You are on page 1of 48

Cisco ACS to ISE Migration Guide

Secure Access How to Guides Series

Author: Krishnan Thiruvengadam


Date: August 30, 2017
SECURE ACCESS HOW-TO GUIDES

Table of Contents
Introduction 4
Background ................................................................................................................................................ 4
Planning your Migration ................................................................................................................................................. 6
ACS vs ISE Feature Comparison ............................................................................................................... 6
ACS vs ISE underlying differences ...................................................................................................... 6
Migration Paths .......................................................................................................................................... 7
Migration from 5.x to ACS 5.5/ 5.6/ 5.7/ 5. 8 ........................................................................................ 7
Migration from ACS 4.x to ACS 5.x ...................................................................................................... 8
Deployment considerations ........................................................................................................................ 8
ACS vs ISE deployment comparison ................................................................................................... 8
Simple 2 Node deployment – ACS vs ISE..................................................................................... 9
ACS vs ISE Distributed deployment .............................................................................................. 9
What should my topology design for TACACS+ be? ................................................................................ 11
Device Administration model ............................................................................................................. 12
Deployment options ........................................................................................................................... 12
How to I scale my PSN’s for the deployment? ......................................................................................... 15
Licensing: ................................................................................................................................................. 15
How do I size my ISE VM’s/hardware for log retention?........................................................................... 16
Log retention and sizing MnT hard disks ........................................................................................... 16
What happens if my logging requirements exceeds the example? .................................................... 16
Prepare your Migration ................................................................................................................................................. 18
Configuration Maps and Exceptions......................................................................................................... 18
Staging Environment for Migration ........................................................................................................... 22
Migration tool requirements ...................................................................................................................... 23
Installation and configuration of the Migration Tool. ........................................................................... 23
Supported/ Unsupported objects for migration ......................................................................................... 24
Preparation for Migration from Cisco Secure ACS, Release 5.5+ ............................................................ 24
Migration process (assisted with Migration Tool) ...................................................................................................... 26
Exporting configuration: ........................................................................................................................... 27
Policy Gap Analysis: ................................................................................................................................ 28
Importing configuration: ............................................................................................................................ 29
Verifying migration of access policies ...................................................................................................... 30
Cisco Systems © 2017 Page 2
SECURE ACCESS HOW-TO GUIDES

Supporting chatty devices (TACACS+ single connect) ............................................................................ 33


APPENDIX A - ACS vs ISE deployment limits ........................................................ 35
APPENDIX B – TACACS+ performance per ISE deployment................................. 37
Dedicated TACACS+ only deployment: ................................................................................................... 37
Max Concurrent TACACS+ Sessions/TPS by Deployment Model and Platform................................ 37
Shared deployment (RADIUS + TACACS+):............................................................................................ 38
Max Concurrent RADIUS Sessions / TACACS+ TPS by Deployment Model and Platform ............... 38
APPENDIX C - ISE VM Sizing and Log retention.................................................... 39
TACACS+ guidance for size of syslogs: ............................................................................................ 39
TACACS+ transactions, logs and storage ................................................................................................ 39
Human Administrators and Scripted device administrator (Robot) model .......................................... 39
TACACS+ log retention (# of days):................................................................................................... 40
Scripted device admin model. ............................................................................................................ 40
Human admin – device admin using sample number of sessions and commands shown below. ..... 41
RADIUS Log retention (# of days) ..................................................................................................... 41
APPENDIX D - Unsupported Rule Elements .......................................................... 43
APPENDIX E - ACS vs ISE Feature Comparison ................................................... 45

Cisco Systems © 2017 Page 3


SECURE ACCESS HOW-TO GUIDES

Introduction
This document provides partners, Cisco field engineers and TME’s with a guide to plan ACS to ISE migration. This
document will also have procedure for migrating from Cisco Secure Access Control System (ACS) to Identity Services
Engine (ISE) software. ISE 2.1 and above supports migration from ACS 5.5/ 5.6/ 5.7/ 5.8. ISE 2.0 supports migration
from ACS 5.5 or ACS 5.6 only. ACS from prior versions need to be upgraded to these versions before migrating over
to ISE 2.x.
This document will have 3 broad sections for performing ACS to ISE migration.
 Planning your migration
 Prepare your migration
 Migration process
Planning your migration section covers the feature comparison and underlying differences between ACS vs ISE
features. It provides options for topology design, device administration models to help scale PSN’s. It provides step by
step guide to plan out your hardware capacity keeping the IT Audit needs for logs retention while migrating to new
ISE environment.
Prepare your Migration section includes best practices and steps for operational tasks to prepare for your migration.
This includes configuration maps that points to location of functional configuration in ACS and ISE calling in
exceptions during migration of ACS to ISE with ways to fix issues. It also discusses on creating a staging environment
for migration and preparing the tool/setup for migration.
Migration process is the core section that will cover the migration process and provides step by step procedure to
export configuration, fix policy gaps and import configuration to ISE iteratively till the migration is successful.

Background
Cisco Secure Access Control System (ACS) is a centralized identity and access policy solution that ties together an
enterprise's network access policy and identity strategy. Cisco Secure ACS operates as a RADIUS and TACACS+
server, combining user authentication, user and administrator device access control, and policy control in a centralized
identity networking solution.
Cisco ISE is a consolidated policy-based access control system that incorporates a superset of features available in
existing Cisco policy platforms. Cisco ISE performs the following functions:

 Consolidates the network access functionality of ACS and ties together profiling and posture compliance.
 On-boarding mobile device using secure BYOD (Bring your own device) flows.
 Provides for comprehensive guest access management for Cisco ISE administrators.
 Enforces endpoint compliance with comprehensive client provisioning.
 Discovery, profiling, policy-based placement, and monitoring of endpoint devices on the network
 Employs advanced enforcement capabilities with TrustSec using Secure Group Tags(SGT’s)

Cisco Systems © 2017 Page 4


SECURE ACCESS HOW-TO GUIDES

 Facilitates TACACS-enabled device administration through its Work Center. The Work Center menu
contains a work flow for TACACS+ configuration, which acts as a single start point for ISE administrators.

Cisco Systems © 2017 Page 5


SECURE ACCESS HOW-TO GUIDES

Planning your Migration


This section will give you information on the basic, top of the mind questions related to migration that includes ISE vs
ACS feature comparison and underlying differences, migration paths to migrate from different versions of ACS,
Deployment differences between ACS to ISE. It will also help you design with the best topology for your environment
keeping in mind your current ACS deployment, device administration model and log retention needs of your IT
environment.

ACS vs ISE Feature Comparison


ISE 2.0 has a full TACACS+ protocol implementation and feature sets have only few differences from ACS. ISE 2.1+
supports ACS parity items including scalability. Full feature comparison of ACS 5.x and ISE 2.x can be found in
Appendix E or in the community site for ACS vs ISE Comparison .

For TACACS+, ISE 2.x has a Device Administration work center that provides a nice work flow for the
administrator to configure the device administration functionality. Migration tool can be downloaded directly from
work center to your Windows machine to perform migration between ACS and ISE. ISE provides robust reporting
capability of TACACS + authentication, authorization, accounting and command accounting. ISE 2.3 included
additional set of reports to complete the functionality on par with ACS.
ISE 2.3 included IPv6 support for TACACS+ and support for IP ranges in all IPv4 octets.
Policy Sets in ISE vs Access Service + Service Selection Policy in ACS:
ISE 2.x has a rule based policy model like ACS 5.x versions. ISE 2.x supports policy sets. Each policy set that has an
entrance criteria for filtering incoming requests to apply to the corresponding Authentication and Authorization
policies.
In ACS, access services lets you create a service policy structure based on service type (RADIUS/ TACACS+/external
proxy) to create an Identity/Authorization policy. A Service Selection Policy provides a criteria to select the right
access services. An access service is selected based on conditions where single or multiple Service Selection Rules can
use the same service.
In ISE, you must enable Policy Sets on ISE UI from Administration  System  Settings  Policy Settings to
make them available on the Policy menu for RADIUS.

ACS vs ISE underlying differences


Both ACS 5.5+ and ISE 2.x have functionally similar policy engines, however to ensure proper and error free
migration, there are several things to make note of in the underlying differences between ACS and ISE. The following
features do not relate specifically to the TACACS+ protocol but are used in deployment solutions.
1. Naming constraints: ISE 2.1 does not allow many special character’s in its object entities. For example,
semicolon “:”, dot “.” depending on the type of entity. (Note: ISE 2.1 and ISE 2.0 patch 2 supports “.”). ISE typically
allows alpha numeric characters, “_” and “– “character in its objects. Some objects such as username and
authorization profile might support more characters. When ACS objects has special characters, these objects will
be renamed by the migration tool and imported to ISE . This is discussed in depth in the next chapter.
2. Custom Conditions or Aliases: it is implemented in ISE 2.0 as regular inline custom conditions.
3. Policy Format/Alias: Tabular form of policy tables and hit counts are supported in ISE 2.3
Cisco Systems © 2017 Page 6
SECURE ACCESS HOW-TO GUIDES

4. Unsupported rule elements: ISE does not support certain elements that are part of rule or condition. This
includes Unsupported attributes used by the policy, Unsupported AND/OR condition structure (mainly, once
complex conditions are configured) and Unsupported operators. For example, ACS supports a combination of
AND and OR in its compound condition used in an authorization policy. ISE 2.0 through ISE 2.2 supports either
AND or in its authorization conditions in an authorization policy. This may cause policies not to get migrated. ACS
authorization policy needs to be analyzed, split and additional policies should be added in view of this. For
complete list of unsupported rule elements please see Appendix D.

Note: Combination of AND and OR operators is supported in ISE 2.3.


Note: It is not necessary to have special entity to make ISE 2.0 traverse different identity stores and fetch
information.

Migration Paths
ISE 2.0 supports migration from ACS 5.6 or ACS 5.5 versions only.
ISE 2.1+ supports migration from ACS 5.5 / 5.6 / 5.7 and ACS 5.8.

