Network Deployments in Cisco ISE: Architecture Overview
Network Deployments in Cisco ISE: Architecture Overview
This chapter describes several network deployment scenarios, provides information about how to deploy
the Cisco Identity Services Engine (ISE) SNS 3400 Series appliance and its related components, and
provides a pointer to the switch and Wireless LAN Controller configurations that are needed to support
Cisco ISE. This chapter contains the following sections:
• Architecture Overview, page 1-1
• Network Deployment Terminology, page 1-2
• Node Types and Personas in Distributed Deployments, page 1-3
• Standalone and Distributed Deployments, page 1-5
• Distributed Deployment Scenarios, page 1-5
• Deployment Size and Scaling Recommendations, page 1-10
• Inline Posture Planning Considerations, page 1-12
• Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions,
page 1-13
Architecture Overview
Cisco ISE architecture includes the following components:
• Nodes and persona types
– Cisco ISE node—A Cisco ISE node can assume any or all of the following personas:
Administration, Policy Service, or Monitoring
– Inline Posture node—A gatekeeping node that takes care of access policy enforcement
• Network resources
• Endpoints
Note Figure 1-1 shows Cisco ISE nodes and personas (Administration, Policy Service, and Monitoring), an
Inline Posture node, and a policy information point.
The policy information point represents the point at which external information is communicated to the
Policy Service persona. For example, external information could be a Lightweight Directory Access
Protocol (LDAP) attribute.
282088
Network Deployment Terminology
The following terms are commonly used when discussing Cisco ISE deployment scenarios:
• Service—A service is a specific feature that a persona provides such as network access, profiling,
posture, security group access, monitoring, and troubleshooting.
• Node—A node is an individual instance that runs the Cisco ISE software. Cisco ISE is available as
an appliance and as software that can be run on VMware.
• Node Type—A node can be one of two types: A Cisco ISE node or an Inline Posture node. The node
type and persona determine the type of functionality provided by a node.
• Persona—The persona or personas of a node determines the services provided by a node. A Cisco
ISE node can assume any or all of the following personas: Administration, Policy Service, and
Monitoring. The menu options that are available through the administrative user interface depend
on the role and personas that a node assumes.
• Role—The role of a node determines if it is a standalone, primary, or secondary node and applies
only to Administration and Monitoring nodes.
Related Topics
• Administration Node, page 1-3
• Policy Service Node, page 1-3
• Monitoring Node, page 1-3
• Inline Posture Node, page 1-4
Administration Node
A Cisco ISE node with the Administration persona allows you to perform all administrative operations
on Cisco ISE. It handles all system-related configurations that are related to functionality such as
authentication, authorization, and accounting. In a distributed deployment, you can have one or a
maximum of two nodes running the Administration persona. The Administration persona can take on the
standalone, primary, or secondary role.
Monitoring Node
A Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages
from all the Administration and Policy Service nodes in a network. This persona provides advanced
monitoring and troubleshooting tools that you can use to effectively manage a network and resources. A
node with this persona aggregates and correlates the data that it collects, and provides you with
meaningful reports. Cisco ISE allows you to have a maximum of two nodes with this persona, and they
can take on primary or secondary roles for high availability. Both the primary and secondary Monitoring
nodes collect log messages. In case the primary Monitoring node goes down, the secondary Monitoring
node automatically becomes the primary Monitoring node.
At least one node in your distributed setup should assume the Monitoring persona. We recommend that
you do not have the Monitoring and Policy Service personas enabled on the same Cisco ISE node. We
recommend that the Monitoring node be dedicated solely to monitoring for optimum performance.
Note You cannot access the web-based user interface of the Inline Posture nodes. You can configure them only
from the primary Administration node.
Before you can add an Inline Posture node to a deployment, you must configure a certificate for it and
register it with the primary Administration node. See Configuring Certificates for Inline Posture Nodes,
page E-34 for more information.
Note Concurrent endpoints represent the total number of supported users and devices. Concurrent endpoints
can be any combination of users, personal computers, laptops, IP phones, smart phones, gaming
consoles, printers, fax machines, or other types of network devices.
The primary node provides all the configuration, authentication, and policy capabilities that are required
for this network model, and the secondary Cisco ISE node functions in a backup role. The secondary
node supports the primary node and maintains a functioning network whenever connectivity is lost
between the primary node and network appliances, network resources, or RADIUS.
Centralized authentication, authorization, and accounting (AAA) operations between clients and the
primary Cisco ISE node are performed using the RADIUS protocol. Cisco ISE synchronizes or replicates
all of the content that resides on the primary Cisco ISE node with the secondary Cisco ISE node. Thus,
your secondary node is current with the state of your primary node. In a small network deployment, this
type of configuration model allows you to configure both your primary and secondary nodes on all
RADIUS clients by using this type of deployment or a similar approach.
282092
As the number of devices, network resources, users, and AAA clients increases in your network
environment, you should change your deployment configuration from the basic small model and use
more of a split or distributed deployment model, as shown in Figure 1-3.
Figure 1-2 shows the secondary Cisco ISE node acting as a Policy Service persona performing AAA
functions. The secondary Cisco ISE node could also be acting as a Monitoring or Administration
persona.
