You are on page 1of 45

Cisco ACS to ISE Migration Guide

Secure Access How to Guides Series

Author: Krishnan Thiruvengadam


Date: December 6th, 2016
SECURE ACCESS HOW-TO GUIDES

Table of Contents
Introduction 4
Background ................................................................................................................................................ 4
Planning your Migration ................................................................................................................................................. 5
ACS vs ISE Feature Comparison ............................................................................................................... 5
ACS vs ISE underlying differences ...................................................................................................... 5
Migration Paths .......................................................................................................................................... 6
Migration from 5.x to ACS 5.5/ 5.6/ 5.7/ 5. 8 ........................................................................................ 6
Migration from ACS 4.x to ACS 5.x ...................................................................................................... 6
Deployment considerations ........................................................................................................................ 7
ACS vs ISE deployment comparison ................................................................................................... 7
Simple 2 Node deployment ACS vs ISE..................................................................................... 7
ACS vs ISE Distributed deployment .............................................................................................. 8
What should my topology design for TACACS+ be? ................................................................................ 10
Device Administration model ............................................................................................................. 11
Deployment options ........................................................................................................................... 11
How to I scale my PSNs for the deployment? ......................................................................................... 14
Licensing: ................................................................................................................................................. 14
How do I size my ISE VMs/hardware for log retention?........................................................................... 15
Log retention and sizing MnT hard disks ........................................................................................... 15
What happens if my logging requirements exceeds the example? .................................................... 15
Prepare your Migration ................................................................................................................................................. 16
Configuration Maps and Exceptions ......................................................................................................... 16
Staging Environment for Migration ........................................................................................................... 20
Migration tool requirements ...................................................................................................................... 21
Installation and configuration of the Migration Tool. ........................................................................... 21
Supported/ Unsupported objects for migration ......................................................................................... 22
Preparation for Migration from Cisco Secure ACS, Release 5.5+ ............................................................ 22
Migration process (assisted with Migration Tool) ...................................................................................................... 24
Exporting configuration: ........................................................................................................................... 25
Policy Gap Analysis: ................................................................................................................................ 26
Importing configuration: ............................................................................................................................ 27
Verifying migration of access policies ...................................................................................................... 28
Cisco Systems 2016 Page 2
SECURE ACCESS HOW-TO GUIDES

Supporting chatty devices (TACACS+ single connect) ............................................................................ 31


APPENDIX A - ACS vs ISE deployment limits ........................................................ 33
APPENDIX B TACACS+ performance per ISE deployment................................. 35
Dedicated TACACS+ only deployment: ................................................................................................... 35
Max Concurrent TACACS+ Sessions/TPS by Deployment Model and Platform ................................ 35
Shared deployment (RADIUS + TACACS+):............................................................................................ 36
Max Concurrent RADIUS Sessions / TACACS+ TPS by Deployment Model and Platform ............... 36
APPENDIX C - ISE VM Sizing and Log retention.................................................... 37
TACACS+ guidance for size of syslogs: ............................................................................................ 37
TACACS+ transactions, logs and storage ................................................................................................ 37
Human Administrators and Scripted device administrator (Robot) model .......................................... 37
TACACS+ log retention (# of days):................................................................................................... 38
Scripted device admin model. ............................................................................................................ 38
Human admin device admin using sample number of sessions and commands shown below. ..... 38
RADIUS Log retention (# of days) ..................................................................................................... 39
APPENDIX D - Unsupported Rule Elements .......................................................... 40
APPENDIX E - ACS vs ISE Feature Comparison ................................................... 42

Cisco Systems 2016 Page 3


SECURE ACCESS HOW-TO GUIDES

Introduction
This document provides partners, Cisco field engineers and TMEs with a guide to plan ACS to ISE migration. This
document will also have procedure for migrating from Cisco Secure Access Control System (ACS) to Identity Services
Engine (ISE) software. ISE 2.1 supports migration from ACS 5.5/ 5.6/ 5.7/ 5.8. ISE 2.0 supports migration from ACS
5.5 or ACS 5.6 only. ACS from prior versions need to be upgraded to these versions before migrating over to ACS 2.x.
This document will have 3 broad sections for performing ACS to ISE migration.
Planning your migration
Prepare your migration
Migration process
Planning your migration section covers the feature comparison and underlying differences between ACS vs ISE
features. It provides options for topology design, device administration models to help scale PSNs. It provides step by
step guide to plan out your hardware capacity keeping the IT Audit needs for logs retention while migrating to new
ISE environment.
Prepare your Migration section includes best practices and steps for operational tasks to prepare for your migration.
This includes configuration maps that points to location of functional configuration in ACS and ISE calling in
exceptions during migration of ACS to ISE with ways to fix issues. It also discusses on creating a staging environment
for migration and preparing the tool/setup for migration.
Migration process is the core section that will cover the migration process and provides step by step procedure to
export configuration, fix policy gaps and import configuration to ISE iteratively till the migration is successful.

Background
Cisco Secure Access Control System (ACS) is a centralized identity and access policy solution that ties together an
enterprise's network access policy and identity strategy. Cisco Secure ACS operates as a RADIUS and TACACS+
server, combining user authentication, user and administrator device access control, and policy control in a centralized
identity networking solution.
Cisco ISE is a consolidated policy-based access control system that incorporates a superset of features available in
existing Cisco policy platforms. Cisco ISE performs the following functions:

Consolidates the network access functionality of ACS and ties together profiling and posture compliance.
On-boarding mobile device using secure BYOD (Bring your own device) flows.
Provides for comprehensive guest access management for Cisco ISE administrators.
Enforces endpoint compliance with comprehensive client provisioning.
Discovery, profiling, policy-based placement, and monitoring of endpoint devices on the network
Employs advanced enforcement capabilities with TrustSec using Secure Group Tags(SGTs)
Facilitates TACACS-enabled device administration through its Work Center. The Work Center menu
contains a work flow for TACACS+ configuration, which acts as a single start point for ISE administrators.

Cisco Systems 2016 Page 4


SECURE ACCESS HOW-TO GUIDES

Planning your Migration


This section will give you information on the basic, top of the mind questions related to migration that includes ISE vs
ACS feature comparison and underlying differences, migration paths to migrate from different versions of ACS,
Deployment differences between ACS to ISE. It will also help you design with the best topology for your environment
keeping in mind your current ACS deployment, device administration model and log retention needs of your IT
environment.

ACS vs ISE Feature Comparison


ISE 2.0 has a full TACACS+ protocol implementation and feature sets have only few differences from ACS. ISE 2.1
supports few ACS parity items including scalability. Full feature comparison of ACS 5.x and ISE 2.x can be found in
Appendix E.

For TACACS+, ISE 2.x has a Device Administration work center that provides a nice work flow for the
administrator to configure the device administration functionality. Migration tool can be downloaded directly from
work center to your Windows machine to perform migration between ACS and ISE. ISE provides robust reporting
capability of TACACS + authentication, authorization, accounting and command accounting.
Policy Sets in ISE vs Access Service + Service Selection Policy in ACS:
ISE 2.x has a rule based policy model like ACS 5.x versions. ISE 2.x supports policy sets. Each policy set that has an
entrance criteria for filtering incoming requests to apply to the corresponding Authentication and Authorization
policies.
In ACS, access services lets you create a service policy structure based on service type (RADIUS/ TACACS+/external
proxy) to create an Identity/Authorization policy. A Service Selection Policy provides a criteria to select the right
access services. An access service is selected based on conditions where single or multiple Service Selection Rules can
use the same service.
In ISE, you must enable Policy Sets on ISE UI from Administration System Settings Policy Settings to
make them available on the Policy menu for RADIUS.

ACS vs ISE underlying differences


Both ACS 5.5+ and ISE 2.x have functionally similar policy engines, however to ensure proper and error free
migration, there are several things to make note of in the underlying differences between ACS and ISE. The following
features do not relate specifically to the TACACS+ protocol but are used in deployment solutions.
1. Naming constraints: ISE 2.1 does not allow many special characters in its object entities. For example,
semicolon :, dot . depending on the type of entity. (Note: ISE 2.1 and ISE 2.0 patch 2 supports .). ISE typically
allows alpha numeric characters, _ and character in its objects. Some objects such as username and
authorization profile might support more characters. When ACS objects has special characters, the object needs to
be renamed for successful migration. This is discussed in depth in the next chapter.
2. Custom Conditions or Aliases: it is implemented in ISE 2.0 as regular inline custom conditions.
3. Policy Format/Alias: Tabular form of policy tables is absent, Hit counts are absent in ISE.
4. Unsupported rule elements: ISE does not support certain elements that are part of rule or condition. This
includes Unsupported attributes used by the policy, Unsupported AND/OR condition structure (mainly, once
complex conditions are configured) and Unsupported operators. For example, ACS supports a combination of
Cisco Systems 2016 Page 5
SECURE ACCESS HOW-TO GUIDES

AND OR in its compound condition used in an authorization policy. ISE supports either AND or in its authorization
conditions in an authorization policy. This may cause policies not to get migrated. ACS authorization policy needs
to be analyzed, split and additional policies should be added in view of this. For complete list of unsupported rule
elements please see Appendix D.

Note: It is not necessary to have special entity to make ISE 2.0 traverse different identity stores and fetch
information.

Migration Paths
ISE 2.0 supports migration from ACS 5.6 or ACS 5.5 versions only.
ISE 2.1 supports migration from ACS 5.5 / 5.6 / 5.7 and ACS 5.8.

Migration from 5.x to ACS 5.5/ 5.6/ 5.7/ 5. 8


If customers are in prior version of ACS 5.x, you have to upgrade to ACS 5.5 and ACS 5.6 first before migrating to
ISE 2.0. For migrating to ISE 2.1 your customer be in one of the last 4 releases of ACS (ACS 5.5/ 5.6/ 5.7 or 5.8).
If your customers interim goal is to upgrade to the latest ACS version due to the EOL considerations shown below then
upgrade to ACS 5.8.

Version End of Sale End of Life End of Support(Vulnerability fix)


5.8 Aug 30, 2017 Aug 30, 2018 Aug 31, 2020
5.7 May 2, 2016 May 2, 2017 May 31, 2019
5.6 Feb 16, 2016 Feb 15, 2017 February 28, 2019
5.5 April 15, 2015 April 14, 2016 April 30, 2018
4.2 October 27, 2011 October 26, 2012 October 31, 2014
3.3 August 29, 2006 August 29, 2007 August 28, 2009

Please follow the link for detailed procedure for migrating to ACS 5.8. Here are the upgrade paths for the ACS 5.x
versions. The versions that support migration to ISE is in black letters as shown below, rest in blue.

ACS 5.0ACS 5.2 ACS 5.4 ACS 5.6ACS 5.7 or ACS 5.8
ACS 5.1 ACS 5.3 ACS 5.5 ACS 5.6 or ACS 5.7 or ACS 5.8
ACS 5.2 ACS 5.4 ACS 5.6 ACS 5.7 or ACS 5.8
ACS 5.3 ACS 5.5 ACS 5.6 or ACS 5.7 or ACS 5.8
ACS 5.4 ACS 5.6 ACS 5.7 or ACS 5.8

Migration from ACS 4.x to ACS 5.x


ACS 4.x is an older version and cannot migrate to ISE directly. You must first upgrade from ACS 4.x to either ACS
5.5 or ACS 5.6 before migrating to ISE 2.0.
Cisco Systems 2016 Page 6
SECURE ACCESS HOW-TO GUIDES

ACS 5.x has a significantly different architecture than ACS 4.x. The migration might not carry over a lot of
configuration automatically. You might have to manually carry over configuration or use import/export tools. Here are
the links that speaks about what objects are supported/not supported during migration.
ACS 4.x to ACS 5.5
ACS 4.x to ACS 5.6
If you need to migrate from ACS 4.x, best approach is to start clean, install ISE and do manual configuration. You can
also use import/export tools that is supported in ISE for user identities/group identities, network devices, network
devices groups etc. You can also use REST API for populating configuration in ISE.
For customers to migrate to ACS 5.5 or ACS 5.6, they need to be in one of the ACS 4.x versions

ACS 4.1.1.24
ACS 4.1.4
ACS 4.2.0.124
ACS 4.2.1
Please look at the ACS 4.x to 5.x migration doc for more details on architecture and the choices for migration based
on your configuration sets.

Deployment considerations
ISE supports standalone deployment for smaller networks. For larger networks, ISE supports distributed deployment
to support services including network access, profiling, BYOD, Guest, Posture Compliance and TrustSec. ISE 2.x
supports TACACS+ service for providing device admin and audit control supporting 30k network device objects in
ISE 2.0 and 100k network devices in ISE 2.1in a single deployment.

ACS vs ISE deployment comparison


ISE deployment is slightly different from ACS that has either primary or secondary instances in three functional roles
Primary, Secondary or dedicated logging (Primary or Secondary). In ACS deployment, the primary and secondary are
both active and take part in providing AAA services in a network. AAA client traffic is primarily distributed by the
network devices across the ACS instances for balancing the load.
A Cisco ISE node is a dedicated appliance or Virtual Machine that supports different functional roles or personas such
as Administration, Policy Service, Monitoring, and PxGrid. Details about the functional roles are described here. These
functional roles can be combined or separated in dedicated nodes to optimize the distribution of endpoint connections
based on geography, based on the type of services used etc. Each of the personas can be part of a standalone or in a
distributed deployment.

Simple 2 Node deployment ACS vs ISE


In a simple 2 node ISE deployment with redundancy, ISE node can have an active/standby pair for Administration and
active/active Monitoring personas. Policy services persona is also part of the same node for standalone deployment.
Policy Service persona is the work horse of ISE providing network access, posture, BYOD, guest access, client

Cisco Systems 2016 Page 7


SECURE ACCESS HOW-TO GUIDES

provisioning, and profiling services. A two nodes deployment of ACS is shown below for comparison.

Figure 1. Basic 2 Node Setup ISE(Left), ACS (Right)

In ISE deployment, each persona can be a dedicated node with separate Administration, Monitoring and Policy
Services nodes or a combination as shown in Figure 2 below. Policy Services Node provides AAA services including
RADIUS services, TACACS services. Policy Services persona evaluates the policies and makes all the decisions in an
ISE deployment. You can have more than one node assuming this persona.

Figure 2. Single ISE node with one more Personas

ACS vs ISE Distributed deployment


ACS has a flatter deployment model for dispersing the ACS instances across the network. ACS deployment scalability
works by including additional backup servers based on the performance and logging requirement. ACS deployment
supports robust replication, full synchronization and incremental replication. As the number of ACS scales up for large
deployment, a dedicated syslog server is recommended with a total deployment supporting 22 ACS instances.

Cisco Systems 2016 Page 8


SECURE ACCESS HOW-TO GUIDES

ACS Database
Master download
Incremental
Replication

ACS ACS ACS


Secondary Secondary Secondary

Figure 3. ACS Distributed Deployment

Basic Distributed Deployment


In ISE, expanding the 2 node setup above to a basic distributed deployment, for a network that spans across
geographies, business units you can add up to 5 dedicated PSNs to the 2 node setup in Figure 4 as shown below. In
this topology, you have two PAN/ MnT nodes as primary and secondary in a redundant setup in the same datacenter.
This setup supports to a maximum of 20,000 endpoints across PSNs across different geographies. This is similar to a
small to medium sized deployment of with few instances of ACS as shown above in Figure 3 above.

Figure 4. Basic Distributed Deployment (ISE)

Note: In a distributed deployment, inter-ISE node delay (latency) should be lesser than or equal to 200ms for
versions ISE 2.0 and lower (300ms for ISE 2.1) for successful node communication and replication. For TACACS+
the latency requirement may be relaxed.

Cisco Systems 2016 Page 9


SECURE ACCESS HOW-TO GUIDES

Fully Distributed Deployment


In a fully distributed deployment, the administration and monitoring personas are separated in different nodes with 2
Admin nodes and 2 MnT nodes. In a large network, the primary, secondary admin and monitoring nodes are dedicated
nodes that can be in different datacenters as shown in Figure 5. below.

Figure 5. Fully Distributed Deployment

The full distributed topology requires datacenters to be connected with a high speed and low latency links. In this
setup, a maximum of 50 PSNs + 2 PAN + 2 PSNs are supported with a maximum of 500,000 endpoints across PSNs
with ISE 2.1(250k for ISE 2.0). Policy services nodes in the same location can be part of a node group called cluster
that will help with high availability in case of PSN failures. This can be useful for services such as profiling etc.
Appendix A provides comparison on the deployment limits of ACS vs ISE and can be used as a reference to
determine to scale your deployment.

What should my topology design for TACACS+ be?


ISE topology design needs to account for the scalability needs of the customer. There are a few differences between
ACS and ISE deployment scalability limits as in Appendix A .
When migrating ACS deployment to ISE, you need to comprehend the deployment considerations mentioned in the
section above for one or both Network Access (RADIUS) and Device Administration (TACACS+) services. Whether
you dedicate a separate node for TACACS+ is more of a security and operational policy decision. If separated in ACS
deployment today, then continue doing so if that model serves you well.
Tip: If you wish to combine both TACACS+ Device Administration and RADIUS into same deployment, then
dedicating nodes to TACACS+ service may be the best option for a large organization to prevent user services from
impacting device admin services and vice versa.
Cisco Systems 2016 Page 10
SECURE ACCESS HOW-TO GUIDES

Device Administration model


The main question here is whether RADIUS and Device Admin (TACACS+) should co-exist in the same node or as
independent nodes. Here is some general guidance that will help you answer the question:

For programmatic device admin model, recommend dedicated PSN nodes for Device Admin service.
For human device admin model where individual admin users manually login and manage network
devices, consider the following example:
20 Device admins concurrent sessions @ 1 command/s = 40 TPS (command authorization +
accounting record)
In this scenario, it would be acceptable to run Device Admin service on PSNs running other core User
services.
If expect a much higher level of activity much higher number of concurrent admins or transactions
then consider dedicating service.
Note: Organizational requirements and security policies such as separation of device admin and user
access control may dictate the need for dedicated PSN nodes for Device Admin function, or even an
isolated ISE deployment to separate RADIUS and TACACS+ control.

Deployment options
There are 3 ways you can deploy TACACS+/ RADIUS services with ISE simple or distributed deployment. These are
dedicated deployment, dedicated PSNs and Integrated deployment as described below. Each has its own pros and cons
and use cases.
Dedicated deployment is where you have separate deployments for RADIUS and TACACS+. This includes a
separate Administration Node (PAN) for managing policies, users/groups, network devices etc., a separate Monitoring
Node (MnT) for managing TACACS+ logs and dedicated Policy Services Node for supporting TACACS+ or RADIUS
service.
Dedicated PSNs in the deployment means that the Administration Node and Monitoring Node are shared for
managing policies, policy elements, logging and other configuration for both TACACS+ and RADIUS. However you
will still have a dedicated PSNs for addressing incoming TACACS+ or RADIUS requests and they are not shared.
Finally the Integrated deployment where all the node types (Administration Node, Monitoring Node, and Policy
Services Node) are shared between both RADIUS and TACACS+ services and it comes one integrated deployment for
your entire network.
The illustration below will give further details on each of the above options:

Cisco Systems 2016 Page 11


SECURE ACCESS HOW-TO GUIDES

Dedicated Architecture: Seperate Admin(PAN), Monitoring(MnT)


and policy services node(PSN) for TACACS+ and
Deployment RADIUS deployment.
Pros: RADIUS: PAN / MnT
Complete separation of policy
& operations for Device
Administration vs. Network
Access. PSN PSN PSN

TACACS+
Cons: PAN/ MnT
Separate ISE deployments to
maintain.
Cost of additional PAN and PSN PSN PSN
MNT nodes for the second
deployment.
Use case: For large deployments, where IT is managed by different
groups. Provides Total ownership.
For companies where ACS deployments are seperate for TACACS+ and
RADIUS for a reason.
Where seperation of Network access and Device admin users are
critical due to high user authentications for network access, high
profile users or IT policy requirements.
For Device administration model using scripts extensively
generating large amounts of logs for IT Audit.

Cisco Systems 2016 Page 12


SECURE ACCESS HOW-TO GUIDES

Dedicated PSNs Architecture: Shared Admin(PAN) and Monitoring


Node(MnT). Seperate Policy Services Node (PSN) for
Pros: TACACS+ and RADIUS.
Centralized policy,
monitoring for all AAA PAN / MnT

Scale Device Administration PSN

independently from Network


Access as needed
PSN PSN
Cons: PSN

Per-PSN utilization may be


low for a dedicated function.
May need additional PSNs for Use case: For big/medium sized companies where device
distributed coverage. administration and network access managed by same group.
For Device admin model using both scripts and human admin
users.
Where seperation of Network access and Device admin users are
essential.

Integrated Architecture: Shared Policy services node(PSN),


admin(PAN) and Monitoring node (MnT) for
Pros: TACACS+ and RADIUS
Centralized policy & monitoring for all
AAA needs. PAN / MnT

Same configuration for all PSNs.


Scale all AAA needs incrementally by
adding a PSN when or where needed.
PSN PSN
Cons: PSN

Potential need for cross-department


administrative access depending on
the organization.
Use case: For medium/small sized companies where device
Load from Network Access may impact administration and network access managed by same group.
Device Administration services and For Device admin model using only human admin users.
vice versa.
Where seperation of Network access and Device admin users
are not critical.

Cisco Systems 2016 Page 13


SECURE ACCESS HOW-TO GUIDES

To plan and run your ACS to ISE migration, you need to perform several steps. The document will guide you through
these steps necessary based on the type of customer, deployment needs etc.
Step 1 Choose the deployment model that fits your need based on the information in the section above.
Step 2 Choose the type of deployment, 2 Node Dedicated vs Simple or fully distributed deployment based on the
Deployment considerations

How to I scale my PSNs for the deployment?


Once a suitable deployment method is chosen,
Step 3 For TACACS+ only, to determine the number of PSNs for scripted device administration model as
discussed above, you can replace each ACS server with an ISE PSN node. This is a simple, fool proof
approach.
Step 4 For are combination of RADIUS/ TACACS+ deployment, you can use the table in Appendix C:
TACACS+ transactions, logs and storage , select the right Device Administration model to determine the
transactions per second (TPS) for Authentication, session authorization, accounting (or) Command
accounting only (or) for the whole TACACS+ transactions in your environment. Please pay attention to the
peak TPS based on the model. Then refer Appendix B to compare your calculations to choose number of
PSNs needed as well as the hardware needed for the PSNs. Please remember to scale PSNs considering
redundancy, location/geography and other factors as outlined in in ACS vs ISE Distributed deployment
section above.
Tip: Please pay attention to TACACS+ performance in Appendix B for dedicated and shared deployments
which will be the key to determine the number of PSNs. Remember that all other transactions happens
once during the TACACS + session except for command authorization and accounting.
Step 5 When determining number of PSNs for a RADIUS deployment, please use Maximum Concurrent
Endpoints as the main guideline as discussed in Appendix B: Shared deployment (RADIUS +
TACACS+):

Licensing:
When migrating from ACS deployment using a 35xx appliance/ legacy appliance or VM, use the ISE 2.0 ordering
guide for information about licensing. Go to Migration appliance ordering information section for your specific
needs.
TACACS+ functionality requires a perpetual license for the entire ISE deployment and does not have a migration
license. You also need for a minimum number of Base license e.g.: Base license for 100 endpoints to access the UI
functionality of TACACS+ and to turn on TACACS+ service.
To expand ISE deployment for more than TACACS+, please use the ordering guide mentioned above as reference.
Please take a look at the Cisco ISE migration Licenses and the License consumption section in the ordering guide
for more information.

Cisco Systems 2016 Page 14


SECURE ACCESS HOW-TO GUIDES

How do I size my ISE VMs/hardware for log retention?


Log size becomes an important factor to consider while designing the hardware and VM Hard disk sizing for the ISE
MnT servers. This is especially for large enterprises where logging requirements might vary in your environment
based on IT and audit policies of your network.
In ISE, monitoring persona (MnT) is responsible for collecting logs, generating reports and for troubleshooting ISE
deployments. Based on the logging needs of an enterprise you can choose remote syslog servers for log storage.
For TACACS+ logging requirements, there are two use cases to consider based on device administration performed
either by a human administrator or by an automated script/ robot. Logs are collected in the MnT and purged based on
the log retention needs and hard disk size. Here is a sample log size calculation per day for these use cases:
Use case 1: Human administrator managing devices: For e.g.: 50 Administrators opening 50 sessions per day with
10 commands/session; Log size per day = 50 * 50 * (5k +10*3k) = 87500KB = 85.4MB per day.
Use case 2: Managing devices using scripted device administration: An automated script to run against 30K
network devices For e.g.: @ 4 times per day with 5 commands per session; Log size per day = (5K +5 * 3K) * 30000 *
4 = 2400000KB ~ 2.3GB per day.

Log retention and sizing MnT hard disks


Log retention should be calculated for both TACACS+ and RADIUS separately.
Step 6 For TACACS+, start by calculating the logs generated by your network devices for TACACS+ based on
the device administration model in your environment. Please use the examples in the use cases mentioned
above as reference. Use Appendix C to determine the log size per day for TACACS+. For RADIUS, logs
are based on number of authentication.
Step 7 Now gather information on the log retention needs of your environment (based on your audit needs etc.).
Go back and refer to log retention tables in Appendix C and determine the hard disk size of MnT. This is
especially important when you are using an ISE virtual machine.

What happens if my logging requirements exceeds the example?


If amount of logs per day as in Use case 2 above exceeds 2.3GB also shown in Appendix C steps should be taken to
reduce the logs sent to MnT based on the following.
1. Revise and minimize duplicate incoming log traffic: To avoid duplication of entries in AAA logs are generated
by automated scripts (For the same user name and/or originated form the same IP address) use MnT collection
filters in ISE (From ISE UI browse to SystemLoggingCollection Filters for this.) to filter incoming logs from
scripts, pings or keep-alive to be masked out..
2. Consider separation of incoming traffic between ISE MnT and external 3 rd party Syslog collector: ISE
administrator can create as many remote Logging Targets (SystemLoggingRemote Logging Targets) as
necessary, to a generic Unix Syslog or to a third party SIEM software such as SPLUNK. After that each individual
logging category may be routed to the specific Logging Target. (From ISE UI, browser to
SystemLoggingLogging categories for this).

Cisco Systems 2016 Page 15


SECURE ACCESS HOW-TO GUIDES

Prepare your Migration


Step 8 Outdated, redundant or stale policy or rule cleanup: As part of migration effort, revise and clean
existing policy and rule set in ACS. Some of the policies might be inactive, obsolete and no longer
relevant. Same goes true for users and Network devices. Observing Hit Count on ACS can help verifying
this. Reset the Hit Count several months before migration. If Hit Count is equal to zero for a long time,
this policy is a good candidate to be marked as disabled, moved to the end of list or removed at all.
Consolidating and optimizing several policies into one is a good way to make configuration more
manageable, more scalable and less prone to mistakes.

Configuration Maps and Exceptions


Step 9 The tables below shows configuration map for ACS and ISE that includes location of configuration
objects, exceptions that are observed during migration and ways to fix/get around those exceptions. For
e.g.: As part of pre-migration, please clean up object names in ACS to make sure it does not have special
characters not supported by ISE. Please see the details in the table below
Note: When migrating server certificates, please make sure you create the certificates in advance based on
the number of servers including PAN, MnT and PSNs.
The following tables are organized like the flow in the ACS UI for easy readability.
Network Resources:
ACS 5 configuration ISE Configuration Exceptions and Fixes
Network Resources Network Work Centers Device Administration Naming constraints. Need to fix
Device Groups Network Device Groups. names during policy gap analysis.
(A valid NDG name can contain
Network Resources Network alphanumeric, Hyphen(-), IP range not supported in
Devices Underscore(_), period(.) and space ISE(convert the range into subnets if
characters) possible) 2. IP exclusions supported
Work Centers Device Administration by overlapping IPs.
Network Resources Network
Devices.
If you change the default name of
(A valid Network Device name can in ACS, it will not get migrated.
contain alphanumeric, Hyphen(-),
Underscore(_))
ISE 2.1 supports Network devices
name with . character.
Network Resources Default Administration Network ISE must have RADIUS
Network Device ResourcesDefault Network Device enabled(ISE 2.0 only). Fixed in ISE
2.1.
Network Resources External Work Centers Device Admin When Cisco Secure ACS is
Proxy Servers Network resourcesTACACS Proxy external proxy, a prefix
Servers TACACS_ or RADIUS_ is

Cisco Systems 2016 Page 16


SECURE ACCESS HOW-TO GUIDES

added to the name before moving it


Administration Network resources to the correct location in ISE
External Radius server
Network Resources OCSP - Not Supported
Services

Users and Identity Stores:


ACS 5 Element ISE Element Exceptions and Fixes

Users and Identity Stores Internal AdministrationIdentity Management Account disable policy,
Identity Stores Users IdentityUsers Password type not supported
Users and Identity Stores Identity AdministrationIdentity Management in ISE 2.0 (Supported in ISE
groups User Identity Groups User 2.1).
identity Groups. Disable password hashing for
(A valid User and User Identity group users if using ACS 5.7/5.8
name can contain alphanumeric and Naming constraints. Need to
~@# $&*_+.- characters.) fix names during policy gap
analysis.
Enable password option: Users and Enable Password option: (Workcenter Check the password policy
Identity Stores Internal Identity Device AdminIdentityUsers for defaults, password history,
Stores Users(create user) (Add Users) password Lifetime.
Users and Identity Stores Internal AdministrationIdentity Management Wild cards are not supported
Identity Stores Hosts IdentityEndpoints. in ISE.
(A valid MAC address consists of six
octets, separated by ':','.' or '-'. Valid
octets contain 0-9,a-f,or A-F only.)
User Identity Stores External Identity Administration Identity Description, RSA instance
Store ManagementExternal Identity Store file, Display RSA missing
secret will not be migrated.
RSA sdopts.rec file and
secondary information are not
migrated.
User Identity Stores Certificate AdministrationCertificates Migration not supported.
Authorities Certificate Management Trusted
Certificates
User Identity Stores Certificate Administration Identity Name Constraints. Fix name
Authentication profile ManagementExternal Identity mismatch in ACS.
StoreCertificate Authentication
Profile
(A valid name can contain
alphanumeric and underscore(_)
characters.)

Cisco Systems 2016 Page 17


SECURE ACCESS HOW-TO GUIDES

User and Identity Store Identity Administration Identity Management Additional Attribute retrieval
Store Sequence Identity Store Sequence not supported in ISE. See 1
for more details.

Policy Elements:
ACS 5 Element ISE Element Exceptions and Fixes

Policy Elements Authorization and PolicyPolicy Elements Results Unique name required. Name
Permissions Network Access Authorization profile Conflicts (shared namespace
Authorization Profiles in ISE)
Policy Elements Authorization and PolicyPolicy Elements Results Unique name required.
Permissions Named Permission Downloadable ACL
Objects Downloadable ACL
Policy Elements Device Work Centers Device Administration No CallBack verify, No
Administration Shell Profiles Policy Results TACACS Profiles hangup, CallBack line,
CallBack Rotary is not
supported in ISE.
Unique name required.
Recommend using a prefix for
Device admin Authorization
Results.
Policy Elements Device Work Centers Device Administration Unique name required.
AdministrationCommand Sets Policy Results TACACS
Command Sets

Access Policies:
ACS 5 Element ISE Element Exceptions and Fixes

Access policies Access Services with TACACS+: Work Center Device


external proxy + Service selection rule Admin Policy Sets + Proxy Sequence +
with Proxy Service Proxy server sequence.
RADIUS: Policy Policy sets
Authentication policy
Access policiesAccess Services Policy Policy Elements Results
Allowed protocols Authentication Allowed Protocols
Access policiesAccess Service Device Admin Policy Sets Policy model difference.
Service Selection rule Policy set criteria Group mapping not supported
in ISE. See 1 for more details.
Identity rule Authentication policy
ISE does not support rule
Authorization rule Authorization Policy condition that has different
Group mapping operators.

Cisco Systems 2016 Page 18


SECURE ACCESS HOW-TO GUIDES

See Appendix D for


information on supported rule
elements. Cleanup the
Authorization rule conditions
in ACS to eliminate
combination (AND and OR).
Policy Elements Max User Sessions - Not Supported in ISE 2.0 and
ISE 2.1.
Foot note:
1. Group mapping and additional attribute can be configured in ISE post migration by creating new condition
(advanced option) in the authorization policy inside Device Admin policy Set. To do that, please make sure to
add Microsoft Active Directory from Administration Identity Management External Identity sources. You
can add up to 50 domains in ISE. Go to groups tab and attributes tab to download groups and attributes from
AD (or external ID store) to be used in the conditions inside authorization policy.

Monitoring and Reporting:

ACS 5 Element ISE Element Exceptions and Fixes

Monitoring and Reports Launch OperationsRADIUS, Operations Migration not supported


Monitoring and Report viewer TACACS+, OperationsReports

System Administration:
ACS 5 Element ISE Element Exceptions and Fixes

System Administration Workcenter Device None.


Configuration Global System AdminSettings
Options TACACS+ Settings
System Administration Operations AdministrationSystemMaintenance Migration not supported
Software repositories, Repository
System Administration Operations Administration System
Distributed system information Deployment Deployment
System Administration Operations Administration Sytem Backup and Migration not supported
Scheduled Backups Restore
System Administration Administration System Admin Migration not supported
AdministratorsAccounts, Roles Access Administrators,
and Administrators settings Authentication, Settings
System Administration Administration System Migration not supported
ConfigurationLocal Certificates CertificatesCertificate
ManagementSystem Certificates

Cisco Systems 2016 Page 19


SECURE ACCESS HOW-TO GUIDES

System Administration Administration System Logging Migration not supported


ConfigurationLog Configuration
System Administration Policy Policy Elements Identity and host attributes
ConfigurationDictionariesIdentit Dictionaries Users that are of type date are not
y users, Hosts Policy Policy Elements supported in ISE.
Dictionaries SystemsEndpoints Identity Dictionary attribute
Maximum length, default
value, Mandatory fields, Add
policy condition and Policy
condition display name not
supported in ISE.
System Administration Policy Policy Elements Not migrated. Only RADIUS
ConfigurationDictionariesProtoc DictionariesSystemRADIUSR VSA not in ISE will be
ols RADIUS RADIUS IETF ADIUS IETF migrated.
System Administration
ConfigurationDictionariesProtoc Policy Policy Elements
ols RADIUS VSA DictionariesSystemRADIUS
RADIUS VSA

Step 10 If your configuration object is not in the list above, here is the complete list of data mapping of objects that
are supported for migration between ACS and ISE 2.0. Please get familiarized with this so as to understand
the gaps and results during and after the migration process.

Staging Environment for Migration


Step 11 Create separate instance of ACS server for staging the migration to perform tests in the lab and necessary
changes in the configuration. In this case all changes will be done in that staging environment and will not
affect production setup.
Note: Remember that when doing backup/restore of ACS, the restore process carries over system
certificates to the staging server.
Step 12 Install ISE server in standalone mode using the instruction here . The migration process will be successful
with a clean installation on a standalone ISE node with bootstrap configuration. It is recommended to take a
clean ISE configuration backup of the default configuration state in case the migration process is disrupted
during the import process.
It is highly recommended to use staging environment to test resulted configuration. If lab environment allows ISE 2.x
should be connected to external ID store such as LDAP or AD then test authentication/authorization request to see that
ISE 2.x performs basic functionality as expected. Please also download the AD/LDAP groups and attributes used in
your existing ACS configuration.

Cisco Systems 2016 Page 20


SECURE ACCESS HOW-TO GUIDES

Migration tool requirements


Migration tool is a separate tool available for download on each ISE web interface from the Device admin work center.
You can download the migTool.zip file in the following ways.

By entering the following URL on the browser address bar: https://<hostname-or-hostipaddress of ISE
>/admin/migTool.zip
Alternately, you can navigate to the Work Centers Device Administration Overview page, and
click the migration tool in the Prepare section to launch the migration tool.
This is aimed to assist with configuration migration from ACS 5.5+ to ISE 2.1. Migration tool is supported in both
Windows and Linux machines. For large deployment please make sure you have 2GB RAM and 1 GB hard disk to run
the migration. Migration Tool uses Java run-time executable (JRE7 and not below) and libraries and can be run on
supported Windows and Linux platform.

Installation and configuration of the Migration Tool.


Step 13 After downloading from ISE UI save it to a local folder on your Windows machine, migration tool need to
be unzipped into empty working folder where it will have its folder structure for binaries, logs and
configuration files.
Step 14 Edit the config.bat file to set the initial amount of memory allocated for the java Heap Sizes. (Set the initial
amount of memory allocated for the java Heap Sizes for the migration process in the config.bat file. The
attribute to set the heap size in config.bat is: _Xms = 64 and _Xmx = 1024 (The memory is 64 and 1024
megabytes, respectively).
Migration Tool establishes secure communication to ACS, for exporting configuration and to ISE for importing
configuration. For that purpose, migration tool uses system/local certificates (for self-signed certificates) or root CA
certificates (for CA signed certificates) that have to be exported from ACS 5 and from ISE 2.0.
Step 15 In ACS, the local certificate can be found in the UI when you go to System
AdministrationConfigurationLocal Server CertificatesLocal Certificates. From the list of
entries, the entry which has Protocol Management Interface, need to be exported.
Note: Only certificate (not private key) need to be exported.
Step 16 Browse ISE 2.0 UI and go to system certificate by going to
AdministrationSystemCertificatesSystem Certificates. Observe the entry that has usage admin.
This certificate need to be exported.
To run the migration tool please make sure that you use super admin credentials and do the following
Step 17 Copy the ISE and ACS trusted certificate on the Windows client machine running the tool. Click
migration.bat from the migTool folder to launch the migration process. Click Yes to display a list of
unsupported and partially supported objects. Click Close.
Step 18 Go to SettingsTrusted Certificates, click Add, choose the root certificate to add, the certificate will
appear in the list.
Tip: The root CA certificate of the ACS server certificate that got restored in the staging ACS server needs
to be added to the migration tool.

Cisco Systems 2016 Page 21


SECURE ACCESS HOW-TO GUIDES

Step 19 Enable the migration interface in ACS and ISE with the following commands from the CLI.

From ACS CLI, Enter acs config-web-interface migration enable

From ISE CLI, Enter application configure ise.


Enter 11 for Enable/Disable ACS Migration.
Enter Y.

Step 20 Migration tool uses DN host name (FQDN in ISE) to establish communication between itself and ACS or
ISE, hence hostnames of ACS and ISE machines need to be DNS resolvable.
Tip: Make sure to have a DNS entry for the hostnames for proper resolution. Remember to use the
hostname and not the IP address in the tool dialog box while importing/exporting. This hostname should
match the name in the server certificate.
Step 21 If DNS resolution does not work, create an entry in the host file on your Windows machine. Please make
sure the DN in the certificate matches the IP address and hostname entries in hosts file in your Windows
machine (location: C:\Windows\system32\drivers\etc).
Note: You might get an error message if any of the above are not complete. Please also make sure you have
ACS service running with a compatible license.
Warning: It is recommended to build dedicated temporary ACS machine for staging the migration. Please
do not use the production environment.

Supported/ Unsupported objects for migration


The migration tool will automatically migrate ACS 5 supported entities to the ISE 2.x. Here is a complete list of
objects supported, not supported and partially supported. Please take time to get familiar with this.
There are unsupported/ partially supported list on key areas that appears as a dialog box when you start the tool. You
can also find this when you click the Help menu from the tool. This does not cover logs, backup and other
management areas. For a more complete listing please use the link above.

Preparation for Migration from Cisco Secure ACS, Release 5.5+


Step 22 You must consider the following before you start migrating Cisco Secure ACS data to Cisco ISE:

Migrate Cisco Secure ACS, Release 5.5+ configuration data only when the Policy Set mode in Cisco ISE,
Release 2.0 is configured. Enable Policy set in ISE UI by browsing to
AdministrationSystemSettingsPolicy sets
Migrate on a fresh installation of Cisco ISE, Release 2.x.
Generate one policy set per an enabled rule in the Service Selection Policy (SSP) and order them
according to the order of the SSP rules.
We recommend that you do not change to Simple mode after a successful migration from Cisco Secure ACS. Because,
you might lose all the migrated policies in Cisco ISE. You cannot retrieve those migrated polices, but you can switch
to Policy Set mode from Simple mode.
Cisco Systems 2016 Page 22
SECURE ACCESS HOW-TO GUIDES

Note: The service that is the result of the Service Selection Policy default rule in ACS becomes the default policy set
in Cisco ISE, Release 2.0. For all the policy sets created in the migration process, the first matching policy set is the
matching type.
Step 23 It is important understand the differences between the Service selection policies in ACS and policy sets in
ISE. The policy set migration guidelines provides a list of considerations as part of pre-migration to help
migrate Access services and service selection rules from ACS to ISE.

Cisco Systems 2016 Page 23


SECURE ACCESS HOW-TO GUIDES

Migration process (assisted with Migration Tool)


Migration tool is the heart of automatic migration. Migration can also be done manually or using import/export
utilities. For simplicity, we discuss the automatic migration process in this document using migration tool. Here are
some tips how to use on the migration tool UI. A screen shot of the migration tool is shown below.

The Migrated objects will have main container such as Policy Elements etc. Please click on the
container to open it to view the objects migrated.
You can see that all the containers have a progress bar . The objects under the containers
have a status bar in green showing the status of the import or export.
The Count shows the number of object imported/exported.
The Warnings and Errors count will appear if there is a warning or error during the import and
export phase of the migration.
By clicking on the error/warning count you can open the corresponding report.
The Policy gap analysis report shows the gap analysis in the policies between ACS and ISE as
part of import/ export process.
The Import Reports and Export Reports button will open up the corresponding reports to
understand and analyze errors/warnings during the import and export phase.
The Settings tab is used for importing CA certificates and for default settings for migration. Please
do not change the default settings unless absolutely necessary.
Log console displays the activity log that includes tracks the tool process and issue warning/errors.
This is stored in migration.txt file under the migTool folder.

Migration is an iterative process, consisting 3 phases, exporting configuration, gap analysis and finally the import
process. The export process needs to be repeated since there may be exceptions and errors that will appear during
exporting. Corrective actions need to be taken based on the exceptions that appear on the reports.

Cisco Systems 2016 Page 24


SECURE ACCESS HOW-TO GUIDES

Exporting configuration:
Warning: You cannot use NAT between the migration machine and the ACS 5.x server.
Step 24 This is where administrator will need to perform object analysis and exporting of objects from ACS. Click
Export from ACS button to start the export.
Step 25 Type in the ACS host name, admin user name and password, click Connect.
Step 26 Observe the progress of exporting via progress bars per container and per individual objects. Time spent
for export process greatly depends on configuration size and amount of entities to be exported.
Note: Migration tool will export or import all the supported object once and lists the gaps, errors if an
object is not supported in ISE (or) if ISE already has the objects available (or) if the character set does not
support it etc. You cannot stop the migration tool in-between. However you can exit out of it and it should
start from where it stopped.
Step 27 To get more information about a warning or an error that occurred during the export process, click any
underlined numbers in the Warnings or Errors column on the Migrations tab. The Object Errors and
Warnings Details window displays the result of a warning or an error during export. It provides the object
group, the type, and the date and time of a warning or an error.
Step 28 Data export process may take long time depending the configuration. If you have a large number of
network devices it (for e.g.: 15k it will take up to 4-5hours). When the data export process has completed,
the Cisco Secure ACS to Cisco ISE Migration Tool window displays the status of export that Exporting
finished.
Note: It was observed that sometimes the progress bar across the objects shows complete but the export
process status does not change to Export finished. In such case, please open the export report to see the
status of the export at the bottom of the report to proceed.
Step 29 Open the export report by clicking on the Export report(s) button as shown in the screenshot above.
Export report will have information that will help do gap analysis.

Cisco Systems 2016 Page 25


SECURE ACCESS HOW-TO GUIDES

Policy Gap Analysis:


Step 30 Upon export completion, administrator should analyze results by reviewing Export Report, policy gap
report, fix listed errors in the ACS configuration and should re-run process ones again. When errors are
fixed, warnings and other issues are addressed and understood, administrator should perform export once
again and use the data for importing.
Step 31 Important: Please make a copy of these reports every time you run the tool for comparison. The policy
gap report gets overwritten when you run the import on the next step.
Note: Log files are stored in the reports sub-folder where migration tool running. This can be reviewed,
archived and shared for auditing purposes. These are the files available to review export_report.txt,
import_report.txt, policy_gap_report.txt. Please rename the policy_gap_report.txt file since this will be
overwritten during the import process.
Here are some sample output from the export report showing name constraints on objects.

==========================================
Object Type: Users
==========================================
> 2016.01.27 18:24:56'561 : 'america\sample.adm' will not be exported because the name contains
special characters or space that are not supported by ISE.
The valid name can contain alphanumeric and ~@# $&*_+.- characters

==========================================
Object Type: Certificate Authentication Profile
==========================================
> 2016.01.27 18:24:57'996 : 'CN Username' will not be exported because the name contains space or
special characters that are not supported by ISE.
The valid name can contain alphanumeric and underscore(_)

Object Type: Network Devices


==========================================
> 2016.01.27 18:30:03'024 : 'sample.device.us' will not be exported because the name contains
special characters that are not supported by ISE.
The valid name can contain alphanumeric, hyphen(-) and underscore(_)

=========================================
Object Type: Authorization Profiles
==========================================
> 2016.01.27 18:30:49'605 : 'DenyAccess': will not be exported because it is predefined in ISE.
> 2016.01.27 18:30:49'621 : 'Deny Access' will not be exported because the name contains special
characters that are not supported by ISE.
The valid name can contain alphanumeric, space and !@#$%&()-_+{};'<>.?/~ characters

Note: During the policy export, the migration tool will provide this information in the policy gap analysis
report. Object Names that are not compatible with ISE 2.0/ISE 2.1 will not be processed. Hence import
policies and rules may not be possible, partial configurations are not allowed.
Step 32 For parity gaps observed per configuration set between ACS and ISE. Reconciliation is possible for some
of these, for others alternate method needs to be chosen. Please see the tables from Step 9 for details to fix
the parity gaps. Future versions of ISE is expected to close the gap. Here is the sample behavior for
Network Devices/ Network Device Groups below during reconciliation.

Cisco Systems 2016 Page 26


SECURE ACCESS HOW-TO GUIDES

Network Devices/ Network Device Groups:


Reconciliation flow for Migration Tool
If Device does not exist in ISE (Defined by no overlap of IP configuration)
o Then it will be added during migration.
If Device does exist (IP/subnet exactly matches) and (name exactly matches)
o Then migration will updates detail to add TACACS+ elements
If only approximate match. (name matches exactly, or IP/subnet matches exactly, but not both)
o Then migration tool reports error.

Warning: The migration tool migrates all the policies when they are compatible. However, it will not migrate any of
the policies if one or more are incompatible. Please make sure to fix all the access policies for error by analyzing the
policy gap report.
Step 33 Once the errors/warnings are reviewed and corrected start the export process once again. Go back to the
Exporting configuration: section above. Start the export process again. Go through the Policy gap analysis and
make sure that it is clean after looking at all exceptions and go the next step.

Importing configuration:

Step 34 Administrator should connect to target ISE 2.x using FQDN and should start import configuration into ISE.
Click on Import to ISE button from the screenshot above to start the import. During importing phase
tool will create a report and corresponding file. Generally, if ACS configuration is clean, import process
does not produce any errors.
Step 35 In the LDAP Identity Store drop-down list, select the identity store to which you want to add attributes,
and click Add Attribute. These attributes will be imported from the ID store during migration.
Alternatively, you can Cancel it to skip adding LDAP attribute. Skip the next step and go the following
step to proceed further.
Step 36 Enter a name in the Attribute Name field, choose an attribute type from the Attribute Type drop-down list,
enter a value in the Default Value field, and click Save & Exit.
Step 37 When you have finished adding attributes, click Import to ISE, enter the Cisco ISE Fully Qualified
Domain Name (FQDN), username, and password in the ISE Credentials window and click Connect. The
migration tool checks that the Hostname/FQDN matches the CN in the SSL certificate. You will see an
error if does not match. Please make sure your DNS hostname of ISE is the same as CN of the certificate
being used.
Step 38 Data import process will take time to complete depending on the configuration. When the data import
process has completed, the Cisco Secure ACS to Cisco ISE Migration Tool window displays the status of
import that Importing finished.
Step 39 To view a complete report on the imported data, click Import Report(s).
Step 40 To get more information about a warning or an error that occurred during the import process, click any
underlined numbers in the Warnings or Errors column on the Migrations tab.
Step 41 To analyze the policy gap between Cisco Secure ACS and Cisco ISE, click Policy Gap Analysis Report.
Step 42 At any time, click View Log Console to display a real-time view of the export or import operations.
Warning: Currently migration tool that are part of ISE 2.0/ ISE 2.1 does not support merging configuration. This may
change in the future. It is highly recommended to start import on clean ISE configuration.

Cisco Systems 2016 Page 27


SECURE ACCESS HOW-TO GUIDES

Upon completion, it is necessary to review result in ISE 2.x in terms of logic and consistency. Configuration must be
complete, integrity should be present; All policies have to be based on existing rules, which, in turn should create
existing and logically sound results, for e.g. shell profiles, commands sets and authorization profiles.
Note: It is highly recommended to check policys order and security logic at this point and change it in ISE. More
specific policies for e.g., analyzing specific user names usually allow access, default policies usually deny assess.
Step 43 Once the migration is complete and successful, and take an ISE backup of all the configuration imported
from ACS and name it suitably.

Verifying migration of access policies


Migrating policies is a most important and crucial phase of the whole process. While translating policies from ACS to
ISE user need to take into considerations following:
ACS has so called Service Selection Rule(s) and Service Selection Policies which are not present in ISE. ISE 2.0
has Policy sets and rules under that are automatically created while migration from ACS to ISE. Picture below
shows mapping between ACS Service Selection Policies and ISE Policy Set.
On the screenshot below, Rule1 represents Service Selection Rule which is matching RADIUS protocol used in
Radius Authentication service.

Rule 1 from the Service selection policy will be migrated to Policy Policy Sets as new Policy Set for
RADIUS(observe the screenshot below). Rule 2 will be migrated to Work Center Device Administration
Device Admin policy sets in TACACS+ work center as shown below.

Cisco Systems 2016 Page 28


SECURE ACCESS HOW-TO GUIDES

Rule 2 from ACS

Rule 1 from ACS

Rule 4 from ACS

In ACS, Service Selection policy will result in an access service. For e.g., Rule 4 for TACACSAMERICAS from
screenshot above resulted in PA-AMERICAS Network Device as access service. Every access services consists of
two parts, Identity and Authorization. As an example we see how Rule 4 from screenshots above was migrated from
ACS to ISE.
Identity Rule in ACS

Authorization Rule in ACS.

Next screenshot from ISE 2.0 will show how ACS rules translated into ISE Policy Sets after migration.

Cisco Systems 2016 Page 29


SECURE ACCESS HOW-TO GUIDES

Service Selection rule Name


Service Selection rule
Compound Condition

Access Services Allowed protocol

Service selection rule Compound


Identity Source Condition

Authorization rule Compound condition,


Authorization rule Name in operator in ACS is replaced by
STARTS_WITH in ISE. See Appendix D

This example was sample of real world configuration, though same idea will be applied to set of rules of any
complexity.
RADIUS Access policies: RADIUS access policies can be verified the same way however for RADIUS flows the
policy will have a different Network access protocol. Authorization policy shown in the screenshot above will be
mapped to Authorization profile instead of command sets and Shell profiles. From ISE UI, please go to PolicyPolicy
Sets for this.
External Proxies: When adding an external proxy server or verifying the configuration. Here are the steps
For RADIUS:
1. Create/verify external RADIUS server configuration by visiting Administration Network resources External
Radius Server from ISE UI.
2. Verify that the Access Services selection for service type external proxy in ACS are migrated to Administration
Network resources RADIUS Server Sequences in ISE. In ACS, you have go to Access services and click
on the external proxy policy for the configuration.
3. Verify that the Service Selection Rules from ACS for external proxy is migrated to PolicyPolicy Sets in ISE.
Adding proxy sequence is part of the authentication policy in ISE UI. You can create one by editing authentication
policy, clicking on Allowed protocols drop down for the authentication policy, click RADIUS Server sequence
and select the correct name.

Cisco Systems 2016 Page 30


SECURE ACCESS HOW-TO GUIDES

Step 1

Step 2

For TACACS:
1. Verify the external TACACS server and TACACS+ Server sequences has entries by browsing ISE UI , go to Work
Centers Device AdministrationNetwork Resources. Check that the Access Services Selection for service
type external proxy in ACS is migrated to TACACS+ Server sequences.
2. For TACACS+ proxy sequence, go to Work Centers Device AdministrationPolicy sets under the policy set
criteria. Make sure the Proxy sequence is selected and the correct TACACS+ Server sequence entry is selected
from the dropdown.

Step 1

Step 2

Supporting chatty devices (TACACS+ single connect)


ISE implemented single connect feature as per RFC standard as well as in legacy (compatibility) mode. When
single connect feature is turned on per device, it will negotiate, sustain TCP connection and will pass multiple
TACACS+ transactions to ISE. Such connection will stay considerably longer than regular TCP connections. This will
help chatty devices pass-through TACACS+ transactions once a connection is established and the TCP link is
sustained in a most effective way. Other devices where this option is not turned on will establish TCP link by demand.
This will help chatty devices in getting higher preference during high load condition.
During upgrade preparation, network administrator should create a list of most active Network devices (NASs), ACS
can provide such reports and statistics this list may contain up to several thousand devices. It is recommended to
make those NASs to talk to ISE PSN with TACACS+ single connect enabled. Rest of the NASs will not use single
connect.
You have to login to ISE UI, browse to Work Centers Device AdministrationNetwork resourcesNetwork
Devices and go to TACACS+ authentication settings to enable this per device

Cisco Systems 2016 Page 31


SECURE ACCESS HOW-TO GUIDES

Note: It is very important to estimate number of simultaneous connections that might be established to single ISE PSN
in order to avoid TCP socket starvation.
Step 44 This is post-migration activity to improve TACACS + efficiency for chatty devices. Create a list of chatty
network devices and enable single connect mode for them with the TACACS+ draft option enabled as
shown in the screenshot above.
Step 45 ISE allows you to export and import Network devices list. Export the existing network device list as a
csv file. Open the csv file in Microsoft Excel or other spreadsheet supporting software.
Step 46 Change the values of the column TACACS:Connect Mode Options:String
(OFF|ON_LEGACY|ON_DRAFT_COMPLIANT) for the list of chatty devices to
ON_DRAFT_COMPLIANT. Save the file as csv.
Step 47 Import this csv to ISE. The export and import process takes time depending the number of network devices.
Please be patient while importing or exporting large sets of devices.
Step 48 Take an ISE backup of all the configuration imported from ACS and name it suitably. ISE configuration
can be moved into production with backup/restore process in ISE software. While doing this please make
sure the ISE versions and patch level are the same in your staging and production system.
Step 49 FINAL STEPS: Once the ISE server is in production, change the TACACS+ and/or the RADIUS
configuration on few Network devices to point to ISE server (Policy Services Node) in normal business
hours for a few days. Observe for any inconsistencies before changing the configuration settings on the
next set of network devices. Please move the network devices from ACS to ISE in batches to avoid
disruptions.
Step 50 Once you successfully moved all the network devices based on your IT needs, monitor your daily log size
for TACACS+ until you move all the network devices and a month after to tune it based on the traffic
needs. Visit the What happens if my logging requirements exceeds the example? section of this
document for recommendation on log size considerations.

You have now completed Migration from ACS to ISE

End of Exercise: You have successfully completed this exercise.

Cisco Systems 2016 Page 32


SECURE ACCESS HOW-TO GUIDES

APPENDIX A - ACS vs ISE deployment limits


The table below provides the scalability limits of ACS 5.x vs ISE 2.x for planning the ISE deployment.

Attributes ACS 5.x Limits ISE 2.0 Limits ISE 2.1 Limits
Nodes 22 44 (2 PANs, 2 MnTs, 40 54(2 PANs, 2 MnTs,
PSNs) 50 PSNs)
Endpoints 150,000 250,000 concurrent endpoints 500,000 concurrent
1 M total endpoints sessions(not specific to
Endpoint or Users)
1.5M Total endpoints
Users 300,000 25,000 Internal Users 300,000 Internal Users
1 million Internal Guests
Admins 50 - -
Admin Roles 9 - -
Identity Groups 1,000 500(User), 500(End-point ID) 500(User), 500(End-
point ID)
Active Directory Join 1 join point per 50 50
Points node
Active Directory Group 1,500 1000 1000
Retrieval
Network Devices 100,000 30,000 (network objects not 100,000
150,000(35xx) IPs)
Network Device Groups 10000 100 100
Network Device 6 - -
Hierarchies
Services 25 - -
Authentication Rules - 100 100
Authorization Rules 320 600 (<100 recommended) 600
Conditions 8 8 8
Authorization Profile 600 600 ( < 100 recommended) 600
Service Selection Policy 50 N/A 40(Policy sets)
(SSP)
Network Conditions 3,000, 10000 N/A N/A
(NARs) (ACS 5.8.1)
dACLs 600 dACL with 8000ACLs 8000ACLs
100 ACEs each

Cisco Systems 2016 Page 33


SECURE ACCESS HOW-TO GUIDES

TrustSec Security Group - 4,000 4,000


Tags (SGT)
TrustSec Security Group - 2,500 2,500
ACLs (SGACLs)
Maximum number of SXP N/A 100,000 500,000
bindings

Cisco Systems 2016 Page 34


SECURE ACCESS HOW-TO GUIDES

APPENDIX B TACACS+ performance per ISE deployment


Dedicated TACACS+ only deployment:
Max Concurrent TACACS+ Sessions/TPS by Deployment Model and Platform
Deployment Model Platform Max # Dedicated Max RADIUS Max T+
PSNs Endpoints per Sessions/TPS
( # recommended) Deployment (TPS for
recommended
PSNs)
Standalone (all personas on 3415 0 N/A 500
same node) 3495 0 N/A 1,000
(2 nodes redundant)
3515 0 N/A 1,000
3595 0 N/A 1,500
Basic Distributed: Admin + 3415 as Admin+MNT **5 (2 rec.) N/A 2,500 (1,000)
MnT on same node; 3495 as Admin+MNT **5 (2 rec.) N/A 5,000 (2,000)
Dedicated PSN
(Minimum 4 nodes 3515 as Admin+MNT **5 (2 rec.) N/A * 5,000 (2,000)
redundant) 3595 as Admin+MNT **5 (2 rec.) N/A * 7,500 (3,000)
Fully Distributed: Dedicated 3495 as Admin and **40 (2 rec.) N/A 20,000 (2,000)
Admin and MnT nodes MNT
(Minimum 6 nodes 3595 as Admin and **50 (2 rec.) N/A *25,000 (3,000)
redundant) MNT
*Under ISE 2.0.x, scaling for small and large 35x5 appliance same as small and large 34x5 appliance.
** Device Admin service can be enabled on each PSN; minimally 2 for redundancy, but 2 often sufficient.
Red indicates TPS that will cause performance hits on MnT and is not recommended.

Scaling per PSN Platform Max RADIUS Max T+


Endpoints per PSN Sessions/TPS
Dedicated Policy nodes SNS-3415 N/A 500
(Max Endpoints Gated by Total SNS-3495 N/A 1,000
Deployment Size)
SNS-3515 N/A * 1,000
SNS-3595 N/A * 1,500

Cisco Systems 2016 Page 35


SECURE ACCESS HOW-TO GUIDES

Shared deployment (RADIUS + TACACS+):


Integrated PSNs: PSNs that share RADIUS and TACACS+ service and sharing same Admin + MnT node.
Dedicated PSNs: PSNs that are dedicated for RADIUS only or TACACS+ only service sharing same Admin + MnT.

Max Concurrent RADIUS Sessions / TACACS+ TPS by Deployment Model and Platform
Deployment Model Platform Max #PSNs: Max Max TACACS+
Integrated / RADIUS TPS (Integrated
Dedicated PSNs( Endpoints / dedicated T+
Radius + per PSNs)
TACACS+) Deployment
Standalone (all personas 3415 0 5,000 50
on same node) 3495 0 10,000 50
(2 nodes redundant)
3515 0 7,500 50
3595 0 20,000 50
Basic Distributed: Admin 3415 as Admin+MNT **5 / 3+2 5,000 100 / 500
+ MnT on same node; 3495 as Admin+MNT **5 / 3+2 10,000 100 / 1,000
Integrated / Dedicated
PSNs (Minimum 4 nodes 3515 as Admin+MNT **5 / 3+2 7,500 * 100 / 1,000
redundant) 3595 as Admin+MNT **5 / 3+2 20,000 * 100 / 1,500
Fully Distributed: 3495 as Admin and **40 / 38+2 250,000 1,000 / 2,000
Dedicated Admin and MnT MNT
nodes;
3595 as Admin and *50* / 48+2 500,000 * 1,000 / 3,000
Integrated / Dedicated MNT
PSNs (Minimum 6 nodes
redundant)
** Device Admin service enabled on same PSNs also used for RADIUS OR dedicated RADIUS and T+ PSNs.
* Under ISE 2.0.x, scaling for Small and Large 35x5 appliance same as Small and Large 34x5 appliance.

Scaling per PSN Platform Max RADIUS Max


Endpoints per PSN TACACS+
TPS
Dedicated Policy nodes SNS-3415 5,000 500
(Max Endpoints Gated by Total SNS-3495 20,000 1,000
Deployment Size)
SNS-3515 7,500 1,000
SNS-3595 40,000 1,500

Cisco Systems 2016 Page 36


SECURE ACCESS HOW-TO GUIDES

APPENDIX C - ISE VM Sizing and Log retention


Note: ISE 2.0 allows 50% allocation for logging for both RADIUS and TACACS+. ISE MnT requires purging at 80%
capacity. For e.g.: If you have a 600G hard disk, 480G of hard disk will be the effective hard disk space with purging.
Out of the 50% total allocation, 20% allocation is for TACACS+ and 30% is for RADIUS logs.

TACACS+ guidance for size of syslogs:


Message size per TACACS+ Session Message Size per Command Authorization (per
session)
Authentication: 2kB Command Authorization: 2kB
Session Authorization: 2kB Command Accounting: 1kB
Session Accounting: 1kB

TACACS+ transactions, logs and storage


Human Administrators and Scripted device administrator (Robot) model
Session Authentication and Command Accounting Only Auth. + Session + Command
Accounting Only (10 Commands / Session) Authorization + Accounting
(10 Commands / Session)
Avg Peak Logs/ Storage/ Avg Peak Logs/ Storage/ Avg Peak Logs/ Storage/
TPS TPS Day day TPS TPS Day day TPS TPS Day day
# Based on 50 Admin Sessions per Day Human Admin model
Admins
1 <1 <1 150 < 1MB <1 <1 650 1MB <1 <1 1.2k 2MB
5 <1 <1 750 1MB <1 <1 3.3k 4MB <1 <1 5.8k 9MB
10 <1 <1 1.5k 3MB <1 <1 6.5k 8MB <1 1 11.5k 17MB
25 <1 <1 3.8k 7MB <1 1 16.3k 19MB <1 2 28.8k 43MB
50 <1 1 7.5k 13MB <1 2 32.5k 37MB 1 4 57.5k 86MB
100 <1 1 15k 25MB 1 4 65k 73MB 2 8 115k 171MB
# NADs Based on 4 Scripted Sessions per Day Scripted Device Admin model
500 <1 5 6k 10MB <1 22 26k 30MB 1 38 46k 70MB
1,000 <1 10 12k 20MB 1 43 52k 60MB 1 77 92k 140MB
5,000 <1 50 60k 100MB 3 217 260k 300MB 5 383 460k 700MB
10,000 1 100 120k 200MB 6 433 520k 600MB 11 767 920k 1.4GB
20,000 3 200 240k 400MB 12 867 1.04M 1.2GB 21 1.5k 1.84M 2.7GB

Cisco Systems 2016 Page 37


SECURE ACCESS HOW-TO GUIDES

30,000 5 300 360k 600MB 18 1.3k 1.56M 1.7GB 32 2.3k 2.76M 4.0GB
50,000 7 500 600k 1GB 30 2.2k 2.6M 2.9GB 53 3.8k *4.6M 6.7GB
*Red indicates logs/ day that will cause performance hits and slowness in log processing.

TACACS+ log retention (# of days):


Please see the static tables below for easy use. If you are an advanced user and would like to customize number of
commands/sessions etc, please use the ISE MnT Log sizing calculator for TACACS+ and RADIUS .

Scripted device admin model.


Number of sessions per day: 4
Number of commands: 10
Message Size /session (KB) = 5kB + Number of commands/session *3kB
Automated access(single script) log size calculation = n Number of devices * 4 Sessions * Message size
E.g. : Log Size for 30k Network devices = 4GB/day

Number of Network devices in the MnT Disk Size(GB)


deployment
200 400 600 1024 2048

500 480 959 1439 2455 4909


1000 240 480 720 1228 2455
5000 48 96 144 246 491
10000 24 48 72 123 246
20000 12 24 36 62 123
30000 8 16 24 41 82
50000 5 10 15 25 50

Human admin device admin using sample number of sessions and commands shown below.
Number of sessions: 50
Number of Commands/session: 10
Message Size /session (KB) = 5kB + Number of commands/session *3kB
Manual access log size calculation = 50 Sessions * N Admins * Message size
E.g. : Log Size for 50 admins = 85.4MB/ day

Number of Admins\ Disk MnT Disk Size (GB)


Size(GB)
200 400 600 1024 2048
5 3835 7670 11505 19635 39269
10 1918 3835 5753 9818 19635
20 959 1918 2877 4909 9818
Cisco Systems 2016 Page 38
SECURE ACCESS HOW-TO GUIDES

30 640 1279 1918 3273 6545


40 480 959 1439 2455 4909
50 384 767 1151 1964 3927

RADIUS Log retention (# of days)


Number of Authentications per day per endpoint: 100
Custom Disk Size (GB): 500
Max. Allocated MnT Tablespace (GB): 120
Message size per Auth. (KB): 4
Log Size/day: Number of Endpoints * 10 auth./day * Message Size

Number of Endpoints MnT Disk Size (GB)


200 400 600 1024 2048 Custom
10,000 126 252 378 645 1,289 315
20,000 63 126 189 323 645 158
30,000 42 84 126 215 430 105
40,000 32 63 95 162 323 79
50,000 26 51 76 129 258 63
100,000 13 26 38 65 129 32
150,000 9 17 26 43 86 21
200,000 7 13 19 33 65 16
250,000 6 11 16 26 52 13

Note: Above values are based on controlled criteria including event suppression, duplicate detection, message size, re-
authentication interval, etc. and result may vary depending on the environment.

Cisco Systems 2016 Page 39


SECURE ACCESS HOW-TO GUIDES

APPENDIX D - Unsupported Rule Elements


Cisco Secure ACS and Cisco ISE are based on different policy models, and there is a gap between pieces of Cisco
Secure ACS data when it is migrated to Cisco ISE. When Cisco Secure ACS and Cisco ISE release versions change,
not all Cisco Secure ACS policies and rules can be migrated due to:
Unsupported attributes used by the policy
Unsupported AND/OR condition structure (mainly, once complex conditions are configured)
Unsupported operators

Rule Elements Status of Description


Support
Date and Time Not Date and time conditions in an authorization policy that have a weekly
Supported recurrence setting, are not migrated to Cisco ISE. As a result, the rules are also
not migrated.
Date and Time Not Date and time conditions in an authentication policy are not migrated to Cisco
Supported ISE. As a result, the rules are also not migrated.
In Supported The "In" operator is converted to STARTS_WITH.
Not In Supported The "Not In" operator is converted to NOT_STARTS_WITH.
Contains Any Supported The "Contains Any" operator is converted to a compound condition with
EQUALS & OR operators.
Example: In ACS, AD ExternalGrp Contains Any (A, B) is converted to (AD
ExternalGrp Equals A) OR (AD ExternalGrp Equals B) in Cisco ISE.
Contains All Supported The "Contains All" operator is converted to a compound condition with
EQUALS & AND operators.
Example: In ACS AD:ExternalGrp contains all A;B is converted to (AD
ExternalGrp Equals A) AND (AD ExternalGrp Equals B) in Cisco ISE.
Combination of Not Rules that use these operators in their conditions are not migrated:
logical Supported Authentication policies that include compound conditions that have different
expressions logical expressions other than a || b || c || and/or a && b && c && such as
(a || b) && c.
Authorization policies that include compound conditions that have different local
expressions other than a && b && c && are not migrated as part of the rule
condition.
Workaround: You can manually use library compound conditions in ISE for
some advanced logical expressions. You can also split the compound condition
such as (a || b) && c to two simpler rules with a || b and c.
Network Not Rules that include only network conditions are not migrated. In case the
conditions Supported condition includes network conditions and other supported conditions, the
network conditions are ignored and are not migrated as part of the rule condition.
Workaround: Can use authorization condition for the attributes.

Cisco Systems 2016 Page 40


SECURE ACCESS HOW-TO GUIDES

User attributes Partially Rules with conditions that include user attributes with a data type other than the
Supported String data type are not migrated.
Host attributes Not Authentication fails in case the condition refers to host attributes.
Supported Authorization policies that include a condition that has host (endpoint) attributes
are not migrated to Cisco ISE authorization policies.
Please see supported attributes and data types for additional information on User,
Host and Radius attributes.

Cisco Systems 2016 Page 41


SECURE ACCESS HOW-TO GUIDES

APPENDIX E - ACS vs ISE Feature Comparison

TACACS+ ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.1

TACACS+ per-command authorization and accounting Yes Yes Yes Yes


TACACS+ support in IPv6 networks No Yes No No

TACACS+ change password Yes Yes Yes Yes


TACACS+ enable handling Yes Yes Yes Yes
TACACS+ custom services Yes Yes Yes Yes
TACACS+ proxy Yes Yes Yes Yes
TACACS+ optional attributes Yes Yes Yes Yes
TACACS+ additional auth types (CHAP / MSCHAP) Yes Yes Yes Yes
TACACS+ attribute substitution for Shell profiles Yes Yes Yes Yes
TACACS+ customizable port Yes Yes Yes Yes
TACACS+ Command Sets Import/Export N/A Yes No No

RADIUS ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.1


PAP Yes Yes Yes Yes
CHAP Yes Yes Yes Yes
MS-CHAPv1 and v2 Yes Yes Yes Yes
EAP-MD5 Yes Yes Yes Yes
EAP-TLS Yes Yes Yes Yes
PEAP (with EAP-MSCHAPv2 inner method) Yes Yes Yes Yes
PEAP (with EAP-GTC inner method) Yes Yes Yes Yes
PEAP (with EAP-TLS inner method) Yes Yes Yes Yes
EAP-FAST (with EAP-MSCHAPv2 inner method) Yes Yes Yes Yes
EAP-FAST (with EAP-GTC inner method) Yes Yes Yes Yes
EAP-FAST (with EAP-TLS inner method) Yes Yes Yes Yes
EAP Chaining with EAP-FAST No No Yes Yes
RADIUS Proxy Yes Yes Yes Yes

Cisco Systems 2016 Page 42


SECURE ACCESS HOW-TO GUIDES

RADIUS VSAs Yes Yes Yes Yes


LEAP Yes Yes Yes Yes
LEAP Proxy Yes No No No

Identity Stores ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.1
Internal User & Host Database Yes Yes Yes Yes
Windows Active Directory Yes Yes Yes Yes
LDAP Yes Yes Yes Yes
RSA SecurID Yes Yes Yes Yes
RADIUS token server Yes Yes Yes Yes
ODBC Yes No No Yes
AD Server specification per ACS/ISE instance Yes Yes N/A 1 N/A 1
LDAP Server specification per ACS/ISE instance Yes No No No
Map internal users password to an external ID store Yes Yes No Yes

Foot note:
1. ISE supports up to 50 AD domains from the same or from different forests.

Internal Users / Administrators ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.1
Users: Password complexity Yes Yes Yes Yes
Users: Password aging Yes Yes1 Yes 1 Yes 1
Users: Password history Yes Yes Yes Yes
Users: Max failed attempts Yes Yes Yes Yes
Users: Disable user after n day of Yes Yes No Yes
inactivity
Users: User change password (UCP) Yes Yes No No
utility
Admin: Password complexity Yes Yes Yes Yes
Admin: Password aging Yes Yes Yes Yes
Admin: Password history Yes Yes Yes Yes

Admin: Max failed attempts Yes Yes Yes Yes


Admin: Account inactivity Yes Yes No Yes 2
Admin: entitlement report Yes Yes Yes Yes

Cisco Systems 2016 Page 43


SECURE ACCESS HOW-TO GUIDES

Admin: session and access Yes Yes Yes Yes


restrictions

Foot note:
1. Warning and disable after defined interval. Grace period is not supported
2. Password change after n days of account inactivity not implemented.

Miscellaneous ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.1

Group Mapping Yes Yes No No 1

Machine Access Restrictions caching and Yes 4 Yes Yes 4 Yes 4


Distribution
Network Access Restrictions (NARs) Yes Yes No No

Command line / scripting interface (CSUtil) Yes Yes 2 No No


RBAC for ISE Admin to allow administrators' Yes No No Yes 3
rights to access/modify only subset(s) of a class of
objects
Log Viewing and reports Yes Yes Yes Yes

Export logs via SYSLOG Yes Yes Yes Yes

Time based permissions Yes Yes Yes Yes

Configurable management HTTPS certificate Yes Yes Yes Yes

CRL: Multiple URL definition Yes No No No

CRL: LDAP based definition Yes No Yes Yes


Online Certificate Status Protocol (OCSP) Yes Yes Yes Yes
Comparison of any two attributes in authorization Yes Yes Yes Yes
policies
Configurable RADIUS ports Yes No No No

API for users, groups and end-point CRUD Yes Yes Yes Yes
operations
Multiple NIC interfaces N/A Yes Yes Yes
Secure Syslogs No Yes Yes Yes

Foot Note:
1. Group mapping can be done with authorization conditions in ISE authorization policy
2. CLI interface is supported for bulk provisioning
3. RBAC for Network devices, NDG and User identity group only
4. ACS 4.2 and ISE 2.0 support MAR cache. ISE 2.1 supports MAR cache between restarts but not distribution.
Cisco Systems 2016 Page 44
SECURE ACCESS HOW-TO GUIDES

Miscellaneous ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.1

EAP-TLS Certificate lookup in LDAP or AD Yes Yes Yes Yes

Maximum concurrent sessions per user/group Yes Yes No No

Logging to external DB (via ODBC) Yes Yes 1 No No

Programmatic Interface for network device CRUD Yes Yes Yes Yes
operations.
Adding hosts with Wildcards Yes Yes No No

Configure devices with IP address ranges Yes Yes No No

Lookup Network Device by IP address Yes Yes Yes 2 Yes 2

Dial-in Attribute Support Yes Yes No No

User-defined attributes for endpoints/hosts N/A Yes No No

Ability to select logging attributes for syslog Yes No No No


messages
RSA Token caching Yes Yes No No

Alarm notification on a per-item level N/A Yes No No

Foot note:
1. Data can be exported from M&T for reporting. Not supported as log target that can be defined as critical logger
2. Can search by IP address but this cant be used in combination with other fields as search criteria

Cisco Systems 2016 Page 45

You might also like