Migration from 5.x to ACS 5.5/ 5.6/ 5.7/ 5. 8


If customers are in prior version of ACS 5.x, you have to upgrade to ACS 5.5 and ACS 5.6 first before migrating to
ISE 2.0. For migrating to ISE 2.1 your customer be in one of the last 4 releases of ACS (ACS 5.5/ 5.6/ 5.7 or 5.8).
If your customers interim goal is to upgrade to the latest ACS version due to the EOL considerations shown below then
upgrade to ACS 5.8.

Version End of Sale End of Life End of Support(Vulnerability fix)


5.8 Aug 30, 2017 Aug 30, 2018 Aug 31, 2020
5.7 May 2, 2016 May 2, 2017 May 31, 2019
5.6 Feb 16, 2016 Feb 15, 2017 February 28, 2019
5.5 April 15, 2015 April 14, 2016 April 30, 2018
4.2 October 27, 2011 October 26, 2012 October 31, 2014
3.3 August 29, 2006 August 29, 2007 August 28, 2009

Please follow the link for detailed procedure for migrating to ACS 5.8. Here are the upgrade paths for the ACS 5.x
versions. The versions that support migration to ISE is in black letters as shown below, rest in blue.

 ACS 5.0ACS 5.2 ACS 5.4 ACS 5.6ACS 5.7 or ACS 5.8
 ACS 5.1 ACS 5.3  ACS 5.5 ACS 5.6 or ACS 5.7 or ACS 5.8
 ACS 5.2 ACS 5.4 ACS 5.6 ACS 5.7 or ACS 5.8
 ACS 5.3 ACS 5.5 ACS 5.6 or ACS 5.7 or ACS 5.8
 ACS 5.4 ACS 5.6 ACS 5.7 or ACS 5.8

Cisco Systems © 2017 Page 7


SECURE ACCESS HOW-TO GUIDES

Migration from ACS 4.x to ACS 5.x


ACS 4.x is an older version and cannot migrate to ISE directly. You must first upgrade from ACS 4.x to either ACS
5.5 or ACS 5.6 before migrating to ISE 2.0.
ACS 5.x has a significantly different architecture than ACS 4.x. The migration might not carry over a lot of
configuration automatically. You might have to manually carry over configuration or use import/export tools. Here are
the links that speaks about what objects are supported/not supported during migration.
ACS 4.x to ACS 5.5
ACS 4.x to ACS 5.6
If you need to migrate from ACS 4.x, best approach is to start clean, install ISE and do manual configuration. You can
also use import/export tools that is supported in ISE for user identities/group identities, network devices, network
devices groups etc. You can also use REST API for populating configuration in ISE.
For customers to migrate to ACS 5.5 or ACS 5.6, they need to be in one of the ACS 4.x versions

 ACS 4.1.1.24
 ACS 4.1.4
 ACS 4.2.0.124
 ACS 4.2.1
Please look at the ACS 4.x to 5.x migration doc for more details on architecture and the choices for migration based
on your configuration sets.

Deployment considerations
ISE supports standalone deployment for smaller networks. For larger networks, ISE supports distributed deployment
to support services including network access, profiling, BYOD, Guest, Posture Compliance and TrustSec. ISE 2.x
supports TACACS+ service for providing device admin and audit control supporting 30k network device objects in
ISE 2.0 and 100k network devices in ISE 2.1+ in a single deployment.

ACS vs ISE deployment comparison


ISE deployment is slightly different from ACS that has either primary or secondary instances in three functional roles
Primary, Secondary or dedicated logging (Primary or Secondary). In ACS deployment, the primary and secondary are
both active and take part in providing AAA services in a network. AAA client traffic is primarily distributed by the
network devices across the ACS instances for balancing the load.
A Cisco ISE node is a dedicated appliance or Virtual Machine that supports different functional roles or personas such
as Administration, Policy Service, Monitoring, and PxGrid. Details about the functional roles are described here. These
functional roles can be combined or separated in dedicated nodes to optimize the distribution of endpoint connections
based on geography, based on the type of services used etc. Each of the personas can be part of a standalone or in a
distributed deployment.

Cisco Systems © 2017 Page 8


SECURE ACCESS HOW-TO GUIDES

Simple 2 Node deployment – ACS vs ISE


In a simple 2 node ISE deployment with redundancy, ISE node can have an active/standby pair for Administration and
active/active Monitoring personas. Policy services persona is also part of the same node for standalone deployment.
Policy Service persona is the work horse of ISE providing network access, posture, BYOD, guest access, client
provisioning, and profiling services. A two nodes deployment of ACS is shown below for comparison.

Figure 1. Basic 2 Node Setup ISE(Left), ACS (Right)

In ISE deployment, each persona can be a dedicated node with separate Administration, Monitoring and Policy
Services nodes or a combination as shown in Figure 2 below. Policy Services Node provides AAA services including
RADIUS services, TACACS services. Policy Services persona evaluates the policies and makes all the decisions in an
ISE deployment. You can have more than one node assuming this persona.

Figure 2. Single ISE node with one more Personas

ACS vs ISE Distributed deployment


ACS has a flatter deployment model for dispersing the ACS instances across the network. ACS deployment scalability
works by including additional backup servers based on the performance and logging requirement. ACS deployment

Cisco Systems © 2017 Page 9


SECURE ACCESS HOW-TO GUIDES

supports robust replication, full synchronization and incremental replication. As the number of ACS scales up for large
deployment, a dedicated syslog server is recommended with a total deployment supporting 22 ACS instances.

ACS Database
Master download
Incremental
Replication

ACS ACS ACS


Secondary Secondary Secondary

Figure 3. ACS Distributed Deployment

Basic Distributed Deployment


In ISE, expanding the 2 node setup above to a basic distributed deployment, for a network that spans across
geographies, business units you can add up to 5 dedicated PSN’s to the 2 node setup in Figure 4 as shown below. In
this topology, you have two PAN/ MnT nodes as primary and secondary in a redundant setup in the same datacenter.
This setup supports to a maximum of 20,000 endpoints across PSN’s across different geographies. This is similar to a
small to medium sized deployment of with few instances of ACS as shown above in Figure 3 above.

Figure 4. Basic Distributed Deployment (ISE)

Note: In a distributed deployment, inter-ISE node delay (latency) should be lesser than or equal to 200ms for
versions ISE 2.0 and lower (300ms for ISE 2.1+) for successful node communication and replication. For TACACS+
the latency requirement may be relaxed.

Cisco Systems © 2017 Page 10


SECURE ACCESS HOW-TO GUIDES

Fully Distributed Deployment


In a fully distributed deployment, the administration and monitoring personas are separated in different nodes with 2
Admin nodes and 2 MnT nodes. In a large network, the primary, secondary admin and monitoring nodes are dedicated
nodes that can be in different datacenters as shown in Figure 5. below.

Figure 5. Fully Distributed Deployment

The full distributed topology requires datacenters to be connected with a high speed and low latency links. With ISE
2.1, a maximum of 50 PSN’s with 2 PAN and 2 MnT’s are supported with a maximum of 500,000 endpoints across
PSN’s (250k endpoints for ISE 2.0). Policy services nodes in the same location can be part of a node group called
cluster that will help with high availability in case of PSN failures. This can be useful for services such as profiling etc.
Appendix A provides comparison on the deployment limits of ACS vs ISE and can be used as a reference to
determine to scale your deployment.

What should my topology design for TACACS+ be?


ISE topology design needs to account for the scalability needs of the customer. There are a few differences between
ACS and ISE deployment scalability limits as in Appendix A .
When migrating ACS deployment to ISE, you need to comprehend the deployment considerations mentioned in the
section above for one or both Network Access (RADIUS) and Device Administration (TACACS+) services. Whether
you dedicate a separate node for TACACS+ is more of a security and operational policy decision. If separated in ACS
deployment today, then continue doing so if that model serves you well.

Cisco Systems © 2017 Page 11


SECURE ACCESS HOW-TO GUIDES

Tip: If you wish to combine both TACACS+ Device Administration and RADIUS into same deployment, then
dedicating nodes to TACACS+ service may be the best option for a large organization to prevent user services from
impacting device admin services and vice versa.

Device Administration model


The main question here is whether RADIUS and Device Admin (TACACS+) should co-exist in the same node or as
independent nodes. Here is some general guidance that will help you answer the question:

 For programmatic device admin model, recommend dedicated PSN nodes for Device Admin service.
 For human device admin model where individual admin users manually login and manage network
devices, consider the following example:
 20 Device admins concurrent sessions @ 1 command/s = 40 TPS (command authorization +
accounting record)
 In this scenario, it would be acceptable to run Device Admin service on PSNs running other core
endpoint services.
 If you expect a much higher level of activity – much higher number of concurrent admins or
transactions – then consider dedicating PSN.
Note: Organizational requirements and security policies such as “separation of device admin and user
access control” may dictate the need for dedicated PSN nodes for Device Admin function, or even an
isolated ISE deployment to separate RADIUS and TACACS+ control.

Deployment options
There are 3 ways you can deploy TACACS+/ RADIUS services with ISE simple or distributed deployment. These are
dedicated deployment, dedicated PSN’s and Integrated deployment as described below. Each has its own pros and cons
and use cases.
Dedicated deployment is where you have separate deployments for RADIUS and TACACS+. This includes a
separate Administration Node (PAN) for managing policies, users/groups, network devices etc., a separate Monitoring
Node (MnT) for managing TACACS+ logs and dedicated Policy Services Node for supporting TACACS+ or RADIUS
service.
Dedicated PSN’s in the deployment means that the Administration Node and Monitoring Node are shared for
managing policies, policy elements, logging and other configuration for both TACACS+ and RADIUS. However you
will still have a dedicated PSN’s for addressing incoming TACACS+ or RADIUS requests and they are not shared.
Finally the Integrated deployment where all the node types (Administration Node, Monitoring Node, and Policy
Services Node) are shared between both RADIUS and TACACS+ services and it comes one integrated deployment for
your entire network.
The illustration below will give further details on each of the above options:

Cisco Systems © 2017 Page 12


SECURE ACCESS HOW-TO GUIDES

Dedicated Architecture: Seperate Admin(PAN), Monitoring(MnT)


and policy services node(PSN) for TACACS+ and
Deployment RADIUS deployment.
Pros: RADIUS: PAN / MnT
Complete separation of policy
& operations for Device
Administration vs. Network
Access. PSN PSN PSN

TACACS+
Cons: PAN/ MnT
Separate ISE deployments to
maintain.
Cost of additional PAN and PSN PSN PSN
MNT nodes for the second
deployment.
Use case: For large deployments, where IT is managed by different
groups. Provides Total ownership.
For companies where ACS deployments are seperate for TACACS+ and
RADIUS for a reason.
Where seperation of Network access and Device admin users are
critical due to high user authentications for network access, high
profile users or IT policy requirements.
For Device administration model using scripts extensively
generating large amounts of logs for IT Audit.