Split Deployments
In split Cisco ISE deployments, you continue to maintain primary and secondary nodes as described in
a small Cisco ISE deployment. However, the AAA load is split between the two Cisco ISE nodes to
optimize the AAA workflow. Each Cisco ISE appliance (primary or secondary) needs to be able to
handle the full workload if there are any problems with AAA connectivity. Neither the primary node nor
the secondary nodes handles all AAA requests during normal network operations because this workload
is distributed between the two nodes.
The ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system.
In addition, splitting the load provides better loading while the functional status of the secondary node
is maintained during the course of normal network operations.
In split Cisco ISE deployments, each node can perform its own specific operations, such as network
admission or device administration, and still perform all the AAA functions in the event of a failure. If
you have two Cisco ISE nodes that process authentication requests and collect accounting data from
AAA clients, we recommend that you set up one of the Cisco ISE nodes to act as a log collector.
Figure 1-3 shows the secondary Cisco ISE node in this role.
282093
In addition, the split Cisco ISE node deployment design provides an advantage because it also allows for
growth, as shown in Figure 1-4.
282094
Dispersed Network Deployments
Dispersed Cisco ISE network deployments are most useful for organizations that have a main campus
with regional, national, or satellite locations elsewhere. The main campus is where the primary network
resides, is connected to additional LANs, ranges in size from small to large, and supports appliances and
users in different geographical regions and locations.
Large remote sites can have their own AAA infrastructure (as shown in Figure 1-6) for optimal AAA
performance. A centralized management model helps maintain a consistent, synchronized AAA policy.
A centralized configuration model uses a primary Cisco ISE node with secondary Cisco ISE nodes. We
still recommend that you use a separate Monitoring persona on the Cisco ISE node, but each remote
location should retain its own unique network requirements.
282095
Before You Plan a Network with Several Remote Sites
• Verify if a central or external database is used, such as Microsoft Active Directory or Lightweight
Directory Access Protocol (LDAP). Each remote site should have a synchronized instance of the
external database that is available for Cisco ISE to access for optimizing AAA performance.
• The location of AAA clients is important. You should locate the Cisco ISE nodes as close as possible
to the AAA clients to reduce network latency effects and the potential for loss of access that is
caused by WAN failures.
• Cisco ISE has console access for some functions such as backup. Consider using a terminal at each
site, which allows for direct, secure console access that bypasses network access to each node.
• If small, remote sites are in close proximity and have reliable WAN connectivity to other sites,
consider using a Cisco ISE node as a backup for the local site to provide redundancy.
• Domain Name System (DNS) should be properly configured on all Cisco ISE nodes to ensure access
to the external databases.
Maximum Number
Deployment of Dedicated Policy Number of Active
Type Number of Nodes/Personas Appliance Platform Service Nodes Endpoints
Small Standalone or redundant (2) Cisco ISE 3300 Series 0 Maximum of 2,000
nodes with Administration, (3315, 3355, 3395) endpoints
Policy Service, and Cisco ISE 3415 0 Maximum of 5,000
Monitoring personas enabled. endpoints
Cisco ISE 3495 0 Maximum of 10,000
endpoints
Medium Administration and Cisco ISE-3355 or 5 Maximum of 5,000
Monitoring personas on single Cisco SNS 3415 endpoints
or redundant nodes. Maximum appliances for
of 2 Administration and Administration and
Monitoring nodes. Monitoring personas
Cisco ISE 3395 or 5 Maximum of 10,000
Cisco SNS 3495 endpoints
appliances for
Administration and
Monitoring personas
Large Dedicated Administration Cisco ISE 3395 40 Maximum of 100,000
node/nodes. Maximum of 2 appliances for endpoints
Administration nodes. Administration and
Monitoring personas
Dedicated Monitoring
node/nodes. Maximum of 2 Cisco SNS 3495 40 Maximum of 250,000
Monitoring nodes. appliances for endpoints
Administration and
Monitoring personas
Table 1-2 provides guidance on the type of appliance that you would need for a dedicated Policy Service
node based on the number of active endpoints the node services.
Table 1-3 provides the maximum throughput and the maximum number of endpoints that a single Inline
Posture node can support.
Attribute Performance
Maximum number of endpoints per physical 5,000 to 20,000 (gated by Policy Service nodes)
appliance
Maximum throughput per any physical 936 Mbps
appliance
Caution The untrusted interface on an Inline Posture node should be disconnected when an Inline Posture node
is being configured. If the trusted and untrusted interfaces are connected to the same VLAN during initial
configuration, and the Inline Posture node boots up after changing persona, multicast packet traffic gets
flooded out of the untrusted interface. This multicast event can potentially bring down devices that are
connected to the same subnet or VLAN. The Inline Posture node at this time is in the maintenance mode.
Caution Do not change the CLI password for Inline Posture node once it has been added to the deployment. If
the password is changed, when you access the Inline Posture node through the Administration node, a
Java exception error is displayed and the CLI gets locked. You need to recover the password by using
the installation DVD and rebooting the Inline Posture node. Or, you can set the password to the original
one.
If you need to change the password, then deregister the Inline Posture node from the deployment, modify
the password, and then add the node to the deployment with the new credentials.
Related Topics
Cisco Identity Services Engine User Guide, Release 1.2.
Related Topics
For more switch and wireless LAN controller configuration requirements, see Appendix C, “Switch and
Wireless LAN Controller Configuration Required to Support Cisco ISE Functions,” in Cisco Identity
Services Engine User Guide, Release 1.2.