Cisco Identity Services Engine Installation Guide, Release 2.3
Cisco Identity Services Engine Installation Guide, Release 2.3
3
First Published: 2017-07-28
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
• Network resources
• Endpoints
The policy information point represents the point at which external information is communicated to the Policy
Service persona. For example, external information could be a Lightweight Directory Access Protocol (LDAP)
attribute.
Term Definition
Service A specific feature that a persona provides such as network access,
profiling, posture, security group access, monitoring, and
troubleshooting.
Node Type The Cisco ISE node can assume any of the following personas:
Administration, Policy Service, Monitoring
Administration Node
A Cisco ISE node with the Administration persona allows you to perform all administrative operations on
Cisco ISE. It handles all system-related configurations that are related to functionality such as authentication,
authorization, and accounting. In a distributed deployment, you can have a maximum of two nodes running
the Administration persona. The Administration persona can take on the standalone, primary, or secondary
role.
Monitoring Node
A Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages from
all the Administration and Policy Service nodes in a network. This persona provides advanced monitoring
and troubleshooting tools that you can use to effectively manage a network and resources. A node with this
persona aggregates and correlates the data that it collects, and provides you with meaningful reports. Cisco
ISE allows you to have a maximum of two nodes with this persona, and they can take on primary or secondary
roles for high availability. Both the primary and secondary Monitoring nodes collect log messages. In case
the primary Monitoring node goes down, the secondary Monitoring node automatically becomes the primary
Monitoring node.
At least one node in your distributed setup should assume the Monitoring persona. We recommend that you
do not have the Monitoring and Policy Service personas enabled on the same Cisco ISE node. We recommend
that the Monitoring node be dedicated solely to monitoring for optimum performance.
pxGrid Node
You can use Cisco pxGrid to share the context-sensitive information from Cisco ISE session directory with
other network systems such as ISE Eco system partner systems and other Cisco platforms. The pxGrid
framework can also be used to exchange policy and configuration data between nodes like sharing tags and
policy objects between Cisco ISE and third party vendors, and for other information exchanges. Cisco pxGrid
also allows third party systems to invoke adaptive network control actions (EPS) to quarantine users/devices
in response to a network or security event. The TrustSec information like tag definition, value, and description
can be passed from Cisco ISE via TrustSec topic to other networks. The endpoint profiles with Fully Qualified
Names (FQNs) can be passed from Cisco ISE to other networks through a endpoint profile meta topic. Cisco
pxGrid also supports bulk download of tags and endpoint profiles.
You can publish and subscribe to SXP bindings (IP-SGT mappings) through pxGrid. For more information
about SXP bindings, see Source Group Tag Protocol section in Cisco Identity Services Engine Administrator
Guide.
In a high-availability configuration, Cisco pxGrid servers replicate information between the nodes through
the PAN. When the PAN goes down, pxGrid server stops handling the client registration and subscription.
You need to manually promote the PAN for the pxGrid server to become active.
model allows you to configure both your primary and secondary nodes on all RADIUS clients by using this
type of deployment or a similar approach.
As the number of devices, network resources, users, and AAA clients increases in your network environment,
you should change your deployment configuration from the basic small model and use more of a split or
distributed deployment model.
Split Deployments
In split Cisco ISE deployments, you continue to maintain primary and secondary nodes as described in a small
Cisco ISE deployment. However, the AAA load is split between the two Cisco ISE nodes to optimize the
AAA workflow. Each Cisco ISE appliance (primary or secondary) needs to be able to handle the full workload
if there are any problems with AAA connectivity. Neither the primary node nor the secondary nodes handles
all AAA requests during normal network operations because this workload is distributed between the two
nodes.
The ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system. In
addition, splitting the load provides better loading while the functional status of the secondary node is
maintained during the course of normal network operations.
In split Cisco ISE deployments, each node can perform its own specific operations, such as network admission
or device administration, and still perform all the AAA functions in the event of a failure. If you have two
Cisco ISE nodes that process authentication requests and collect accounting data from AAA clients, we
recommend that you set up one of the Cisco ISE nodes to act as a log collector.
In addition, the split Cisco ISE deployment design provides an advantage because it allows for growth.
As the amount of log traffic increases in a network, you can choose to dedicate one or two of the secondary
Cisco ISE nodes for log collection in your network.
Centralized Logging
We recommend that you use centralized logging for large Cisco ISE networks. To use centralized logging,
you must first set up a dedicated logging server that serves as a Monitoring persona (for monitoring and
logging) to handle the potentially high syslog traffic that a large, busy network can generate.
Because syslog messages are generated for outbound log traffic, any RFC 3164-compliant syslog appliance
can serve as the collector for outbound logging traffic. A dedicated logging server enables you to use the
reports and alert features that are available in Cisco ISE to support all the Cisco ISE nodes.
You can also consider having the appliances send logs to both a Monitoring persona on the Cisco ISE node
and a generic syslog server. Adding a generic syslog server provides a redundant backup if the Monitoring
persona on the Cisco ISE node goes down.
Load Balancers
In large centralized networks, you should use a load balancer, which simplifies the deployment of AAA clients.
Using a load balancer requires only a single entry for the AAA servers, and the load balancer optimizes the
routing of AAA requests to the available servers.
However, having only a single load balancer introduces the potential for having a single point of failure. To
avoid this potential issue, deploy two load balancers to ensure a measure of redundancy and failover. This
configuration requires you to set up two AAA server entries in each AAA client, and this configuration remains
consistent throughout the network.
Monitoring persona on the Cisco ISE node, but each remote location should retain its own unique network
requirements.
Table 1: Maximum RADIUS Scaling by Deployment with Maximum Passive Identity/Easy Connect Scaling by Deployment
Size
Deployment Platform Max # Max RADIUS Max Passive Max Merged Max Merged
Model Dedicated Sessions Per Identity & Easy & Easy
PSNs Deployment Sessions Per Connect Connect
Deployment Sessions* Sessions*
(Shared (Dedicated
PSNs) PSNs)
Standalone 3415 0 5,000 50,000 500 N/A
pxGrid Scaling Platform Max PSNs Max PXGs Max pxGrid Max pxGrid
Per Deployment Max PSN+PXG Max PSN+PXG Subscribers Subscribers
Nodes =5 Nodes =5 (Shared (Dedicated
PSN+PXG) PSN/PXG)
Standalone (All 3415 0 0 2 N/A
personas on
same node) (2 3495 0 0 2 N/A
nodes
redundant) 3515 0 0 2 N/A
3595 0 0 2 N/A
Dedicated 3415 10
pxGrid nodes
(Max Publish 3495 20
Rate Gated by
Total 3515 15
Deployment
Size) 3595 25
Note Harden your virtual environment and ensure that all the security updates are up-to-date. Cisco is not liable
for any security issues found in hypervisors.
Note If you are installing Cisco ISE on an ESXi 5.x server, to support RHEL 7 as the Guest
OS, update the VMware hardware version to 9 or later. RHEL 7 is supported with
VMware hardware version 9 and later.
Cisco ISE supports the VMware vMotion feature that allows you to migrate live virtual machine (VM) instances
(running any persona) between hosts. For the VMware vMotion feature to be functional, the following
conditions must be met:
• Shared storage—The storage for the VM must reside on a storage area network (SAN), and the SAN
must be accessible by all the VMware hosts that can host the VM being moved.
• VMFS volume sharing—The VMware host must use shared virtual machine file system (VMFS) volumes.
• Gigabit Ethernet interconnectivity—The SAN and the VMware hosts must be interconnected with
Gigabit or faster Ethernet links.
• Processor compatibility—A compatible set of processors must be used. Processors must be from the
same vendor and processor family for vMotion compatibility.
Note Cisco ISE does not support VMware snapshots for backing up ISE data because a VMware snapshot saves
the status of a VM at a given point in time. In a multi-node Cisco ISE deployment, data in all the nodes
are continuously synchronized with current database information. Restoring a snapshot might cause
database replication and synchronization issues. Cisco recommends that you use the backup functionality
included in Cisco ISE for archival and restoration of data.
Using VMware snapshots to back up ISE data results in stopping Cisco ISE services. A reboot is required
to bring up the ISE node.
Cisco ISE offers the following OVA templates that you can use to install and deploy Cisco ISE on virtual
machines (VMs):
Note The 200 GB OVA templates are sufficient for Cisco ISE nodes that serve as dedicated Policy Service or
pxGrid nodes.
The 600 GB and 1.2 TB OVA templates are recommended to meet the minimum requirements for ISE
nodes that run the Administration or Monitoring persona. For additional information about disk space
requirements, see Disk Space Requirements, on page 21.
If you need to customize the disk size, CPU, or memory allocation, you can manually deploy Cisco ISE
using the standard .iso image. However, it is important that you ensure the minimum requirements and
resource reservations specified in this document are met. The OVA templates simplify ISE virtual appliance
deployment by automatically applying the minimum resources required for each platform.
• ISE-2.3.0.xxx-eval.ova
• ISE-2.3.0.xxx-virtual-200GB-SNS3415.ova
• ISE-2.3.0.xxx-virtual-200GB-SNS3495.ova
• ISE-2.3.0.xxx-virtual-200GB-SNS3515.ova
• ISE-2.3.0.xxx-virtual-200GB-SNS3595.ova
• ISE-2.3.0.xxx-virtual-600GB-SNS3415.ova
• ISE-2.3.0.xxx-virtual-600GB-SNS3515.ova
• ISE-2.3.0.xxx-virtual-600GB-SNS3495.ova
• ISE-2.3.0.xxx-virtual-1.2TB-SNS3595.ova
The OVA template reservations for the base SNS platforms are provided in the table below.
• Production:
◦Clock Speed: 2.0 GHz or faster
◦Number of Cores: 6 (Small) to 8 (Large) CPU cores
• Production:
◦Small—16 GB
◦Large—64 GB
Storage and File The storage system for the Cisco ISE virtual appliance requires a minimum write
System performance of 50 MB per second and a read performance of 300 MB per second.
Deploy a storage system that meets these performance criteria and is supported by
VMware server.
Cisco ISE provides a number of methods to verify if your storage system meets
these minimum requirements before, during, and after Cisco ISE installation. See
Virtual Machine Resource and Performance Checks, on page 33 for more
information.
We recommend the VMFS file system because it is most extensively tested, but
other file systems, transports, and media can also be deployed provided they meet
the above requirements.
Disk Controller Paravirtual (default for RHEL 7 64-bit) or LSI Logic Parallel
For best performance and redundancy, a caching RAID controller is recommended.
Controller options such as RAID 10 (also known as 1+0) can offer higher overall
write performance and redundancy than RAID 5, for example. Additionally,
battery-backed controller cache can significantly improve write operations.
NIC 1 GB NIC interface required (two or more NICs are recommended; six NICs are
supported). Cisco ISE supports E1000 and VMXNET3 adapters.
Note We recommend that you select E1000 to ensure correct adapter order by
default. If you choose VMXNET3, you might have to remap the ESXi
adapter to synchronize it with the ISE adapter order.
VMware Virtual VMware Virtual Machine Hardware Version 8 or higher on ESXi 5.x (5.1 U2
Hardware minimum) and 6.x .
Version/Hypervisor
Note If you are installing Cisco ISE on an ESXi 5.x server, to support RHEL
7 as the Guest OS, update the VMware hardware version to 9 or later.
RHEL 7 is supported with VMware hardware version 9 and later.
• Production:
◦Clock Speed: 2.0 GHz or faster
◦Number of Cores: 6 (Small) to 8 (Large) CPU cores
• Production:
◦Small—16 GB
◦Large—64 GB
Hard disks
• Evaluation: 200 GB
• Production:
200 GB to 2 TB of disk storage (size depends on deployment and tasks).
We recommend that your VM host server use hard disks with a minimum speed
of 10,000 RPM.
Note When you create the Virtual Machine for Cisco ISE, use a single virtual
disk that meets the storage requirement. If you use more than one virtual
disk to meet the disk space requirement, the installer may not recognize
all the disk space.
NIC 1 GB NIC interface required (two or more NICs are recommended; six NICs are
supported). Cisco ISE supports VirtIO drivers. We recommend VirtIO drivers for better
performance.
• Production:
◦Clock speed: 2.0 GHz or faster
◦Number of cores: 6 (small) to 8 (large)
CPU cores
Memory
• Evaluation:
◦Basic—8 GB (for evaluating guest access
and basic access policy flows)
◦Advanced—16 GB (for evaluating
advanced features such as pxGrid, Internal
CA, SXP, Device Administration, and
Passive Identity Services)
• Production:
◦Small—16 GB
◦Large—64 GB
Note If you choose to deploy Cisco ISE manually without the recommended reservations,
you must assume the responsibility to closely monitor your appliance’s resource
utilization and increase resources, as needed, to ensure proper health and functioning
of the Cisco ISE deployment.
Note OVF templates are not applicable for Linux KVM. OVF templates are available only
for VMware virtual machines.
• Policy Service nodes on VMs can be deployed with less disk space than Administration or Monitoring
nodes. The minimum disk space for any production Cisco ISE node is 200 GB. See Disk Space
Requirements, on page 21 for details on the disk space required for various Cisco ISE nodes and
personas.
• VMs can be configured with 1 to 6 NICs. The recommendation is to allow for 2 or more NICs. Additional
interfaces can be used to support various services such as profiling, guest services, or RADIUS.
Memory 16 GB 64 GB
Total Disk Space 200 GB to 2 TB. See Disk Space 200 GB to 2 TB. See Disk Space
Requirements, on page 21 for more Requirements, on page 21 for
information. more information.
Note Disk size of 2 TB or greater is currently not supported. Ensure that the maximum disk size is less than 2
TB.
ISE Persona Minimum Disk Space for Minimum Recommended Disk Maximum
Evaluation Disk Space Space for Production Disk
for Note Additional disk Space
Production space is required
to store local
debug logs,
staging files, and
to handle log
data during
upgrade, when
the Primary
Administration
Node temporarily
becomes a
Monitoring node.
Standalone ISE 200 GB 600 GB 600 GB to 2 TB 2 TB
For extra log storage, you can increase the VM disk space. For every 100 GB of disk space that you add, you
get 60 GB more for log storage. Depending on your requirements, you can increase the VM disk size up to a
maximum of 2 TB.
If you increase the disk size of your virtual machine after initial installation, then you must perform a fresh
installation of Cisco ISE on your virtual machine to properly detect and utilize the full disk allocation.
The following table lists the number of days that RADIUS logs can be retained on your Monitoring node
based on the allocated disk space and the number of endpoints that connect to your network. The numbers
are based on the following assumptions: Ten or more authentications per day per endpoint with logging
suppression enabled.
150,000 17 51 86 172
200,000 13 38 65 129
250,000 11 31 52 104
500,000 6 16 26 52
The following table lists the number of days that TACACS+ logs can be retained on your Monitoring node
based on the allocated disk space and the number of endpoints that connect to your network. The numbers
are based on the following assumptions: The script runs against all NADs, 4 sessions per day, and 5 commands
per session.
75,000 17 51 86 172
100,000 13 38 65 129
• (Optional; required only if you are installing Cisco ISE on SNS hardware appliances) Ensure that you
set up the Cisco Integrated Management Interface (CIMC) configuration utility to manage the appliance
and configure BIOS. See the following documents for more information.
◦For SNS 3400 series appliances, see Cisco SNS-3400 Series Appliance Hardware Installation
Guide.
◦For SNS 3500 series appliances, see Cisco SNS-3500 Series Appliance Hardware Installation
Guide.
Step 2 Download the Cisco ISE ISO image. To install Cisco ISE on VMware VM, download the OVA template. For more
information about deploying the OVA template, see Deploy Cisco ISE on Virtual Machines Using OVA Templates ,
on page 33.
a) Go to http://www.cisco.com/go/ise. You must already have valid Cisco.com login credentials to access this link.
b) Click Download Software for this Product.
The Cisco ISE image comes with a 90-day evaluation license already installed, so you can begin testing all Cisco
ISE services when the installation and initial configuration is complete.
6 Press F6 to bring up the boot menu. A screen similar to the following one appears:
• Virtual Machine:
1 Map the CD/DVD to an ISO image. A screen similar to the following one appears. The following message and
installation menu are displayed.
Welcome to the Cisco Identity Services Engine Installer
Cisco ISE Version: 2.3.0.xxx
Step 4 At the boot prompt, press 1 and Enter to install Cisco ISE using a serial console.
If you want to use a keyboard and monitor, use the arrow key to select the Cisco ISE Installation (Keyboard/Monitor)
option. The following message appears.
**********************************************
Please type 'setup' to configure the appliance
**********************************************
Step 5 At the prompt, type setup to start the Setup program. See Run the Setup Program, on page 28 for details about the Setup
program parameters.
Step 6 After you enter the network configuration parameters in the Setup mode, the appliance automatically reboots, and returns
to the shell prompt mode.
Step 7 Exit from the shell prompt mode. The appliance comes up.
Step 8 Continue with Verify the Installation Process, on page 30.
Default gateway Must be a valid IPv4 address for the default gateway. 10.12.13.1
Primary name Must be a valid IPv4 address for the primary name server. 10.15.20.25
server
Add/Edit another Must be a valid IPv4 address for an additional name server. (Optional) Allows you to
name server configure multiple name
servers. To do so, enter y to
continue.
Primary NTP Must be a valid IPv4 address or hostname of a Network Time clock.nist.gov
server Protocol (NTP) server.
System Time Zone Must be a valid time zone. For example, for Pacific Standard Time UTC (default)
(PST), the System Time Zone is PST8PDT (or Coordinated
Universal Time (UTC) minus 8 hours).
You can run the show timezones command from the Cisco ISE
CLI for a complete list of supported time zones.
Note We recommend that you set all Cisco ISE nodes to the
UTC time zone. This time zone setting ensures that the
reports, logs, and posture agent log files from the various
nodes in your deployment are always synchronized with
regard to the time stamps.
Username Identifies the administrative username used for CLI access to the admin (default)
Cisco ISE system. If you choose not to use the default (admin),
you must create a new username. The username must be three to
eight characters in length and be composed of valid alphanumeric
characters (A–Z, a–z, or 0–9).
Password Identifies the administrative password that is used for CLI access MyIseYPass2
to the Cisco ISE system. You must create this password because
there is no default. The password must be a minimum of six
characters in length and include at least one lowercase letter (a–z),
one uppercase letter (A–Z), and one numeral (0–9).
Step 1 When the system reboots, at the login prompt enter the username you configured during setup, and press Enter.
When you log in through the CLI for the first time after installation, the system prompts you to change the password.
Step 4 Check the status of the ISE processes by entering the show application status ise command, and press Enter.
The console displays:
ise/admin# show application status ise
ise/admin#
Note Other USB tools might work, but Cisco recommends using Fedora Media Writer as it
has been qualified.
• Download the Cisco ISE installation ISO file to the local system.
Specifically, replace all instances of the "cdrom:" string. For example, replace
ks=cdrom:/ks.cfg
with
ks=hd:sdb1:/ks.cfg
Note The SNS 3515 and SNS 3595 appliances support the Unified Extensible Firmware Interface (UEFI) secure
boot feature. This feature ensures that only a Cisco-signed ISE image can be installed on the SNS 3515
and SNS 3595 appliances, and prevents installation of any unsigned operating system even with physical
access to the device. For example, generic operating systems, such as Red Hat Enterprise Linux or Microsoft
Windows cannot boot on this appliance.
The SNS 3515 and SNS 3595 appliances support only Cisco ISE 2.0.1 or later releases. You cannot install a
release earlier than 2.0.1 on the SNS 3515 or SNS 3595 appliance.
• Use the Cisco Integrated Management Controller (CIMC) interface to map the installation .iso file to
the virtual DVD device. See Install Cisco ISE, on page 25 for more information.
• Create an install DVD with the installation .iso file and plug in an USB external DVD drive and boot
the appliance from the DVD drive.
• Create a bootable USB device using the installation .iso file and boot the appliance from the USB drive.
See Create a Bootable USB Device to Install Cisco ISE, on page 31 and Install Cisco ISE, on page
25 for more information.
Note The ISE 2.3 OVA templates are not compatible with VMware web client for vCenter 6.5. As a workaround,
use the VMware OVF tool to import the OVA templates.
You must reimage Cisco ISE from ISO if the virtual hard disk is resized after importing the OVA, as
Cisco ISE does not support resizing hard disk and file systems after installation.
Step 9 Verify the information in the Ready to Complete page. Check the Power on after deployment check box.
Step 10 Click Finish.
Install Cisco ISE on VMware Virtual Machine Using the ISO File
This section describes how to install Cisco ISE on a VMware virtual machine using the ISO file.
Note If you choose the default network driver (VMXNET3 ) as the Network Adapter, check
the physical adapter mappings. Ensure that you map the Cisco ISE GigabitEthernet 0
interface to the 4th interface (NIC 4) in ESXi server as listed in the following table.
eth1 GE1 2 1
eth2 GE2 3 2
eth3 GE3 4 3
eth4 GE4 5 5
eth5 GE5 6 6
If you choose the E1000 Adapter, by default, the ESXi adapters and Cisco ISE adapters
are mapped correctly.
• Ensure that you allocate the recommended amount of disk space on the VMware virtual machine. See
the Disk Space Requirements, on page 21 section for more information.
• If you have not created a VMware virtual machine file system (VMFS), you must create one to support
the Cisco ISE virtual appliance. The VMFS is set for each of the storage volumes configured on the
VMware host. For VMFS5, the 1-MB block size supports up to 2 TB virtual disk size.
Configure VMware Server Interfaces for the Cisco ISE Profiler Service
Configure VMware server interfaces to support the collection of Switch Port Analyzer (SPAN) or mirrored
traffic to a dedicated probe interface for the Cisco ISE Profiler Service.
Step 1 Choose Configuration > Networking > Properties > VMNetwork (the name of your VMware server
instance)VMswitch0 (one of your VMware ESXi server interfaces) Properties Security.
Step 2 In the Policy Exceptions pane on the Security tab, check the Promiscuous Mode check box.
Step 3 In the Promiscuous Mode drop-down list, choose Accept and click OK.
Repeat the same steps on the other VMware ESXi server interface used for profiler data collection of SPAN or mirrored
traffic.
Step 1 Power down the particular VMware server (for example ISE-120).
Step 2 Right-click the VMware server and choose Edit.
Step 3 Click Add on the Hardware tab.
Step 4 Choose Serial Port and click Next.
Step 5 In the Serial Port Output area, click the Use physical serial port on the host or the Connect via Network radio button
and click Next.
• If you choose the Connect via Network option, you must open the firewall ports over the ESXi server.
• If you select the Use physical serial port on the host, choose the port. You may choose one of the following two
options:
◦/dev/ttyS0 (In the DOS or Windows operating system, this will appear as COM1).
◦/dev/ttyS1 (In the DOS or Windows operating system, this will appear as COM2).
Step 14 Uncheck the Support clustering features such as Fault Tolerance check box.
Step 15 Choose the advanced options, and click Next.
Step 16 Verify the configuration details, such as Name, Guest OS, CPUs, Memory, and Disk Size of the newly created VMware
system. You must see the following values:
• Guest OS—Red Hat Enterprise Linux 7
• CPUs—6
• Memory—16 GB or 16384 MB
• Disk Size—200 GB to 2 TB based on the recommendations for VMware disk space
For the Cisco ISE installation to be successful on a virtual machine, ensure that you adhere to the recommendations
given in this document.
What to Do Next
To activate the newly created VMware system, right-click VM in the left pane of your VMware client user
interface and choose Power > Power On.
Step 1 From the VSphere client, right click the VM and choose Edit Settings.
Step 2 Click the Options tab.
Step 3 Choose Advanced > Boot Options.
Step 4 From the Power on Boot Delay area, select the time in milliseconds to delay the boot operation.
Step 5 Check the check box in the Force BIOS Setup area to enter into the BIOS setup screen when the VM boots the next
time.
Step 6 Click OK to save your changes.
• Download the Cisco ISE software from the Cisco Software Download Site at http://www.cisco.com/en/
US/products/ps11640/index.html and burn it on a DVD. You will be required to provide your Cisco.com
credentials.
Verify VMWare Tools Installation Using the Summary Tab in the vSphere Client
Go to the Summary tab of the specified VMware host in the vShpere Client. The value in the VMware Tools
field should be OK.
You can also verify if the VMware tools are installed using the show inventory command. This command
lists the NIC driver information. On a virtual machine with VMware tools installed, VMware Virtual Ethernet
driver will be listed in the Driver Descr field.
vm36/admin# show inventory
NAME: "ISE-VM-K9 chassis", DESCR: "ISE-VM-K9 chassis"
PID: ISE-VM-K9, VID: V01 , SN: 8JDCBLIDLJA
Total RAM Memory: 4016564 kB
CPU Core Count: 1
CPU 0: Model Info: Intel(R) Xeon(R) CPU E5504 @ 2.00GHz
Hard Disk Count(*): 1
Disk 0: Device Name: /dev/sda
Disk 0: Capacity: 64.40 GB
Disk 0: Geometry: 255 heads 63 sectors/track 7832 cylinders
NIC Count: 1
NIC 0: Device Name: eth0
NIC 0: HW Address: 00:0C:29:BA:C7:82
NIC 0: Driver Descr: VMware Virtual Ethernet driver
(*) Hard Disk Count may be Logical.
vm36/admin#
Note For cloning, you need VMware vCenter. Cloning must be done before you run the Setup program.
Step 1 Log in to the ESXi server as a user with administrative privileges (root user).
VMware vCenter is required to perform this step.
Step 2 Right-click the Cisco ISE VM you want to clone, and click Clone.
Step 3 Enter a name for the new machine that you are creating in the Name and Location dialog box and click Next.
This is not the hostname of the new Cisco ISE VM that you are creating, but a descriptive name for your reference.
Step 4 Select a Host or Cluster on which you want to run the new Cisco ISE VM and click Next.
Step 5 Select a datastore for the new Cisco ISE VM that you are creating and click Next.
This datastore could be the local datastore on the ESXi server or a remote storage. Ensure that the datastore has enough
disk space.
Step 6 Click the Same format as source radio button in the Disk Format dialog box and click Next.
This option copies the same format that is used in the Cisco ISE VM that you are cloning this new machine from.
Step 7 Click the Do not customize radio button in the Guest Customization dialog box and click Next.
Step 8 Click Finish.
What to Do Next
• Change the IP Address and Hostname of a Cloned Virtual Machine
Note For cloning, you need VMware vCenter. Cloning must be done before you run the Setup program.
Step 1 Log in to the ESXi server as a user with administrative privileges (root user).
VMware vCenter is required to perform this step.
Step 2 Right-click the Cisco ISE VM that you want to clone and choose Clone > Clone to Template.
Step 3 Enter a name for the template, choose a location to save the template in the Name and Location dialog box, and click
Next.
Step 4 Choose the ESXi host that you want to store the template on and click Next.
Step 5 Choose the datastore that you want to use to store the template and click Next.
Ensure that this datastore has the required amount of disk space.
Step 6 Click the Same format as source radio button in the Disk Format dialog box and click Next.
The Ready to Complete dialog box appears.
Step 1 Right-click the Cisco ISE VM template that you have created and choose Deploy Virtual Machine from this template.
Step 2 Enter a name for the new Cisco ISE node, choose a location for the node in the Name and Location dialog box, and click
Next.
Step 3 Choose the ESXi host where you want to store the new Cisco ISE node and click Next.
Step 4 Choose the datastore that you want to use for the new Cisco ISE node and click Next.
Ensure that this datastore has the required amount of disk space.
Step 5 Click the Same format as source radio button in the Disk Format dialog box and click Next.
Step 6 Click the Do not customize radio button in the Guest Customization dialog box.
The Ready to Complete dialog box appears.
Step 7 Check the Edit Virtual Hardware check box and click Continue.
The Virtual Machine Properties page appears.
Step 8 Choose Network adapter, uncheck the Connected and Connect at power on check boxes, and click OK.
Step 9 Click Finish.
You can now power on this Cisco ISE node, configure the IP address and hostname, and connect it to the network.
What to Do Next
• Change the IP Address and Hostname of a Cloned Virtual Machine
• Connect a Cloned Cisco Virtual Machine to the Network
• Ensure that the network adapter on the newly cloned Cisco ISE VM is not connected when you power
on the machine. Uncheck the Connected and Connect at power on check boxes. Otherwise, if this
node comes up, it will have the same IP address as the source machine from which it was cloned.
• Ensure that you have the IP address and hostname that you are going to configure for the newly cloned
VM as soon as you power on the machine. This IP address and hostname entry should be in the DNS
server. You cannot use "localhost" as the hostname for a node.
• Ensure that you have certificates for the Cisco ISE nodes based on the new IP address or hostname.
Procedure
Step 1 Right-click the newly cloned Cisco ISE VM and choose Power > Power On.
Step 2 Select the newly cloned Cisco ISE VM and click the Console tab.
Step 3 Enter the following commands on the Cisco ISE CLI:
configure terminal
hostname hostname
The hostname is the new hostname that you are going to configure. The Cisco ISE services are restarted.
Step 1 Right-click the newly cloned Cisco ISE virtual machine (VM) and click Edit Settings.
Step 2 Click Network adapter in the Virtual Machine Properties dialog box.
Step 3 In the Device Status area, check the Connected and Connect at power on check boxes.
Step 4 Click OK.
On Demand Virtual Machine Performance Check Using the Show Tech Support
Command
You can run the show tech-support command from the CLI to check the VM performance at any point of
time. The output of this command will be similar to the following:
ise-vm123/admin# show tech | begin "disk IO perf"
Measuring disk IO performance
*****************************************
Average I/O bandwidth writing to disk device: 48 MB/second
Average I/O bandwidth reading from disk device: 193 MB/second
WARNING: VM I/O PERFORMANCE TESTS FAILED!
WARNING: The bandwidth writing to disk must be at least 50 MB/second,
WARNING: and bandwidth reading from disk must be at least 300 MB/second.
WARNING: This VM should not be used for production use until disk
WARNING: performance issue is addressed.
Disk I/O bandwidth filesystem test, writing 300 MB to /opt:
314572800 bytes (315 MB) copied, 7.81502 s, 40.3 MB/s
Disk I/O bandwidth filesystem read test, reading 300 MB from /opt:
314572800 bytes (315 MB) copied, 0.416897 s, 755 MB/s
Virtual Machine Resource Check from the Cisco ISE Boot Menu
You can check for virtual machine resources independent of Cisco ISE installation from the boot menu.
The CLI transcript appears as follows:
Linux KVM
KVM Virtualization Check
KVM virtualization requires virtualization support from the host processor; Intel VT-x for Intel processors
and AMD-V for AMD processors. Open a terminal window on the host and enter the cat /proc/cpuinfo
command. You must see either the vmx or the svm flag.
• For Intel VT-x:
# cat /proc/cpuinfo
flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush
dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx
pdpe1gb rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc
aperfmperf eagerfpu pni pclmulqdq dtes64 monitor
ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm pcid dca sse4_1 sse4_2 x2apic popcnt
tsc_deadline_timer aes xsave avx lahf_lm arat epb xsaveopt
pln pts dtherm tpr_shadow vnmi flexpriority ept vpid
• For AMD-V:
# cat /proc/cpuinfo
flags: fpu tsc msr pae mce cx8 apic mtrr mca cmov pat pse36 clflush mmx fxsr sse sse2
ht syscall nx mmxext fxsr_opt rdtscp lm 3dnowext 3dnow
pni cx16 lahf_lm cmp_legacy svm cr8_legacy
Step 2 Click Local install media (ISO media or CDROM), and then click Forward.
Step 3 Click the Use ISO image radio button, click Browse, and select the ISO image from your local system.
a) Uncheck the Automatically detect operating system based on install media check box, choose Linux as the OS
type, Red Hat Enterprise Linux 7.0 as the Version, and click Forward.
Step 4 Choose the RAM and CPU settings and click Forward.
Step 5 Check the Enable storage for this virtual machine check box and choose the storage settings.
If you are using the CLI to create a new VM, be sure to include the following setting:
<rng model='virtio'
<backend model='random'>/dev/random</backend>
<address type='pci' domain='0x0000' bus='0x00' slot='0x08' function='0x0'/>
</rng>
c) Click Finish.
Step 8 In the Virtual Machine screen, choose the disk device and under Advanced and Performance Options, choose the following
options, and click Apply.
Field Value
Disk bus VirtIO
IO mode native
Microsoft Hyper-V
Create a Cisco ISE Virtual Machine on Hyper-V
This section describes how to create a new virtual machine, map the ISO image from the local disk to the
virtual CD/DVD drive, edit the CPU settings, and install Cisco ISE on Hyper-V.
Note We recommend that you use the Cisco ISE user interface to periodically reset your administrator login
password.
Caution For security reasons, we recommend that you log out when you complete your administrative session. If
you do not log out, the Cisco ISE web-based web interface logs you out after 30 minutes of inactivity,
and does not save any unsubmitted configuration data.
If you are using Internet Explorer 10.x, enable TLS 1.1 and TLS 1.2, and disable SSL 3.0 and TLS 1.0
(Internet Options > Advanced).
Step 1 After the Cisco ISE appliance reboot has completed, launch one of the supported web browsers.
Step 2 In the Address field, enter the IP address (or hostname) of the Cisco ISE appliance by using the following format and
press Enter.
Step 2 Specify and confirm a new password that is different from the previous two passwords that were used for this administrator
ID:
Note A CLI-admin user and a web-based admin user credentials are different in Cisco ISE.
Step 1 After the Cisco ISE appliance reboot has completed, launch one of the supported web browsers.
Step 2 In the Address field, enter the IP address (or host name) of the Cisco ISE appliance using the following format and
press Enter.
Step 3 In the Cisco ISE Login page, enter the username and password that you have defined during setup and click Login.
For example, entering https://10.10.10.10/admin/ displays the Cisco ISE Login page.
Note For first-time web-based access to Cisco ISE system, the administrator username and password is the same as
the CLI-based access that you configured during setup.
Step 4 Use the Cisco ISE dashboard to verify that the appliance is working correctly.
What to Do Next
By using the Cisco ISE web-based user interface menus and options, you can configure the Cisco ISE system
to suit your needs. For details on configuring Cisco ISE, see Cisco Identity Services Engine Administrator
Guide.
Step 1 After the Cisco ISE appliance reboot has completed, launch a supported product, such as PuTTY, for establishing a
Secure Shell (SSH) connection to a Cisco ISE appliance.
Step 2 In the Host Name (or IP Address) field, enter the hostname (or the IP address in dotted decimal format of the Cisco ISE
appliance) and click Open.
Step 3 At the login prompt, enter the CLI-admin username (admin is the default) that you configured during setup and press Enter.
Step 4 At the password prompt, enter the CLI-admin password that you configured during setup (this is user-defined and there
is no default) and press Enter.
Step 5 At the system prompt, enter show application version ise and press Enter.
Note The Version field lists the currently installed version of Cisco ISE software.
The console output appears as shown below:
Step 6 To check the status of the Cisco ISE processes, enter show application status ise and press Enter.
The console output appears as shown below:
ise-server/admin# show application status ise
Install Licenses See the Cisco ISE Ordering Guide for more
information. See the Administration Guide for
information on how to Register Licenses.
Install Certificates See the Manage Certificates chapter of the Cisco ISE
Administration Guide for more details.
Create Repository for Backups See the Create Repositories section of the Cisco ISE
Administration Guide for more details.
Configure Backup Schedules See the Schedule a Backup section of the Cisco ISE
Administration Guide for more details.
Deploy Cisco ISE personas See the Set Up Cisco ISE in a Distributed
Environment chapter of the Cisco ISE Administration
Guide.
When two interfaces are bonded, one of the interfaces becomes the primary interface and the other becomes
the backup interface. When two interfaces are bonded, all traffic normally flows through the primary interface.
If the primary interface fails for some reason, the backup interface takes over and handles all the traffic. The
bond takes the IP address and MAC address of the primary interface.
When you configure the NIC bonding feature, Cisco ISE pairs fixed physical NICs to form bonded NICs.
The following table outlines which NICs can be bonded together to form a bonded interface.
Cisco ISE Physical NIC Linux Physical NIC Name Role in Bonded NIC Bonded NIC Name
Name
Gigabit Ethernet 0 Eth0 Primary Bond 0
Supported Platforms
The NIC bonding feature is supported on all supported platforms and node personas. The supported platforms
include:
• SNS-3400 series appliances - Bond 0 and 1 (Cisco ISE 3400 series appliances support up to 4 NICs)
• SNS-3500 series appliances - Bond 0, 1, and 2
• VMware virtual machines - Bond 0, 1, and 2 (if six NICs are available to the virtual machine)
• Linux KVM nodes - Bond 0, 1, and 2 (if six NICs are available to the virtual machine)
• You can choose to create only one bond (bond 0) and allow the rest of the interfaces to remain as is. In
this case, bond 0 acts as the management interface and runtime interface, and the rest of the interfaces
act as runtime interfaces.
• You can change the IP address of the primary interface in a bond. The new IP address is assigned to the
bonded interface because it assumes the IP address of the primary interface.
• When you remove the bond between two interfaces, the IP address assigned to the bonded interface is
assigned back to the primary interface.
• If you want to configure the NIC bonding feature on a Cisco ISE node that is part of a deployment, you
must deregister the node from the deployment, configure NIC bonding, and then register the node back
to the deployment.
• If a physical interface that acts as a primary interface in a bond (Eth0, Eth2, or Eth4 interface) has static
route configured, the static routes are automatically updated to operate on the bonded interface instead
of the physical interface.
!
interface GigabitEthernet 0
ipv6 address autoconfig
ipv6 enable
backup interface GigabitEthernet 1
ip address 192.168.118.214 255.255.255.0
!
In the output above, "backup interface GigabitEthernet 1" indicates that NIC bonding is configured on Gigabit
Ethernet 0, with Gigabit Ethernet 0 being the primary interface and Gigabit Ethernet 1 being the backup
interface. Also, the ADE-OS configuration does not display an IP address on the backup interface in the
running config, even though the primary and backup interfaces effectively have the same IP address.
You can also run the show interfaces command to see the bonded interfaces.
GigabitEthernet 0
flags=6211<UP,BROADCAST,RUNNING,SLAVE,MULTICAST> mtu 1500
ether 88:5a:92:88:4a:ea txqueuelen 1000 (Ethernet)
RX packets 1726027 bytes 307336369 (293.0 MiB)
RX errors 0 dropped 844 overruns 0 frame 0
TX packets 1295620 bytes 1073397536 (1023.6 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device memory 0xfab00000-fabfffff
GigabitEthernet 1
flags=6147<UP,BROADCAST,SLAVE,MULTICAST> mtu 1500
ether 88:5a:92:88:4a:ea txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device memory 0xfaa00000-faafffff
ise/admin(config-GigabitEthernet)#
Step 3 Use the arrow keys to select System Utilities (Serial Console) if you use a local serial console port connection or select
System Utilities (Keyboard/Monitor) if you use a keyboard and video monitor connection to the appliance, and press
Enter.
The system displays the ISO utilities menu as shown below.
-------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------Admin Password
Recovery--------------------------------------------------------
-------------------------------------------------------------------------------------------------------------------------------------
This utility will reset the password for the specified ADE-OS administrator.
At most the first five administrators will be listed. To abort without
saving changes, enter [q] to Quit and return to the utilities menu.
-------------------------------------------------------------------------------------------------------------------------------------
[1]:admin
[2]:admin2
[3]:admin3
[4]:admin4
Password:
Verify password:
Step 2 Specify and confirm a new password that is different from the previous two passwords that were used for this administrator
ID:
Step 3 Use the arrow keys to select System Utilities (Serial Console), and press Enter.
The system displays the ISO utilities menu as shown below:
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond Ports on Other Ethernet
0 Interfaces (Gigbit Ethernet 1
through 5, or Bond 1 and 2)
Logging (Outbound)
• Syslog: UDP/20514, TCP/1468
• Secure Syslog: TCP/6514
• WMI : TCP/135
• ODBC:
Note The ODBC ports are configurable on the third-party
database server.
◦Microsoft SQL: TCP/1433
◦Sybase: TCP/2638
◦PortgreSQL: TCP/5432
◦Oracle: TCP/1512
• NTP: UDP/123
• DNS: UDP/53, TCP/53
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond Ports on Other Ethernet Interfaces
0 (Gigabit Ethernet 1 through 5, or
Bond 1 and Bond 2)
External Identity Sources and
Resources (Outbound) • Admin User Interface and Endpoint Authentications:
◦LDAP: TCP/389, 3268, UDP/389
◦SMB: TCP/445
◦KDC: TCP/88, UDP/88
◦KPASS: TCP/464
• WMI : TCP/135
• ODBC:
Note The ODBC ports are configurable on the third-party
database server.
◦Microsoft SQL: TCP/1433
◦Sybase: TCP/2638
◦PortgreSQL: TCP/5432
◦Oracle: TCP/1512
• NTP: UDP/123
• DNS: UDP/53, TCP/53
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond 0 Ports on Other Ethernet Interfaces,
or Bond 1 and Bond 2
Replication and —
Synchronization • HTTPS (SOAP): TCP/443
• Data Synchronization /
Replication (JGroups):
TCP/12001 (Global)
CA PKI TCP/9090 —
IPSec/ISAKMP UDP/500 —
TC-NAC TCP/443
Session
• RADIUS Authentication: UDP/1645, 1812
• RADIUS Accounting: UDP/1646, 1813
• RADIUS DTLS Authentication/Accounting: UDP/2083.
• RADIUS Change of Authorization (CoA) Send: UDP/1700
• RADIUS Change of Authorization (CoA) Listen/Relay: UDP/1700,
3799
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond 0 Ports on Other Ethernet Interfaces,
or Bond 1 and Bond 2
External Identity Sources and
Resources (Outbound) • Admin User Interface and Endpoint Authentications:
◦LDAP: TCP/389, 3268
◦SMB: TCP/445
◦KDC: TCP/88
◦KPASS: TCP/464
• WMI : TCP/135
• ODBC:
Note The ODBC ports are configurable on the third-party database
server.
◦Microsoft SQL: TCP/1433
◦Sybase: TCP/2638
◦PortgreSQL: TCP/5432
◦Oracle: TCP/1512
• NTP: UDP/123
• DNS: UDP/53, TCP/53
Note For external identity sources and services reachable only through
an interface other than Gigabit Ethernet 0, configure static routes
accordingly.
Passive ID (Inbound)
• TS Agent: tcp/9094
• AD Agent: tcp/9095
• Syslog: UDP/40514, TCP/11468
Web Portal Services: HTTPS (Interface must be enabled for service in Cisco ISE):
- Guest/Web Authentication • Blacklist Portal: TCP/8000-8999 (Default port is TCP/8444.)
- Guest Sponsor Portal • Guest Portal and Client Provisioning: TCP/8000-8999 (Default port
- My Devices Portal is TCP/8443.)
- Client Provisioning • Certificate Provisioning Portal: TCP/8000-8999 (Default port is
TCP/8443.)
- Certificate Provisioning
- BlackListing Portal • My Devices Portal: TCP/8000-8999 (Default port is TCP/8443.)
• Sponsor Portal: TCP/8000-8999 (Default port is TCP/8443.)
• SMTP Notification: TCP/25
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond 0 Ports on Other Ethernet Interfaces,
or Bond 1 and Bond 2
Posture
• Discovery (Client side): TCP/80 (HTTP), TCP/8905 (HTTPS)
- Discovery
Note By default, TCP/80 is redirected to TCP/8443. See Web
- Provisioning Portal Services: Guest Portal and Client Provisioning.
- Assessment/ Heartbeat Cisco ISE presents the Admin certificate for Posture and
Client Provisioning on TCP port 8905.
Cisco ISE presents the Portal certificate on TCP port 8443
(or the port that you have configured for portal use).
• Discovery (Policy Service Node side): TCP/8443, 8905 (HTTPS)
From Cisco ISE, Release 2.2 or later with AnyConnect, Release 4.4
or later, this port is configurable.
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond 0 Ports on Other Ethernet Interfaces,
or Bond 1 and Bond 2
Mobile Device Management
(MDM) API Integration • URL Redirection: See Web Portal Services: Guest Portal and Client
Provisioning
• API: Vendor specific
• Agent Install and Device Registration: Vendor specific
Profiling
• NetFlow: UDP/9996
Note This port is
configurable.
• DHCP: UDP/67
Note This port is
configurable.
• DHCP SPAN Probe: UDP/68
• HTTP: TCP/80, 8080
• DNS: UDP/53 (lookup)
Note This port is route table
dependent.
• SNMP Query: UDP/161
Note This port is route table
dependent.
• SNMP TRAP: UDP/162
Note This port is
configurable.
Cisco ISE Service Ports on Gigabit Ethernet 0 or Bond Ports on Other Ethernet Interfaces
0 (Gigabit Ethernet 1 through 5, or
Bond 1 and Bond 2)
Replication and Synchronization Data Synchronization and —
Replication (JGroups): TCP/12001
(Global)