03-03-2023 05:39 PM - edited 03-03-2023 05:59 PM
The Cisco Identity Services Engine (ISE) platform was built to be highly distributed (from 2 - 50 PSNs) and scalable (up to 2M active endpoints). There are several major factors in determining the scale and distribution of an ISE deploymet, many of which were also covered in our ISE webinar ▷ ISE Deployment Architectures:Nodes, Services & Scale if you prefer to watch and listen.
An ISE node - or server - may be deployed as an appliance, virtual machine (VM), or cloud instance. The ISE software does not care about the underlying physical or virtual platforms of the individual nodes - you may mix and match the server types and sizes for your needs based on the supported ISE Performance and Scale requirements.
The ISE nodes may be configured to handle one or more sets of services - or personas - to delegate the configuration, processing, logging, and sharing of authentication, authorization, and accounting (AAA) requests against your defined network access security policy. These ISE node personas are:
ISE nodes may run all of the personas in a single, Standalone node deployment in your lab or fully distribute them to individual ISE nodes in a Large deployment with up to 54 nodes (2 PANs, 2 MNTs, <=50: PSNs + <= 4 PXGs) for the greatest scale.
An ISE deployment - or also affectionately known an ISE Cube - is a distributed set of ISE nodes (appliances or VMs) configured and synchronized for handling authentication, authorization, and accounting (AAA) requests. ISE deployments may range from 2 to 54 nodes to accommodate a wide range of performance, availability, and distribution. However, even with this flexibility, ISE deployments may need to be broken up into multiple, independent deployments. This happens for the following reasons:
Active endpoints are the total number of concurrently active endpoints on the network. This is primary factor in Licensing counts and individual PSN performance and scale for every deployment. The RADIUS session for an active endpoint is defined by ISE receiving a RADIUS Accounting Start
event from a network device (RADIUS client) about an endpoint and it ends with a Stop
event which is triggered by a disconnect (link down or dis-assocation), ide timeout, or session expiration. Coincidentally, the RADIUS session also determines the consumption of an ISE Base (2.x) or Essentials (3.x) License. If ISE never receives the RADIUS Accounting Stop message due to a network or power outage or configuration error, ISE will terminate the session - and decrement the license count(s) - after approximately 4 days.
The total number of network branches, sites, or regions is the next major factor in an ISE deployment's scale. It is generally recommended to centralize ISE nodes in regional data centers with load balancing to optimize the opportunity for both availability, efficiency. This also minimizes the latency for ISE PSN synchronization over the WAN which has a maximum of 300ms between an ISE PSN and the PAN nodes. However, some customers prefer to distribute more ISE nodes into local branches or sites without a backup WAN, putting local availability over general efficiency for their deployment.
Not all endpoints and the users behind them (if any) behave the same on the network. You may get a much better understanding of the potential authentication load by counting the endpoints by their Access Method and usage scenario in your environments:
The reality is that you will most likely have a mix of access methods and use cases within those methods. The more you can estimate the endpoint populations for each of your scenarios, the better you can anticipate your ISE usage and scale. Some other considerations for your scaling your ISE deployment are :
While access methods have different impacts on performance, so do your choices of authentication protocols. Your protocol choice is typically driven by cryptographic capability (if any), the subject's credential type (pre-shared key, password, certificate, or token) and identity store (if any). The most popular network authentication protocols and methods used with IEEE 802.1X are usually based on the Extensible Authentication Protocol (EAP) and have names like PAP, CHAP, PEAP, TEAP, EAP-GTC, EAP-TLS, EAP-TTLS, and EAP-FAST.
The number of authentications per second that a single ISE PSN (Policy Service Node) may handle can vary from single digits to more than 1000! This is related to the latency of the network, number of roundtrips for tunnel and method negotiation, the cryptographic complexity, and finally the network and processing latency of any external identity store that ISE depends on to authenticate the subject. Given the wide range of authentication rates for different protocols, you can see why you need to estimate the number of endpoints using a given authentication protocol at a given time of day or region of your network to ensure you have enough capacity to handle it.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: