The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to Install a Cisco ISE IOS® instance using Azure Virtual Machine. Cisco ISE IOS is available on Azure Cloud Services.
Cisco recommends that you have knowledge of the Subscriptions and Resource Groups.
The content of this document is based on these software and cloud services.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Navigate to All Services > Subscriptions. Ensure that an Azure account with an active subscription and an enterprise agreement with Microsoft are present. Use Microsoft PowerShell Azure module CLI in order to execute commands to reserve space: (Refer to How to install Azure PowerShell for installing power shell and relevant packages).
Note: Replace the Tenant ID with your actual Tenant ID.
Complete the prerequisites atRequest host quota for Azure VMware Solution for more details.
Create resource group after right subscription, navigating to All Services > Resource groups. Click Add. Enter the Resource group name.
Virtual Network and Security Groups
The Subnet which requires internet reachability must have the route table configured with next hop as internet. See examples of public and private subnetwork. PAN with public IP has both offline and online feed update working, while PAN with private IP must rely on offline feed updates.
Create an SSH Key Pair
a. Use the search bar from the Azure Web Portal home page and search for SSH Keys.
b. From the next window click Create.
c. From the next window, choose the Resource Group and Key Name. Then click Review + Create.
d. Then click Create and download Private Key.
If you use a general-purpose instance as a PSN, the performance numbers are lower than the performance of a compute-optimized instance as a PSN. The Standard_D8s_v4 VM size must be used as an extra small PSN only.
Note: Do not clone an existing Azure Cloud image to create a Cisco ISE instance. Doing this can cause random and unexpected malfunctions in the created ISE machine.
If you create Cisco ISE using the Azure Virtual Machine, by default, Microsoft Azure assigns private IP addresses to VMs through DHCP servers. Before you create a Cisco ISE deployment on Microsoft Azure, you must update the forward and reverse DNS entries with the IP addresses assigned by Microsoft Azure.
Alternatively, after you install Cisco ISE, assign a static IP address to your VM by updating the Network Interface object in Microsoft Azure:
Stop the VM.
In the Private IP address settings area of the VM, in the Assignment area, click Static.
Restart the VM.
In the Cisco ISE serial console, assign the IP address as Gi0.
Restart the Cisco ISE application server.
Dual NIC is supported with only two NICs—Gigabit Ethernet 0 and Gigabit Ethernet 1. In order to configure a secondary NIC in your Cisco ISE instance, you must first create a network interface object in Azure, power off your Cisco ISE instance, and then attach this network interface object to Cisco ISE. After you install and launch Cisco ISE on Azure, use the Cisco ISE CLI in order to manually configure the IP address of the network interface object as the secondary NIC.
Cisco ISE IOS deployments on Azure typically leverage VPN solutions like Dynamic Multipoint Virtual Private Networks (DMVPN) and Software-Defined Wide Area Networks (SD-WAN), where the IPSec tunnel overheads can cause MTU and fragmentation issues. In such scenarios, Cisco ISE IOS does not receive complete RADIUS packets and an authentication failure occurs without triggering a failure error log.
A possible workaround is to seek Microsoft technical support in order to explore any solutions in Azure that can allow out-of-order fragments to pass to the destination instead of being dropped.
a. In the Project details area, choose the required values from the Subscription and Resourcegroup drop-down lists
b. In the Instance details area, enter a value in the Virtual Machine name field.
c. From the Image drop-down list, choose the Cisco ISE image.
d. From the Size drop-down list, choose the instance size that you want to install Cisco ISE with. Choose an instance that is supported by Cisco ISE, as listed in the table titled Azure Cloud.
Instances supported by Cisco ISE, are in the section Cisco ISE on Azure Cloud.
e. In the Administrator account > Authentication type area, click the SSH Public Key radio button.
f. In the Username field, enter iseadmin.
g. From the SSH public key source drop-down list, choose Use existing key stored in Azure.
h. From the Stored keys drop-down list, choose the key pair that you created as a prerequisite for this task.
j. In the Inbound port rules area, click the Allow selected ports radio button.
k. In the Licensing area, from the Licensing type drop-down list, choose Other.
Note: For The Disk Type, there are more options from the drop-down list to choose from. You can choose the one that meets your Needs. Premium SSD is the Recommended Type for Production and Performance Sensitive Workloads.
Note: The subnet with a public IP address receives online and offline posture feed updates, while a subnet with a private IP address only receives offline posture feed updates.
In the User data field, complete the information:
hostname=<hostname of Cisco ISE>
primarynameserver=<IPv4 address>
dnsdomain=<domain name>
ntpserver=<IPv4 address or FQDN of the NTP server>
timezone=<timezone>
password=<password>
ersapi=<yes/no>
openapi=<yes/no>
pxGrid=<yes/no>
pxgrid_cloud=<yes/no>
Note: You must use the correct syntax for each of the fields that you configure through the user data entry. The information you enter in the User data field is not validated when it is entered. If you use the wrong syntax, Cisco ISE services do not come up when you launch the image.
See the Guidelines for the configurations that you must submit through the user data field:
a. hostname: Enter a hostname that contains only alphanumeric characters and hyphens (-). The length of the hostname must not exceed 19 characters and cannot contain underscores (_).
b. primary nameserver: Enter the IP address of the primary name server. Only IPv4 addresses are supported.
You can add only one DNS server in this step. You can add additional DNS servers through the Cisco ISE CLI after installation.
c. dnsdomain: Enter the FQDN of the DNS domain. The entry can contain ASCII characters, numerals, hyphens (-), and periods (.).
d. ntpserver: Enter the IPv4 address or FQDN of the NTP server that must be used for synchronization.
You can add only one NTP server in this step. You can add additional NTP servers through the Cisco ISE CLI after installation. Use a valid and reachable NTP Server since this is needed for ISE Operations.
e. time zone: Enter a time zone, for example, Etc/UTC. It is recommended that you set all the Cisco ISE nodes to the Coordinated Universal Time (UTC) time zone, especially if your Cisco ISE nodes are installed in a distributed deployment. This procedure ensures that the time stamps of the reports and logs from the various nodes in your deployment are always synchronized.
f. password: Configure a password for GUI-based login to Cisco ISE. The password that you enter must comply with the Cisco ISE password policy. The password must contain 6 to 25 characters and include at least one numeral, one uppercase letter, and one lowercase letter. The password cannot be the same as the username or its reverse (iseadmin or nimdaesi), cisco, or ocsic. The allowed special characters are @~*!,+=_-. See the 'User Password Policy' section in the Chapter 'Basic Setup' of the Cisco ISE Administrator Guide for your release.
g. ersapi: Enter yes in order to enable ERS, or no to disallow ERS.
h. openapi: Enter yes in order to enable OpenAPI, or no to disallow OpenAPI.
i. pxGrid: Enter yes in order to enable pxGrid, or no to disallow pxGrid.
j. pxgrid_cloud: Enter yes to enable pxGrid Cloud or no to disallow pxGrid Cloud. In order to enable pxGrid Cloud, you must enable pxGrid. If you disallow pxGrid, but enable pxGrid Cloud, pxGrid Cloud services are not enabled on launch.
The Deployment is in progress window is displayed. It takes about 30 minutes for the Cisco ISE instance to be created and available for use. The Cisco ISE VM instance is displayed in the Virtual Machines window (use the main search field in order to find the window).
Due to a Microsoft Azure default setting, the Cisco ISE VM you have created is configured with only a 300 GB disk size. Cisco ISE nodes typically require more than 300 GB disk size. You can see the Insufficient Virtual Memory alarm when you first launch Cisco ISE from Microsoft Azure.
After the Cisco ISE VM creation is complete, log in to the Cisco ISE administration portal in order to verify that Cisco ISE is set up. Then, in the Microsoft Azure portal, carry out and complete steps in the Virtual Machines window in order to edit the disk size:
1. Stop the Cisco ISE instance.
2. Click Disk in the left pane and click the disk that you are using with Cisco ISE.
3. Click Size + performance in the left pane.
4. In the Custom disk size field, enter the disk size you want, in GiB.
For information about the post-installation tasks that you must carry out after successfully creating a Cisco ISE instance, see the Chapter 'Installation Verification and Post Installation Tasks' in the Cisco ISE Installation Guide for your Cisco ISE release.
Complete the tasks that help you reset or recover your Cisco ISE virtual machine password. Choose the tasks that you need and carry out the steps detailed.
a. From the left-side menu, click Boot Diagnostics.
b. Click Enable with a custom storage account. Then click Save.
Through this task, you add additional key pairs to a repository. The existing key pair that was created at the time of the Cisco ISE instance configuration is not replaced by the new public key that you created.
You get a pop-up window to choose Download private key and create a resource that downloads the SSH key as a .pem file.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
04-Oct-2023 |
Initial Release |