hostname instead of renaming the hostname.

Since ACS may run in a cluster, the profiles, groups, and policy configurations are not depending on the hostname. However, if this ACS is joined to a Microsoft Active Directory domain, then it can lose the membership and require re-join after hostname update.

The profiles and groups do not change when you change ACS hostname.

From ACS, if you export the local certificate to a windows box it will export as *.cer file and when you open that and go to details tab you will see the CN.

Also make sure the DNS entry of the hostname points to the right IP address. If you do not have DNS you can use /etc/hosts file for this.

-Krishnan

Hi Krishnan,

Thanks for the input. Migration is completed successfully. However while testing it, IPv4 devices - users are getting authenticated successfully but for IPv6 devices - it shows failed. I checked the logs and it shows authentication passed but fails to match any authorization policy and it goes the last policy with "deny all" shell profile. This was again verified by the hits received on the last policy. I have checked the user, usergroup, profiles, polices - all have been migrated properly. I am not sure where am I going wrong.

P.S - I gave static Ipv6 address to all the nodes after the nodes were put in distributed mode. I disabled the IPv6 dhcp server and autoconfig. Also the migration from ACS 5.8 to ISE 2.3 was done in standalaone mode and then the nodes were put in distributed mode.

Please share your inputs.

Regards

Rajesh

Hi Rajesh,

Please look at the document on TACACS+ Ipv6 document that describes certain caveats(For eg: use global ipv6 and not link local on the network device) and the flow.

https://communities.cisco.com/docs/DOC-75571

Make sure you see the ipv6 address in the live logs and the authentication succeeds. Take a look at the doc above and follow through the instructions provided.

Let us know if you have an issue. You can also open up a TAC case with help from Cisco Sales.

Thanks

Krishnan

Hi Krishnan,

Many thanks for your response. I already had this document and had verified it. I did check the logs and it captures the IPv6 address and also the Authentication showed as  passed, so I figured out it was failing at the authorization policy. While checking the authorization policy, I figured out that the devices were added in the sub group of the parent group and the condition selected in the authorization policy was for the parent group. So I changed that, IPv6 started working fine and I could see hits on the right authorization policy.

Many thanks for your inputs.

Regards

Rajesh

dorel
Level 1
Level 1

You dont need to change the cert o hostname from device for the migrations, you can configure the file hosts in your PC and add a pointer  IP to name ej: 10.10.10.10 MUMBRCIPAAA002--reset  or you can change the name in the DNS Server, so your cert to do match with the hostname but your cert should has a valid expiration date, it shouldn´t be expired.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: