cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Who Me Too'd this topic

ISE 2.4 multi-domain forest - design recommendation

Milos_Jovanovic
VIP Alumni
VIP Alumni

Hi,

We are in process of migration ACS v5.8 to ISE v2.4 for a large international customer. My customer has a fully distributed deployment, operating on 3 regions/continents (EMEA, APAC, AM). ISE is used for 802.1x and VPN authentication, with AD integration.

In terms of ISE, we have:

  • 2x PAN nodes, located in EMEA region (main data center)
  • 2x MnT nodes, located in EMEA
  • 6x PSN nodes, with 2 of them located in EMEA, APAC and AM

In terms of AD, Microsoft multi-domain forest is in use, with two-way trust between all used domains. There are basically 4 domains:

  • mydoman.com - root domain
  • emea.mydomain.com - EMEA subdomain
  • apac.mydomain.com - APAC subdomain
  • am.mydomain.com - AM subdomain

AD servers are located in each region for each subdomain, and servers are at the same time DCs (Domain Controller), GCs (Global Catalog) and DNS servers:

  • For EMEA region, we have:
    • 4x DC=GC for emea.mydomain.com
    • 2x DC=GC for apac.mydomain.com
    • 2x DC=GC for am.mydomain.com
    • 2x DC=GC for mydomain.com
  • For APAC region, we have:
    • 2x DC=GC for apac.mydomain.com
  • For AM region, we have:
    • 2x DC=GC for am.mydomain.com
    • 1x DC=GC for mydomain.com

 We are using recommended Microsoft Sites and Services for all locations. All PSN nodes are in correct Sites, and there is no latency between e.g. AM PSN nodes and AM DCs (they are on same L3 device).

 

After successful configuration migration, we have joined PAN, MnT and PSN nodes to emea.mydomain.com (as it is main data center). As there is two-way trust, we can successfully pool AD groups from all subdomains, and we can authenticate users cross-domain. Thanks to this approach, we can use single JP (Join Point) as a reference in our policies. Everything works ideally, however...

 

From time to time, especially in peak hours for given region, we are receiving "High authentication latency" alarms. As the threshold for this alarm is 10s, I'm a bit worried about this one. We do have high-speed WAN links between regions, but it still might happen that there is a peak in utilization. Also, based on architecture, as we are using Sites and Services, I would expect minimum cross-domain communication from ISE standpoint (I'm aware that there must be some - e.g. EMEA user is roaming to AM, and authenticating to AM PSNs).

 

I did packet capture, and I can confirm that I can see that AM PSN is talking to AM DC, for captured RADIUS authentication. There is some communication from AM PSN back to EMEA DC, but this should be expected as it is joined to emea.mydomain.com. I can see high latency for multiple ISE services and scenarios, e.g.:

  • when certificate authentication is being used, with AD group authorization (for 802.1x scenario)
  • when AD authentication is being used, with AD group authorization (for BYOD and VPN scenario)
  • when AM workstation is authenticating to AM PSN (for 802.1x scenario)
  • when AM user is authenticating to AM PSN (VPN and BYOD scenario)
  • when EMEA user or workstation is authenticating to AM PSN (roaming users)

All of the alarms are raised for APAC and AM region, but never for EMEA, which makes me challenge design on AD integration part. Also, alarms are not raised for all authentications, nor entire time, so there is no obvious regularity.

 

I already went through tons of documentation and Live sessions, but there is actually no document describing how should a system be designed/deployed with multi-domain forest, in terms of which nodes to join to which domain/subdomain, how to build policies based on that approach, etc.

 

Could you please shed some light on this matter? Any experiences and recommendations with deployments like these?

Thanks

Who Me Too'd this topic