Cisco Systems © 2017 Page 13


SECURE ACCESS HOW-TO GUIDES

Dedicated PSNs Architecture: Shared Admin(PAN) and Monitoring


Node(MnT). Seperate Policy Services Node (PSN) for
Pros: TACACS+ and RADIUS.
Centralized policy,
monitoring for all AAA PAN / MnT

Scale Device Administration PSN

independently from Network


Access as needed
PSN PSN
Cons: PSN

Per-PSN utilization may be


low for a dedicated function.
May need additional PSNs for Use case: For big/medium sized companies where device
distributed coverage. administration and network access managed by same group.
For Device admin model using both scripts and human admin
users.
Where seperation of Network access and Device admin users are
essential.

Integrated Architecture: Shared Policy services node(PSN),


admin(PAN) and Monitoring node (MnT) for
Pros: TACACS+ and RADIUS
Centralized policy & monitoring for all
AAA needs. PAN / MnT

Same configuration for all PSNs.


Scale all AAA needs incrementally by
adding a PSN when or where needed.
PSN PSN
Cons: PSN

Potential need for cross-department


administrative access depending on
the organization.
Use case: For medium/small sized companies where device
Load from Network Access may impact administration and network access managed by same group.
Device Administration services and For Device admin model using only human admin users.
vice versa.
Where seperation of Network access and Device admin users
are not critical.

Cisco Systems © 2017 Page 14


SECURE ACCESS HOW-TO GUIDES

To plan and run your ACS to ISE migration, you need to perform several steps. The document will guide you through
these steps necessary based on the type of customer, deployment needs etc.
Step 1 Choose the deployment model that fits your need based on the information in the section above.
Step 2 Choose the type of deployment, 2 Node Dedicated vs Simple or fully distributed deployment based on the
Deployment considerations

How to I scale my PSN’s for the deployment?


Once a suitable deployment method is chosen,
Step 3 For TACACS+ only, to determine the number of PSN’s for scripted device administration model as
discussed above, you can replace each ACS authentication server with an ISE PSN node. This is a simple,
fool proof approach.
Step 4 For Endpoint services(Secure access and other services using RADIUS, when determining number of
PSN’s for a RADIUS deployment, please use ‘Maximum Concurrent Endpoints’ as the main guideline as
discussed in Appendix B: Shared deployment (RADIUS + TACACS+):.
Step 5 If your ACS is oversubscribed use the Performance Metrics in the Appendix at the end of the doc.

From Appendix C: TACACS+ transactions, logs and storage , select the right Device Administration
model to determine the transactions per second (TPS) for TACACS+ controls (Authentication, session
authorization, accounting (or) Command accounting only (or) for everything) in your environment. Please
pay attention to the peak TPS based on the model.

Then refer Appendix B and look at the table at the bottom to know the peak TPS supported across
different appliance to choose the hardware needed for the PSN’s. Please remember to scale PSN’s
considering redundancy, location/geography and other factors as outlined in in ACS vs ISE Distributed
deployment section above.
Tip: Please pay attention to TACACS+ performance in Appendix B for dedicated and shared deployments
which will be the key to determine the number of PSN’s. Remember that all other transactions happens
once during the TACACS + session except for command authorization and accounting.

Licensing:
When migrating from ACS deployment using a 35xx appliance/ legacy appliance or VM, use the ISE ordering guide
for information about licensing. Go to ‘Migration appliance ordering information’ section for your specific needs.
TACACS+ functionality requires a perpetual license for the entire ISE deployment and does not have a migration
license. You also need for a minimum number of Base license e.g.: Base license for 100 endpoints to access the UI
functionality of TACACS+ and to turn on TACACS+ service.
To expand ISE deployment for more than TACACS+, please use the ordering guide mentioned above as reference.
Please take a look at the ‘Cisco ISE migration Licenses’ and the ‘License consumption’ section in the ordering guide
for more information.

Cisco Systems © 2017 Page 15


SECURE ACCESS HOW-TO GUIDES

How do I size my ISE VM’s/hardware for log retention?


Log size becomes an important factor to consider while designing the hardware and VM Hard disk sizing for the ISE
MnT servers. This is especially for large enterprises where logging requirements might vary in your environment
based on IT and audit policies of your network.
In ISE, monitoring persona (MnT) is responsible for collecting logs, generating reports and for troubleshooting ISE
deployments. Based on the logging needs of an enterprise you can choose remote syslog servers for log storage.
For TACACS+ logging requirements, there are two use cases to consider based on device administration performed
either by a human administrator or by an automated script/ robot. Logs are collected in the MnT and purged based on
the log retention needs and hard disk size. Here is a sample log size calculation per day for these use cases:
Use case 1: Human administrator managing devices: For e.g.: 50 Administrators opening 50 sessions per day with
10 commands/session; Log size per day = 50 * 50 * (5k +10*3k) = 87500KB = 85.4MB per day.
Use case 2: Managing devices using scripted device administration: An automated script to run against 30K
network devices. For e.g.: @ 4 times per day with 5 commands per session; Log size per day = (5K +5 * 3K) * 30000
* 4 = 2400000KB ~ 2.3GB per day.

Log retention and sizing MnT hard disks


Log retention should be calculated for both TACACS+ and RADIUS separately.
Step 6 For TACACS+, start by calculating the logs generated by your network devices for TACACS+ based on
the device administration model in your environment. Please use the examples in the use cases mentioned
above as reference. Use Appendix C to determine the log size per day for TACACS+. For RADIUS, logs
are based on number of authentication.
Step 7 Now gather information on the log retention needs of your environment (based on your audit needs etc.).
Go back and refer to log retention tables in Appendix C and determine the hard disk size of MnT. This is
especially important when you are using an ISE virtual machine.

What happens if my logging requirements exceeds the example?


If amount of logs per day as in Use case 2 above exceeds 2.3GB also shown in Appendix C – steps should be taken to
reduce the logs sent to MnT based on the following.
1. Revise and minimize duplicate incoming log traffic: To avoid duplication of entries in AAA logs are generated
by automated scripts (For the same user name and/or originated form the same IP address) use MnT collection
filters in ISE (From ISE UI browse to SystemLoggingCollection Filters for this.) to filter incoming logs from
scripts, “pings” or “keep-alive” to be masked out..
2. Consider separation of incoming traffic between ISE MnT and external 3 rd party Syslog collector: ISE
administrator can create as many remote Logging Targets (SystemLoggingRemote Logging Targets) as
necessary, to a generic Unix Syslog or to a third party SIEM software such as SPLUNK. After that each individual
logging category may be routed to the specific Logging Target. (From ISE UI, browser to
SystemLoggingLogging categories for this).
3. From ISE UI, go to Administration  System  Settings  Protocols  RADIUS and enable log suppression
by enabling the last three options as shown here.

Cisco Systems © 2017 Page 16


SECURE ACCESS HOW-TO GUIDES

Cisco Systems © 2017 Page 17


SECURE ACCESS HOW-TO GUIDES

Prepare your Migration


Step 8 Outdated, redundant or stale policy or rule cleanup: As part of migration effort, revise and clean
existing policy and rule set in ACS. Some of the policies might be inactive, obsolete and no longer
relevant. Same goes true for users and Network devices. Observing Hit Count on ACS can help verifying
this. Reset the Hit Count several months before migration. If Hit Count is equal to zero for a long time,
this policy is a good candidate to be marked as disabled, moved to the end of list or removed at all.
Consolidating and optimizing several policies into one is a good way to make configuration more
manageable, more scalable and less prone to mistakes.

Configuration Maps and Exceptions


Step 9 The tables below shows configuration map for ACS and ISE that includes location of configuration
objects, exceptions that are observed during migration and ways to fix/get around those exceptions. For
e.g.: As part of pre-migration, please clean up object names in ACS to make sure it does not have special
characters not supported by ISE. Please see the details in the table below
The following tables are organized like the flow in the ACS UI for easy readability.
Network Resources:
ACS 5 configuration ISE Configuration Exceptions and Fixes
Network Resources Network Work Centers  Device Administration Naming constraints. Need to fix
Device Groups  Network Device Groups. names during policy gap analysis.
(A valid NDG name can contain
Network Resources Network alphanumeric, Hyphen(-), IP range not supported in ISE
Devices Underscore(_), period(.) and space 2.0/2.1(convert the range into
characters) subnets if possible). ISE 2.2
Work Centers  Device Administration supports IP ranges in the last octet.
Network Resources Network IP exclusions supported by
Devices. “overlapping IPs”. ISE 2.3 supports
(A valid Network Device name can IP ranges in all octets.
contain alphanumeric, Hyphen(-),
Underscore(_)) If you change the default name of
in ACS, it will not get migrated.
Migration tool will automatically
convert the unsupported characters to ISE 2.1 supports Network devices
supported ones in ISE 2.2+. name with “.” character.
Network Resources Default Administration Network ISE must have RADIUS enabled
Network Device ResourcesDefault Network Device (ISE 2.0 only). Fixed in ISE 2.1.
Network Resources External Work Centers Device Admin When ‘Cisco Secure ACS’ is
Proxy Servers Network resourcesTACACS Proxy external proxy, a prefix
Servers ‘TACACS_’ or ‘RADIUS_’ is

Cisco Systems © 2017 Page 18


SECURE ACCESS HOW-TO GUIDES

Administration Network resources  added to the name before moving it


External Radius server to the correct location in ISE
Network Resources  OCSP - Not Supported
Services

Users and Identity Stores:


ACS 5 Element ISE Element Exceptions and Fixes

Users and Identity Stores  Internal AdministrationIdentity Management Account disable policy,
Identity Stores  Users IdentityUsers Password type not supported
Users and Identity Stores  Identity AdministrationIdentity Management in ISE 2.0 (Supported in ISE
groups  User Identity Groups  User 2.1).
identity Groups. Disable password hashing for
(A valid User and User Identity group users if using ACS 5.7/5.8
name can contain alphanumeric and Naming constraints. If using
~@# $&*_+.- characters.) ISE 2.0/2.1, need to fix names
during policy gap analysis.
Enable password option: Users and Enable Password option: (Workcenter Check the password policy
Identity Stores  Internal Identity  Device AdminIdentityUsers for defaults, password history,
Stores  Users(create user) (Add Users) password Lifetime.
Users and Identity Stores  Internal AdministrationIdentity Management Wild cards are not supported
Identity Stores  Hosts IdentityEndpoints. in ISE.
(A valid MAC address consists of six
octets, separated by ':','.' or '-'. Valid
octets contain 0-9,a-f,or A-F only.)
User Identity Stores External Identity Administration  Identity Description, RSA instance
Store ManagementExternal Identity Store file, Display RSA missing
secret will not be migrated.
RSA sdopts.rec file and
secondary information are not
migrated.
User Identity Stores Certificate AdministrationCertificates Migration not supported.
Authorities Certificate Management  Trusted
Certificates
User Identity Stores Certificate Administration  Identity Name Constraints. If using
Authentication profile ManagementExternal Identity ISE 2.0/2.1, fix name
StoreCertificate Authentication mismatch in ACS.
Profile
(A valid name can contain
alphanumeric and underscore(_)
characters.)

Cisco Systems © 2017 Page 19


SECURE ACCESS HOW-TO GUIDES

User and Identity Store  Identity Administration  Identity Management Additional Attribute retrieval
Store Sequence  Identity Store Sequence not supported in ISE. See 1
for more details.

Policy Elements:
ACS 5 Element ISE Element Exceptions and Fixes

Policy Elements  Authorization and PolicyPolicy Elements  Results Unique name required. Name
Permissions  Network Access Authorization profile Conflicts (shared namespace
Authorization Profiles in ISE)
Policy Elements  Authorization and PolicyPolicy Elements  Results  Unique name required.
Permissions  Named Permission Downloadable ACL
Objects  Downloadable ACL
Policy Elements Device Work Centers  Device Administration No Callback verify, No
Administration Shell Profiles  Policy Results  TACACS Profiles hangup, Callback line,
CallBack Rotary is not
supported in ISE.
Unique name required.
Recommend using a prefix for
Device admin Authorization
Results.
Policy Elements  Device Work Centers  Device Administration Unique name required.
AdministrationCommand Sets  Policy Results  TACACS
Command Sets

Access Policies:
ACS 5 Element ISE Element Exceptions and Fixes

Access policies Access Services with TACACS+: Work Center  Device


external proxy + Service selection rule Admin Policy Sets + Proxy Sequence +
with Proxy Service Proxy server sequence.
RADIUS: Policy  Policy sets 
Authentication policy
Access policiesAccess Services  Policy Policy Elements  Results
Allowed protocols Authentication  Allowed Protocols
Access policiesAccess Service Device Admin Policy Sets Policy model difference.
 Service Selection rule  Policy set criteria Group mapping not supported
in ISE. See 1 for more details.
 Identity rule  Authentication policy
ISE 2.0 through ISE 2.2 does
 Authorization rule  Authorization Policy not support rule condition that
 Group mapping has different operators.

Cisco Systems © 2017 Page 20


SECURE ACCESS HOW-TO GUIDES

See Appendix D for


information on supported rule
elements. Cleanup the
Authorization rule conditions
in ACS to eliminate
combination (AND and OR).
Policy Elements  Max User Sessions - Not Supported in ISE 2.0 and
ISE 2.1.
Foot note:
1. Group mapping and additional attribute can be configured in ISE post migration by creating new condition
(advanced option) in the authorization policy inside Device Admin policy Set. To do that, please make sure to
add Microsoft Active Directory from Administration Identity Management External Identity sources. You
can add up to 50 domains in ISE. Go to groups tab and attributes tab to download groups and attributes from
AD (or external ID store) to be used in the conditions inside authorization policy.

Monitoring and Reporting:

ACS 5 Element ISE Element Exceptions and Fixes

Monitoring and Reports  Launch OperationsRADIUS, Operations Migration not supported


Monitoring and Report viewer TACACS+, OperationsReports

System Administration:
ACS 5 Element ISE Element Exceptions and Fixes

System Administration  WorkCenter  Device None.


Configuration  Global System AdminSettings
Options  TACACS+ Settings
System Administration  Operations AdministrationSystemMaintenanc Migration not supported
Software repositories, eRepository
System Administration  Operations Administration System
Distributed system information Deployment Deployment
System Administration Operations  Administration Sytem Backup Migration not supported
Scheduled Backups and Restore
System Administration Administration System  Admin Migration not supported
AdministratorsAccounts, Roles Access Administrators,
and Administrators settings Authentication, Settings
System Administration Administration System Migration not supported
ConfigurationLocal Certificates CertificatesCertificate
ManagementSystem Certificates

Cisco Systems © 2017 Page 21


SECURE ACCESS HOW-TO GUIDES

System Administration Administration  System Logging Migration not supported


ConfigurationLog Configuration
System Administration Policy Policy Elements Identity and host attributes that
ConfigurationDictionariesIdentit Dictionaries Users are of type date are not
y users, Hosts Policy Policy Elements supported in ISE. This is
Dictionaries SystemsEndpoints supported in ISE 2.3.
Identity Dictionary attribute
Maximum length, default
value, Mandatory fields, Add
policy condition and Policy
condition display name not
supported in ISE.
System Administration Policy Policy Elements Not migrated. Only RADIUS
ConfigurationDictionariesProtoc DictionariesSystemRADIUS VSA not in ISE will be
ols RADIUS  RADIUS IETF RADIUS IETF migrated.
System Administration
ConfigurationDictionariesProtoc Policy Policy Elements
ols RADIUS VSA DictionariesSystemRADIUS
RADIUS VSA

Step 10 If your configuration object is not in the list above, here is the complete list of data mapping of objects that
are supported for migration between ACS and ISE 2.0. Please get familiarized with this so as to understand
the gaps and results during and after the migration process.

Staging Environment for Migration


Step 11 Create separate instance of ACS server for staging the migration to perform tests in the lab and necessary
changes in the configuration. In this case, all changes will be done in that staging environment and will not
affect production environment.
Note: Remember that when doing backup/restore of ACS, the restore process carries over system
certificates to the staging server.
Step 12 Install ISE server in standalone mode using the instruction here . The migration process will be successful
with a clean installation on a standalone ISE node with bootstrap configuration. It is recommended to take a
clean ISE configuration backup of the default configuration state in case the migration process is disrupted
during the import process.
It is highly recommended to use staging environment to test resulted configuration. If lab environment allows ISE 2.x
should be connected to external ID store such as LDAP or AD then test authentication/authorization request to see that
ISE 2.x performs basic functionality as expected. Please also download the AD/LDAP groups and attributes used in
your existing ACS configuration.

Cisco Systems © 2017 Page 22


SECURE ACCESS HOW-TO GUIDES

Migration tool requirements


Migration tool is a separate tool available for download on each ISE web interface from the Device admin work center.
You can download the migTool.zip file in the following ways.

 By entering the following URL on the browser address bar: https://<hostname-or-hostipaddress of ISE
>/admin/migTool.zip
 Alternately, you can navigate to the Work Centers  Device Administration  Overview page, and
click the migration tool in the Prepare section to download the migration tool.
 Migration tool requires specific version of the migration tool for specific ISE versions. If you are using
ISE 2.2 and above, please go to the software download center for the specific version of ISE and download
the migration tool.
This is aimed to assist with configuration migration from ACS 5.5+ to ISE 2.x. Migration tool is supported in both
Windows and Linux machines. For large deployment please make sure you have 2GB RAM and 1 GB hard disk to run
the migration. Migration Tool uses Java run-time executable (JRE7 and not below) and libraries and can be run on
supported Windows and Linux platform.

Installation and configuration of the Migration Tool.


Step 13 After downloading the tool save it to a local folder on your Windows machine, migration tool need to be
unzipped into empty working folder where it will have its folder structure for binaries, logs and
configuration files.
Step 14 Edit the config.bat file to set the initial amount of memory allocated for the java Heap Sizes. (Set the initial
amount of memory allocated for the java Heap Sizes for the migration process in the config.bat file. The
attribute to set the heap size in config.bat is: _Xms = 64 and _Xmx = 1024 (The memory is 64 and 1024
megabytes, respectively).
Migration Tool establishes secure communication to ACS, for exporting configuration and to ISE for importing
configuration. For that purpose, migration tool uses system/local certificates (for self-signed certificates) or root CA
certificates (for CA signed certificates) that have to be exported from ACS 5 and from ISE 2.0.
Step 15 In ACS, the local certificate can be found in the UI when you go to System
AdministrationConfigurationLocal Server CertificatesLocal Certificates. From the list of
entries, the entry which has Protocol “Management Interface”, need to be exported.
Note: Only certificate (not private key) need to be exported.
Step 16 Browse ISE 2.x UI and go to system certificate by going to
AdministrationSystemCertificatesSystem Certificates. Observe the entry that has usage “admin”.
This certificate need to be exported.
To run the migration tool please make sure that you use super admin credentials and do the following
Step 17 Copy the ISE and ACS trusted certificate on the Windows client machine running the tool. Click
migration.bat from the migTool folder to launch the migration process. Click Yes to display a list of
unsupported and partially supported objects. Click Close.
Step 18 Go to SettingsTrusted Certificates, click Add, choose the root certificate to add, the certificate will
appear in the list.

Cisco Systems © 2017 Page 23


SECURE ACCESS HOW-TO GUIDES

Tip: The root CA certificate of the ACS server certificate that got restored in the staging ACS server needs
to be added to the migration tool.
Step 19 Enable the migration interface in ACS and ISE with the following commands from the CLI.

From ACS CLI, Enter acs config-web-interface migration enable

From ISE CLI, Enter application configure ise.


Enter 11 for Enable/Disable ACS Migration.
Enter Y.

Step 20 Migration tool uses DN host name (FQDN in ISE) to establish communication between itself and ACS or
ISE, hence hostnames of ACS and ISE machines need to be DNS resolvable.
Tip: Make sure to have a DNS entry for the hostnames for proper resolution. Remember to use the
hostname and not the IP address in the tool dialog box while importing/exporting. This hostname should
match the name in the server certificate.
Step 21 If DNS resolution does not work, create an entry in the host file on your Windows machine. Please make
sure the DN in the certificate matches the IP address and hostname entries in hosts file in your Windows
machine (location: C:\Windows\system32\drivers\etc).
Note: You might get an error message if any of the above are not complete. Please also make sure you have
ACS service running with a compatible license.
Warning: It is recommended to build dedicated temporary ACS machine for staging the migration. Please
do not use the production environment.

Supported/ Unsupported objects for migration


The migration tool will automatically migrate ACS 5 supported entities to the ISE 2.x. Here is a complete list of
objects supported, not supported and partially supported. Please take time to get familiar with this.
There are unsupported/ partially supported list on key areas that appears as a dialog box when you start the tool. You
can also find this when you click the Help menu from the tool. This does not cover logs, backup and other
management areas. For a more complete listing please use the link above.

Preparation for Migration from Cisco Secure ACS, Release 5.5+


Step 22 You must consider the following before you start migrating Cisco Secure ACS data to Cisco ISE:

 Migrate Cisco Secure ACS, Release 5.5+ configuration data only when the Policy Set mode in Cisco ISE,
Release 2.0 is configured. Enable Policy set in ISE UI by browsing to
AdministrationSystemSettingsPolicy sets
 Migrate on a fresh installation of Cisco ISE, Release 2.x.
 Generate one policy set per an enabled rule in the Service Selection Policy (SSP) and order them
according to the order of the SSP rules.

Cisco Systems © 2017 Page 24


SECURE ACCESS HOW-TO GUIDES

We recommend that you do not change to Simple mode after a successful migration from Cisco Secure ACS. Because,
you might lose all the migrated policies in Cisco ISE. You cannot retrieve those migrated polices, but you can switch
to Policy Set mode from Simple mode.
Note: The service that is the result of the Service Selection Policy default rule in ACS becomes the default policy set
in Cisco ISE, Release 2.0. For all the policy sets created in the migration process, the first matching policy set is the
matching type.
Step 23 It is important understand the differences between the Service selection policies in ACS and policy sets in
ISE. The policy set migration guidelines provides a list of considerations as part of pre-migration to help
migrate Access services and service selection rules from ACS to ISE.

Cisco Systems © 2017 Page 25


SECURE ACCESS HOW-TO GUIDES

Migration process (assisted with Migration Tool)


Migration tool is the heart of automatic migration. Migration can also be done manually or using import/export
utilities. For simplicity, we discuss the automatic migration process in this document using migration tool. Here are
some tips how to use on the migration tool UI. A screen shot of the migration tool is shown below.

 The Migrated objects will have main container such as Policy Elements etc. Please click on the
container to open it to view the objects migrated.
 You can see that all the containers have a progress bar . The objects under the containers
have a status bar in green showing the status of the import or export.
 The Count shows the number of object imported/exported.
 The Warnings and Errors count will appear if there is a warning or error during the import and
export phase of the migration.
 By clicking on the error/warning count you can open the corresponding report.
 The Policy gap analysis report shows the gap analysis in the policies between ACS and ISE as
part of import/ export process.
 The Import Reports and Export Reports button will open up the corresponding reports to
understand and analyze errors/warnings during the import and export phase.
 The Settings tab is used for importing CA certificates and for default settings for migration. Please
do not change the default settings unless absolutely necessary.
 Log console displays the activity log that includes tracks the tool process and issue warning/errors.
This is stored in migration.txt file under the migTool folder.

Migration is an iterative process, consisting 3 phases, exporting configuration, gap analysis and finally the import
process. The export process needs to be repeated since there may be exceptions and errors that will appear during
exporting. Corrective actions need to be taken based on the exceptions that appear on the reports.

Cisco Systems © 2017 Page 26


SECURE ACCESS HOW-TO GUIDES

Exporting configuration:
Warning: You cannot use NAT between the migration machine and the ACS 5.x server.
Step 24 Please use the tables after step 9 to understand the types of the objects before exporting objects from ACS.
Click ‘Export from ACS’ button to start the export.
Step 25 Type in the ACS host name, admin user name and password, click Connect.
Step 26 Observe the progress of exporting via progress bars per container and per individual objects. Time spent
for export process greatly depends on configuration size and amount of entities to be exported.
Note: Migration tool will export or import all the supported object once and lists the gaps, errors if an
objects are not supported in ISE (or) if ISE already has the objects available (or) if the character set does
not support it etc. You cannot stop the migration tool in-between. However you can exit out of it and it
should start from where it stopped.
Step 27 To get more information about a warning or an error that occurred during the export process, click any on
the link under ‘Warnings’ or ‘Errors’ column on the Migrations tab. The ‘Object Errors and Warnings
Details’ window displays the result of a warning or an error during export. It provides the object group, the
type, and the date and time of a warning or an error.
Step 28 Data export process may take long time depending the configuration. If you have a large number of
network devices it (for e.g.: 15k it will take up to 4-5hours). When the data export process has completed,
the Cisco Secure ACS to Cisco ISE Migration Tool window displays the status of export that Exporting
finished.
Note: It was observed that sometimes the progress bar across the objects shows complete but the export
process status does not change to Export finished. In such case, please open the export report to see the
status of the export at the bottom of the report to proceed.
Step 29 Open the export report by clicking on the Export report(s) button as shown in the screenshot above.
Export report will have information that will help do gap analysis.

Cisco Systems © 2017 Page 27


SECURE ACCESS HOW-TO GUIDES

Policy Gap Analysis:


Step 30 Upon export completion, administrator should analyze results by reviewing ‘Export Report”, “policy gap
report”, fix listed errors in the ACS configuration and should re-run process ones again. When errors are
fixed, warnings and other issues are addressed and understood, administrator should perform export once
again and use the data for importing.
Step 31 Important: Please make a copy of these reports every time you run the tool for comparison. The policy
gap report gets overwritten when you run the import on the next step.
Note: Log files are stored in the “reports” sub-folder where migration tool running. This can be reviewed,
archived and shared for auditing purposes. These are the files available to review export_report.txt,
import_report.txt, policy_gap_report.txt. Please rename the policy_gap_report.txt file since this will be
overwritten during the import process.
Here are some sample output from the export report showing name constraints on objects.
Note: This is specific to ISE 2.0/2.1. The migration tool for ISE 2.2+ automatically converts unsupported
characters to supported characters in ISE

==========================================
Object Type: Users
==========================================
> 2016.01.27 18:24:56'561 : 'america\sample.adm' will not be exported because the name contains
special characters or space that are not supported by ISE.
The valid name can contain alphanumeric and ~@# $&*_+.- characters

==========================================
Object Type: Certificate Authentication Profile
==========================================
> 2016.01.27 18:24:57'996 : 'CN Username' will not be exported because the name contains space or
special characters that are not supported by ISE.
The valid name can contain alphanumeric and underscore(_)

Object Type: Network Devices


==========================================
> 2016.01.27 18:30:03'024 : 'sample.device.us' will not be exported because the name contains
special characters that are not supported by ISE.
The valid name can contain alphanumeric, hyphen(-) and underscore(_)

=========================================
Object Type: Authorization Profiles
==========================================
> 2016.01.27 18:30:49'605 : 'DenyAccess': will not be exported because it is predefined in ISE.
> 2016.01.27 18:30:49'621 : 'Deny Access' will not be exported because the name contains special
characters that are not supported by ISE.
The valid name can contain alphanumeric, space and !@#$%&()-_+{};'<>.?/~ characters

Note: During the policy export, the migration tool will provide this information in the policy gap analysis
report. Object Names that are not compatible with ISE 2.0/ISE 2.1 will not be processed. Hence import
policies and rules may not be possible, partial configurations are not allowed.

Cisco Systems © 2017 Page 28


SECURE ACCESS HOW-TO GUIDES

Step 32 For parity gaps observed per configuration set between ACS and ISE. Reconciliation is possible for some
of these, for others alternate method needs to be chosen. Please see the tables from Step 9 for details to fix
the parity gaps. Future versions of ISE is expected to close the gap. Here is the sample behavior for
Network Devices/ Network Device Groups below during reconciliation.

Network Devices/ Network Device Groups:


Reconciliation flow for Migration Tool
 If Device does not exist in ISE (Defined by no overlap of IP configuration)
o Then it will be added during migration.
 If Device does exist (IP/subnet exactly matches) and (name exactly matches)
o Then migration will updates detail to add TACACS+ elements
 If only approximate match. (name matches exactly, or IP/subnet matches exactly, but not both)
o Then migration tool reports error.

Warning: The migration tool migrates all the policies when they are compatible. However, it will not migrate any of
the policies if one or more are incompatible. Please make sure to fix all the access policies for error by analyzing the
policy gap report.
Step 33 Once the errors/warnings are reviewed and corrected start the export process once again. Go back to the
Exporting configuration: section above. Start the export process again. Go through the Policy gap analysis and
make sure that it is clean after looking at all exceptions and go the next step.

Importing configuration:

Step 34 Administrator should connect to target ISE 2.x using FQDN and should start import configuration into ISE.
Click on “Import to ISE” button from the screenshot above to start the import. During importing, the
migration tool will create a report that can be opened from the menu. Generally, if ACS configuration is
clean, import process does not produce any errors.
Step 35 In the LDAP Identity Store drop-down list, select the identity store to which you want to add attributes,
and click Add Attribute. These attributes will be imported from the ID store during migration.
Alternatively, you can Cancel it to skip adding LDAP attribute. Skip the next step and go the following
step to proceed further.
Step 36 Enter a name in the Attribute Name field, choose an attribute type from the Attribute Type drop-down list,
enter a value in the Default Value field, and click Save & Exit.
Step 37 When you have finished adding attributes, click Import to ISE, enter the Cisco ISE Fully Qualified
Domain Name (FQDN), username, and password in the ISE Credentials window and click Connect. The
migration tool checks that the Hostname/FQDN matches the CN in the SSL certificate. You will see an
error if does not match. Please make sure your DNS hostname of ISE is the same as CN of the certificate
being used.
Step 38 Data import process will take time to complete depending on the configuration. When the data import
process has completed, the Cisco Secure ACS to Cisco ISE Migration Tool window displays the status of
import that Importing finished.
Step 39 To view a complete report on the imported data, click Import Report(s).
Step 40 To get more information about a warning or an error that occurred during the import process, click any
underlined numbers in the Warnings or Errors column on the Migrations tab.

Cisco Systems © 2017 Page 29


SECURE ACCESS HOW-TO GUIDES

Step 41 To analyze the policy gap between Cisco Secure ACS and Cisco ISE, click Policy Gap Analysis Report.
Step 42 At any time, click View Log Console to display a real-time view of the export or import operations.
Warning: If you have multiple deployments of ACS and are merging to ISE then migration tool will only add
configuration not merge with the exception of Network devices. Even for Network devices if there are two separate
deployments one for RADIUS and another for TACACS+, migration tool will add configuration to the same entry.
This may change in the future. It is highly recommended to start import on clean ISE configuration.
Upon completion, it is necessary to review results in ISE 2.x UI for consistency and integrity. All policies have to be
based on existing rules, which, in turn should create existing and logically sound results, for e.g. shell profiles,
commands sets and authorization profiles.
Note: It is highly recommended to check policy’s order and security logic at this point and change it in ISE. More
specific policies for e.g., analyzing specific user names usually allow access, default policies usually deny assess.
Step 43 Once the migration is complete and successful, and take an ISE backup of all the configuration imported
from ACS and name it suitably.

Verifying migration of access policies


Migrating policies is a most important and crucial phase of the whole process. While translating policies from ACS to
ISE user need to take into considerations following:
ACS has so called “Service Selection Rule(s)” and “Service Selection Policies” which are not present in ISE. ISE 2.x
has “Policy sets” and rules under that are automatically created while migration from ACS to ISE. Picture below
shows mapping between ACS “Service Selection Policies” and ISE “Policy Set”.
On the screenshot below, Rule1 represents Service Selection Rule which is matching RADIUS protocol used in
“Radius Authentication” service.

Rule 1 from the Service selection policy will be migrated to Policy Policy Sets as new Policy Set for
RADIUS(observe the screenshot below). Rule 2 will be migrated to Work Center Device Administration
Device Admin policy sets in TACACS+ work center as shown below.

Cisco Systems © 2017 Page 30


SECURE ACCESS HOW-TO GUIDES

Rule 2 from ACS

Rule 1 from ACS

Rule 4 from ACS

In ACS, Service Selection policy will result in an access service. For e.g., Rule 4 for TACACSAMERICAS from
screenshot above resulted in “PA-AMERICAS Network Device” as access service. Every access services consists of
two parts, Identity and Authorization. As an example we see how Rule 4 from screenshots above was migrated from
ACS to ISE.
Identity Rule in ACS

Authorization Rule in ACS.

Next screenshot from ISE 2.0 will show how ACS rules translated into ISE Policy Sets after migration.

Cisco Systems © 2017 Page 31


SECURE ACCESS HOW-TO GUIDES

Service Selection rule Name


Service Selection rule
–Compound Condition

Access Services – Allowed protocol

Service selection rule – Compound


Identity Source Condition

Authorization rule – Compound condition,


Authorization rule Name “in” operator in ACS is replaced by
“STARTS_WITH” in ISE. See Appendix D

This example was sample of real world configuration, though same idea will be applied to set of rules of any
complexity.
RADIUS Access policies: RADIUS access policies can be verified the same way however for RADIUS flows the
policy will have a different Network access protocol. Authorization policy shown in the screenshot above will be
mapped to Authorization profile instead of command sets and Shell profiles. From ISE UI, please go to PolicyPolicy
Sets for this.
External Proxies: When adding an external proxy server or verifying the configuration. Here are the steps
For RADIUS:
1. Create/verify external RADIUS server configuration by visiting Administration  Network resources External
Radius Server from ISE UI.
2. Verify that the Access Services selection for service type external proxy in ACS are migrated to Administration
Network resources RADIUS Server Sequences in ISE. In ACS, you have go to Access services and click
on the external proxy policy for the configuration.
3. Verify that the Service Selection Rules from ACS for external proxy is migrated to PolicyPolicy Sets in ISE.
Adding proxy sequence is part of the authentication policy in ISE UI. You can create one by editing authentication
policy, clicking on “Allowed protocols” drop down for the authentication policy, click RADIUS Server sequence
and select the correct name.

Cisco Systems © 2017 Page 32


SECURE ACCESS HOW-TO GUIDES

Step 1

Step 2

For TACACS:
1. Verify the external TACACS server and TACACS+ Server sequences has entries by browsing ISE UI , go to Work
Centers  Device AdministrationNetwork Resources. Check that the Access Services Selection for service
type external proxy in ACS is migrated to TACACS+ Server sequences.
2. For TACACS+ proxy sequence, go to Work Centers Device AdministrationPolicy sets under the policy set
criteria. Make sure the Proxy sequence is selected and the correct TACACS+ Server sequence entry is selected
from the dropdown.

Step 1

Step 2

Supporting chatty devices (TACACS+ single connect)


“Single connect” feature in ISE has two modes RFC standard and (compatibility) mode. When ‘single connect’
feature is turned on per device, it will negotiate, sustain TCP connection and will pass multiple TACACS+ transactions
to ISE. Such connection will stay considerably longer than regular TCP connections. This will help “chatty” devices
pass-through TACACS+ transactions once a connection is established and the TCP link is sustained in a most effective
way. Other devices where this option is not turned on will establish TCP link by demand. This will help “chatty
devices” in getting higher preference during high load condition.
During upgrade preparation, network administrator should create a list of most active Network devices (NAS’s), ACS
can provide such reports and statistics – this list may contain up to several thousand devices. It is recommended to
make those NASs to talk to ISE PSN with TACACS+ single connect enabled. Rest of the NASs will not use single
connect.
You have to login to ISE UI, browse to Work Centers Device AdministrationNetwork resourcesNetwork
Devices and go to TACACS+ authentication settings to enable this per device.

Cisco Systems © 2017 Page 33


SECURE ACCESS HOW-TO GUIDES

Note: It is very important to estimate number of simultaneous connections that might be established to single ISE PSN
in order to avoid TCP socket starvation.
Step 44 This is post-migration activity to improve TACACS + efficiency for chatty devices. Create a list of chatty
network devices and enable single connect mode for them with the TACACS+ draft option enabled as
shown in the screenshot above.
Step 45 ISE allows you to export and import “Network devices” list. Export the existing network device list as a
csv file. Open the csv file in Microsoft Excel or other spreadsheet supporting software.
Step 46 Change the values of the column ‘TACACS:Connect Mode Options:String
(OFF|ON_LEGACY|ON_DRAFT_COMPLIANT)’ for the list of chatty devices to
“ON_DRAFT_COMPLIANT”. Save the file as csv.
Step 47 Import this csv to ISE. The export and import process takes time depending the number of network devices.
Please be patient while importing or exporting large sets of devices.
Step 48 Take an ISE backup of all the configuration imported from ACS and name it suitably. ISE configuration
can be restored into production with backup/restore process in ISE software. While doing this please make
sure the ISE versions and patch level are the same in your staging and production system.
Note: For CA signed certificates, please make sure you create the server certificates in advance based on the number
of servers including PAN, MnT and PSN’s.

Step 49 FINAL STEPS: Once the ISE server (PAN) is in production, install additional nodes (MnT and PSN’s)
and allow it to replicate.
Step 50 Change the TACACS+ and/or the RADIUS configuration on few Network devices to point to ISE server
(Policy Services Node) in normal business hours for a few days. Observe for any inconsistencies before
changing the configuration settings on the next set of network devices. Please move the network devices
from ACS to ISE in batches to avoid disruptions.
Step 51 Once you successfully moved all the network devices to the ISE server, monitor your daily log size for
TACACS+ until you move all the network devices for first two months to tune it based on the traffic needs.
Visit the ‘What happens if my logging requirements exceeds the example?’ section of this document for
recommendation on log size considerations.

You have now completed Migration from ACS to ISE

 End of Exercise: You have successfully completed this exercise.

Cisco Systems © 2017 Page 34


SECURE ACCESS HOW-TO GUIDES

APPENDIX A - ACS vs ISE deployment limits


The table below provides the scalability limits of ACS 5.x vs ISE 2.x for planning the ISE deployment.

Attributes ACS 5.x ISE 2.0 Limits ISE 2.1 Limits ISE 2.2 Limits
Limits
Nodes 22 44 (2 PANs, 2 54(2 PANs, 2 MnTs, 54(2 PANs, 2 MnTs,
MnTs, 40 PSNs) 50 PSNs) 50 PSNs)
Endpoints 150,000 250,000 concurrent 500,000 concurrent 500,000 concurrent
endpoints sessions(not specific sessions(not specific
1 M total endpoints to Endpoint or Users) to Endpoint or Users)
1.5M Total endpoints 1.5M Total endpoints
Users 300,000 25,000 Internal 300,000 Internal 300,000 Internal
Users Users Users
1 million Internal
Guests
Admins 50 - - -
Admin Roles 9 - - -
Identity Groups 1,000 500(User), 500(End- 500(User), 500(End- 500(User), 500(End-
point ID) point ID) point ID)
Active Directory 1 join point 50 50 50
Join Points per node
Active Directory 1,500 1000 1000 1000
Group Retrieval
Network Devices 100,000 30,000 (network 100,000 100,000
150,000(35xx) objects not IP’s)
Network Device 10000 100 100 100(10k in ISE 2.3)
Groups
Network Device 6 - - - (6 in ISE 2.3)
Hierarchies
Services 25 - - -
Authentication - 100 100 100(Simple mode)
Rules 200( Policy set mode
- 2 rules + default)
Authorization 320 600 (<100 600 600 (Simple mode)
Rules recommended) 700 ( Policy set
mode)
Conditions 8 8 8 8

Cisco Systems © 2017 Page 35


SECURE ACCESS HOW-TO GUIDES

Authorization 600 600 ( < 100 600 600


Profile recommended)
Service Selection 50 N/A 40(Policy sets) 100(Policy sets)
Policy (SSP)
Network 3,000, 10000 N/A N/A N/A
Conditions (NARs) (ACS 5.8.1)
dACLs 600 dACL 8000ACL’s 8000ACL’s 8000ACL’s
with 100
ACEs each
TrustSec Security - 4,000 4,000 4,000
Group Tags (SGT)
TrustSec Security - 2,500 2,500 2,500
Group ACLs
(SGACLs)
Maximum number N/A 100,000 500,000 500,000/deployment (
of SXP bindings 2 SXPSNs)

Cisco Systems © 2017 Page 36


SECURE ACCESS HOW-TO GUIDES

APPENDIX B – TACACS+ performance per ISE deployment


Dedicated TACACS+ only deployment:
Max Concurrent TACACS+ Sessions/TPS by Deployment Model and Platform
Deployment Model Platform Max # Dedicated Max RADIUS Max T+
PSNs Endpoints per Sessions/TPS
( # recommended) Deployment (TPS for
recommended
PSN’s)
Standalone (all personas on 3415 0 N/A 500
same node) 3495 0 N/A 1,000
(2 nodes redundant)
3515 0 N/A 1,000
3595 0 N/A 1,500
Basic Distributed: Admin + 3415 as Admin+MNT **5 (2 rec.) N/A 2,500 (1,000)
MnT on same node; 3495 as Admin+MNT **5 (2 rec.) N/A 5,000 (2,000)
Dedicated PSN
(Minimum 4 nodes 3515 as Admin+MNT **5 (2 rec.) N/A * 5,000 (2,000)
redundant) 3595 as Admin+MNT **5 (2 rec.) N/A * 7,500 (3,000)
Fully Distributed: Dedicated 3495 as Admin and **40 (2 rec.) N/A 20,000 (2,000)
Admin and MnT nodes MNT
(Minimum 6 nodes 3595 as Admin and **50 (2 rec.) N/A *25,000 (3,000)
redundant) MNT
*Under ISE 2.0.x, scaling for small and large 35x5 appliance same as small and large 34x5 appliance.
** Device Admin service can be enabled on each PSN; minimally 2 for redundancy, but 2 often sufficient.
Red indicates TPS that will cause performance hits on MnT and is not recommended.

Scaling per PSN Platform Max RADIUS Max T+


Endpoints per PSN Sessions/TPS
Dedicated Policy nodes SNS-3415 N/A 500
(Max Endpoints Gated by Total SNS-3495 N/A 1,000
Deployment Size)
SNS-3515 N/A * 1,000
SNS-3595 N/A * 1,500

Cisco Systems © 2017 Page 37


SECURE ACCESS HOW-TO GUIDES

Shared deployment (RADIUS + TACACS+):


Integrated PSNs: PSNs that share RADIUS and TACACS+ service and sharing same Admin + MnT node.
Dedicated PSNs: PSNs that are dedicated for RADIUS only or TACACS+ only service sharing same Admin + MnT.

Max Concurrent RADIUS Sessions / TACACS+ TPS by Deployment Model and Platform
Deployment Model Platform Max #PSNs: Max Max TACACS+
Integrated / RADIUS TPS (Integrated
Dedicated PSNs( Endpoints / dedicated T+
Radius + per PSNs)
TACACS+) Deployment
Standalone (all personas 3415 0 5,000 50
on same node) 3495 0 10,000 50
(2 nodes redundant)
3515 0 7,500 50
3595 0 20,000 50
Basic Distributed: Admin 3415 as Admin+MNT **5 / 3+2 5,000 100 / 500
+ MnT on same node; 3495 as Admin+MNT **5 / 3+2 10,000 100 / 1,000
Integrated / Dedicated
PSNs (Minimum 4 nodes 3515 as Admin+MNT **5 / 3+2 7,500 * 100 / 1,000
redundant) 3595 as Admin+MNT **5 / 3+2 20,000 * 100 / 1,500
Fully Distributed: 3495 as Admin and **40 / 38+2 250,000 1,000 / 2,000
Dedicated Admin and MnT MNT
nodes;
3595 as Admin and *50* / 48+2 500,000 * 1,000 / 3,000
Integrated / Dedicated MNT
PSNs (Minimum 6 nodes
redundant)
** Device Admin service enabled on same PSNs also used for RADIUS OR dedicated RADIUS and T+ PSNs.
* Under ISE 2.0.x, scaling for Small and Large 35x5 appliance same as Small and Large 34x5 appliance.

Scaling per PSN Platform Max RADIUS Max


Endpoints per PSN TACACS+
TPS
Dedicated Policy nodes SNS-3415 5,000 500
(Max Endpoints Gated by Total SNS-3495 20,000 1,000
Deployment Size)
SNS-3515 7,500 1,000
SNS-3595 40,000(ISE 2.1+) 1,500

Cisco Systems © 2017 Page 38


SECURE ACCESS HOW-TO GUIDES

APPENDIX C - ISE VM Sizing and Log retention


Note: ISE 2.0 allows 50% allocation for logging for both RADIUS and TACACS+. ISE MnT requires purging at 80%
capacity. For e.g.: If you have a 600G hard disk, 480G of hard disk will be the effective hard disk space with purging.
Out of the 50% total allocation, 20% allocation is for TACACS+ and 30% is for RADIUS logs.

TACACS+ guidance for size of syslogs:


Message size per TACACS+ Session Message Size per Command Authorization (per
session)
Authentication: 2kB Command Authorization: 2kB
Session Authorization: 2kB Command Accounting: 1kB
Session Accounting: 1kB

TACACS+ transactions, logs and storage


Human Administrators and Scripted device administrator (Robot) model
Session Authentication and Command Accounting Only Auth. + Session + Command
Accounting Only (10 Commands / Session) Authorization + Accounting
(10 Commands / Session)
Avg Peak Logs/ Storage/ Avg Peak Logs/ Storage/ Avg Peak Logs/ Storage/
TPS TPS Day day TPS TPS Day day TPS TPS Day day
# Based on 50 Admin Sessions per Day – Human Admin model
Admins
1 <1 <1 150 < 1MB <1 <1 650 1MB <1 <1 1.2k 2MB
5 <1 <1 750 1MB <1 <1 3.3k 4MB <1 <1 5.8k 9MB
10 <1 <1 1.5k 3MB <1 <1 6.5k 8MB <1 1 11.5k 17MB
25 <1 <1 3.8k 7MB <1 1 16.3k 19MB <1 2 28.8k 43MB
50 <1 1 7.5k 13MB <1 2 32.5k 37MB 1 4 57.5k 86MB
100 <1 1 15k 25MB 1 4 65k 73MB 2 8 115k 171MB
# NADs Based on 4 Scripted Sessions per Day – Scripted Device Admin model
500 <1 5 6k 10MB <1 22 26k 30MB 1 38 46k 70MB
1,000 <1 10 12k 20MB 1 43 52k 60MB 1 77 92k 140MB
5,000 <1 50 60k 100MB 3 217 260k 300MB 5 383 460k 700MB
10,000 1 100 120k 200MB 6 433 520k 600MB 11 767 920k 1.4GB
20,000 3 200 240k 400MB 12 867 1.04M 1.2GB 21 1.5k 1.84M 2.7GB

Cisco Systems © 2017 Page 39


SECURE ACCESS HOW-TO GUIDES

30,000 5 300 360k 600MB 18 1.3k 1.56M 1.7GB 32 2.3k 2.76M 4.0GB
50,000 7 500 600k 1GB 30 2.2k 2.6M 2.9GB 53 3.8k *4.6M 6.7GB
*Red indicates logs/ day that will cause performance hits and slowness in log processing.

TACACS+ log retention (# of days):


Please see the static tables below for easy use. If you are an advanced user and would like to customize number of
commands/sessions etc., please use the ISE MnT Log sizing calculator for TACACS+ and RADIUS .

Scripted device admin model.


Number of sessions per day: 4
Number of commands: 10
Message Size /session (KB) = 5kB + Number of commands/session *3kB
Automated access(single script) log size calculation = n Number of devices * 4 Sessions * Message size
E.g. : Log Size for 30k Network devices = 4GB/day
ISE 2.1(20% allocation):

# of Network Devices in MnT Disk Size(GB)


the deployment
200 400 600 1024 2048

500 480 959 1439 2455 4909


1000 240 480 720 1228 2455
5000 48 96 144 246 491
10000 24 48 72 123 246
20000 12 24 36 62 123
30000 8 16 24 41 82
50000 5 10 15 25 50
ISE 2.2 (60% disk allocation):

# Network Devices 200 GB 400 GB 600 GB 1024 GB 2048 GB


(days) (days) (days) (days) (days)
100 12,583 25,166 37,749 64,425 128,850
500 2,517 5,034 7,550 12,885 25,770
1,000 1,259 2,517 3,775 6,443 12,885
5,000 252 504 755 1,289 2,577
10,000 126 252 378 645 1,289
25,000 51 101 151 258 516

Cisco Systems © 2017 Page 40


SECURE ACCESS HOW-TO GUIDES

50,000 26 51 76 129 258


75,000 17 34 51 86 172
100,000 13 26 38 65 129

Human admin – device admin using sample number of sessions and commands shown below.
Number of sessions: 50
Number of Commands/session: 10
Message Size /session (KB) = 5kB + Number of commands/session *3kB
Manual access log size calculation = 50 Sessions * N Admins * Message size
E.g. : Log Size for 50 admins = 85.4MB/ day

Number of Admins\ Disk MnT Disk Size (GB)


Size(GB)
200 400 600 1024 2048
5 3835 7670 11505 19635 39269
10 1918 3835 5753 9818 19635
20 959 1918 2877 4909 9818
30 640 1279 1918 3273 6545
40 480 959 1439 2455 4909
50 384 767 1151 1964 3927

RADIUS Log retention (# of days)


Number of Authentications per day per endpoint: 100
Custom Disk Size (GB): 500
Max. Allocated MnT Tablespace (GB): 120
Message size per Auth. (KB): 4
Log Size/day: Number of Endpoints * 10 auth./day * Message Size
ISE 2.1 – (30% disk allocation)

Number of Endpoints MnT Disk Size (GB)


200 400 600 1024 2048 Custom
10,000 126 252 378 645 1,289 315
20,000 63 126 189 323 645 158
30,000 42 84 126 215 430 105
40,000 32 63 95 162 323 79
50,000 26 51 76 129 258 63
100,000 13 26 38 65 129 32

Cisco Systems © 2017 Page 41


SECURE ACCESS HOW-TO GUIDES

150,000 9 17 26 43 86 21
200,000 7 13 19 33 65 16
250,000 6 11 16 26 52 13

Note: Above values are based on controlled criteria including event suppression, duplicate detection, message size, re-
authentication interval, etc. and result may vary depending on the environment.

ISE 2.2 – (60% disk allocation)

Total Endpoints 200 GB 400 GB 600 GB 1024 GB 2048 GB


(days) (days) (days) (days) (days)
5,000 504 1007 1510 2577 5154
10,000 252 504 755 1289 2577
25,000 101 202 302 516 1031
50,000 51 101 151 258 516
100,000 26 51 76 129 258
150,000 17 34 51 86 172
200,000 13 26 38 65 129
250,000 11 21 31 52 104
500,000 6 11 16 26 52

Cisco Systems © 2017 Page 42


SECURE ACCESS HOW-TO GUIDES

APPENDIX D - Unsupported Rule Elements


Cisco Secure ACS and Cisco ISE are based on different policy models, and there is a gap between pieces of Cisco
Secure ACS data when it is migrated to Cisco ISE. When Cisco Secure ACS and Cisco ISE release versions change,
not all Cisco Secure ACS policies and rules can be migrated due to:
Unsupported attributes used by the policy
Unsupported AND/OR condition structure (mainly, once complex conditions are configured)
Unsupported operators

Rule Elements Status of Description


Support
Date and Time Supported Date and time conditions in an authorization policy that have a weekly
in ISE 2.3 recurrence setting, are not migrated to Cisco ISE. As a result, the rules are also
not migrated.
Date and Time Supported Date and time conditions in an authentication policy are not migrated to Cisco
in ISE 2.3 ISE. As a result, the rules are also not migrated.
In Supported The "In" operator is converted to STARTS_WITH.
Not In Supported The "Not In" operator is converted to NOT_STARTS_WITH.
Contains Any Supported The "Contains Any" operator is converted to a compound condition with
EQUALS & OR operators.
Example: In ACS, AD ExternalGrp Contains Any (A, B) is converted to (AD
ExternalGrp Equals A) OR (AD ExternalGrp Equals B) in Cisco ISE.
Contains All Supported The "Contains All" operator is converted to a compound condition with
EQUALS & AND operators.
Example: In ACS AD:ExternalGrp contains all A;B is converted to (AD
ExternalGrp Equals A) AND (AD ExternalGrp Equals B) in Cisco ISE.
Combination of Supported Rules that use these operators in their conditions are not migrated:
logical in ISE 2.3 Authentication policies that include compound conditions that have different
expressions logical expressions other than a || b || c || … and/or a && b && c && … such as
(a || b) && c.
Authorization policies that include compound conditions that have different local
expressions other than a && b && c && are not migrated as part of the rule
condition.
Workaround: You can manually use library compound conditions in ISE for
some advanced logical expressions. You can also split the compound condition
such as (a || b) && c to two simpler rules with a || b and c.
Network Supported Rules that include only network conditions are not migrated. In case the
conditions in ISE 2.2 condition includes network conditions and other supported conditions, the
network conditions are ignored and are not migrated as part of the rule condition.
Workaround: Can use authorization condition for the attributes.

Cisco Systems © 2017 Page 43


SECURE ACCESS HOW-TO GUIDES

User attributes Partially Rules with conditions that include user attributes with a data type other than the
Supported “String” data type are not migrated.
Host attributes Not Authentication fails in case the condition refers to host attributes.
Supported Authorization policies that include a condition that has host (endpoint) attributes
are not migrated to Cisco ISE authorization policies.
Please see supported attributes and data types for additional information on User,
Host and Radius attributes.

Cisco Systems © 2017 Page 44


SECURE ACCESS HOW-TO GUIDES

APPENDIX E - ACS vs ISE Feature Comparison


Full feature comparison can be found at ACS vs ISE comparison community site.

TACACS+ ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.3

TACACS+ per-command authorization and accounting Yes Yes Yes Yes


TACACS+ support in IPv6 networks No Yes No Yes

TACACS+ change password Yes Yes Yes Yes


TACACS+ enable handling Yes Yes Yes Yes
TACACS+ custom services Yes Yes Yes Yes
TACACS+ proxy Yes Yes Yes Yes
TACACS+ optional attributes Yes Yes Yes Yes
TACACS+ additional auth types (CHAP / MSCHAP) Yes Yes Yes Yes
TACACS+ attribute substitution for Shell profiles Yes Yes Yes Yes
TACACS+ customizable port Yes Yes Yes Yes
TACACS+ Command Sets Import/Export N/A Yes No Yes

RADIUS ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.3


PAP Yes Yes Yes Yes
CHAP Yes Yes Yes Yes
MS-CHAPv1 and v2 Yes Yes Yes Yes
EAP-MD5 Yes Yes Yes Yes
EAP-TLS Yes Yes Yes Yes
PEAP (with EAP-MSCHAPv2 inner method) Yes Yes Yes Yes
PEAP (with EAP-GTC inner method) Yes Yes Yes Yes
PEAP (with EAP-TLS inner method) Yes Yes Yes Yes
EAP-FAST (with EAP-MSCHAPv2 inner method) Yes Yes Yes Yes
EAP-FAST (with EAP-GTC inner method) Yes Yes Yes Yes
EAP-FAST (with EAP-TLS inner method) Yes Yes Yes Yes
EAP Chaining with EAP-FAST No No Yes Yes
RADIUS Proxy Yes Yes Yes Yes

Cisco Systems © 2017 Page 45


SECURE ACCESS HOW-TO GUIDES

RADIUS VSAs Yes Yes Yes Yes


LEAP Yes Yes Yes Yes
LEAP Proxy Yes No No No

Identity Stores ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.3
Internal User & Host Database Yes Yes Yes Yes
Windows Active Directory Yes Yes Yes Yes
LDAP Yes Yes Yes Yes
RSA SecurID Yes Yes Yes Yes
RADIUS token server Yes Yes Yes Yes
ODBC Yes No No Yes
AD Server specification per ACS/ISE instance Yes Yes N/A 1 N/A 1
LDAP Server specification per ACS/ISE instance Yes No No Yes
Map internal user’s password to an external ID store Yes Yes No Yes

Foot note:
1. ISE supports up to 50 AD domains from the same or from different forests.

Internal Users / Administrators ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.3
Users: Password complexity Yes Yes Yes Yes
Users: Password aging Yes Yes1 Yes 1 Yes 1
Users: Password history Yes Yes Yes Yes
Users: Max failed attempts Yes Yes Yes Yes
Users: Disable user after n day of Yes Yes No Yes
inactivity
Users: User change password (UCP) Yes Yes No No
utility
Admin: Password complexity Yes Yes Yes Yes
Admin: Password aging Yes Yes Yes Yes
Admin: Password history Yes Yes Yes Yes

Admin: Max failed attempts Yes Yes Yes Yes


Admin: Account inactivity Yes Yes No Yes 2
Admin: entitlement report Yes Yes Yes Yes

Cisco Systems © 2017 Page 46


SECURE ACCESS HOW-TO GUIDES

Admin: session and access Yes Yes Yes Yes


restrictions

Foot note:
1. Warning and disable after defined interval. Grace period is not supported
2. Password change after n days of account inactivity not implemented.

Miscellaneous ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.3

Group Mapping Yes Yes No No 1

Machine Access Restrictions caching and Yes 4 Yes Yes 4 Yes 4


Distribution
Network Access Restrictions (NARs) Yes Yes No Yes

Command line / scripting interface (CSUtil) Yes Yes 2 No No


RBAC for ISE Admin to allow administrators' Yes No No Yes 3
rights to access/modify only subset(s) of a class of
objects
Log Viewing and reports Yes Yes Yes Yes

Export logs via SYSLOG Yes Yes Yes Yes

Time based permissions Yes Yes Yes Yes

Configurable management HTTPS certificate Yes Yes Yes Yes

CRL: Multiple URL definition Yes No No No

CRL: LDAP based definition Yes No Yes Yes


Online Certificate Status Protocol (OCSP) Yes Yes Yes Yes
Comparison of any two attributes in authorization Yes Yes Yes Yes
policies
Configurable RADIUS ports Yes No No Yes

API for users, groups and end-point CRUD Yes Yes Yes Yes
operations
Multiple NIC interfaces N/A Yes Yes Yes
Secure Syslogs No Yes Yes Yes

Foot Note:
1. Group mapping can be done with authorization conditions in ISE authorization policy
2. CLI interface is supported for bulk provisioning
3. RBAC for Network devices, NDG and User identity group only
4. ACS 4.2 and ISE 2.0 support MAR cache. ISE 2.1 supports MAR cache between restarts but not distribution.
Cisco Systems © 2017 Page 47
SECURE ACCESS HOW-TO GUIDES

Miscellaneous ACS 4.2 ACS 5.7 ISE 2.0 ISE 2.3

EAP-TLS Certificate lookup in LDAP or AD Yes Yes Yes Yes

Maximum concurrent sessions per user/group Yes Yes No Yes

Logging to external DB (via ODBC) Yes Yes 1 No No

Programmatic Interface for network device CRUD Yes Yes Yes Yes
operations.
Adding hosts with Wildcards Yes Yes No No

Configure devices with IP address ranges Yes Yes No Yes

Lookup Network Device by IP address Yes Yes Yes 2 Yes 2

Dial-in Attribute Support Yes Yes No Yes

User-defined attributes for endpoints/hosts N/A Yes No Yes

Ability to select logging attributes for syslog Yes No No No


messages
RSA Token caching Yes Yes No Yes

Alarm notification on a per-item level N/A Yes No Yes

Foot note:
1. Data can be exported from M&T for reporting. Not supported as log target that can be defined as critical logger
2. Can search by IP address but this can’t be used in combination with other fields as search criteria

Cisco Systems © 2017 Page 48

You might also like