Cisco Identity Services Engine Installation Guide, Release 2.1

124
Cisco Identity Services Engine Installation Guide, Release 2.1 First Published: 2015-12-17 Last Modified: 2016-05-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

Transcript of Cisco Identity Services Engine Installation Guide, Release 2.1

  • Cisco Identity Services Engine Installation Guide, Release 2.1First Published: 2015-12-17

    Last Modified: 2016-05-13

    Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883

  • THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain versionof the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.

    NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS"WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR TRADE PRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.

    Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnershiprelationship between Cisco and any other company. (1110R)

    2016 Cisco Systems, Inc. All rights reserved.

    http://www.cisco.com/go/trademarkshttp://www.cisco.com/go/trademarks

  • C O N T E N T S

    C H A P T E R 1 Network Deployments in Cisco ISE 1

    Cisco ISE Network Architecture 1

    Cisco ISE Deployment Terminology 2

    Node Types and Personas in Distributed Deployments 2

    Administration Node 2

    Policy Service Node 3

    Monitoring Node 3

    pxGrid Node 3

    Standalone and Distributed ISE Deployments 4

    Distributed Deployment Scenarios 4

    Small Network Deployments 4

    Split Deployments 5

    Medium-Sized Network Deployments 6

    Large Network Deployments 7

    Centralized Logging 7

    Load Balancers 7

    Dispersed Network Deployments 8

    Considerations for Planning a Network with Several Remote Sites 9

    Deployment Size and Scaling Recommendations 10

    Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions 13

    C H A P T E R 2 Install Cisco ISE Software on Cisco SNS Appliances 15

    Cisco SNS 3400 Series Appliance Overview 15

    Cisco SNS 3500 Series Appliance Overview 15

    Cisco SNS 3500 Series Appliances 15

    LED Indicators on Cisco SNS 3515 and 3595 Appliances 16

    Cisco SNS-3515 and SNS-3595 Appliances Hardware Specifications 16

    Cisco SNS-3515 or 3595 Appliance Front Panel View 17

    Cisco Identity Services Engine Installation Guide, Release 2.1 iii

  • Cisco SNS 3515 or SNS 3595 Appliance Back Panel View 20

    Internal Diagnostic LEDs 22

    Regulatory Compliance 24

    Before You Begin 24

    Safety Guidelines 24

    Unpack and Inspect the Server 25

    Prepare for Server Installation 26

    Installation Guidelines 26

    Rack Requirements 27

    Equipment Requirements 28

    Slide Rail Adjustment Range 28

    Server Specifications 28

    Physical Specifications 28

    Environmental Specifications 28

    Power Specifications 29

    Install the Cisco SNS 3515 and Cisco SNS 3595 Hardware Appliances 30

    Install the Cisco SNS 3515 or 3595 Appliance in a Rack 30

    Install the Side Rails 31

    Install the Cable Management Arm (Optional) 34

    Reverse the Cable Management Arm (Optional) 36

    Connect Cables 36

    Connect the Network Interface 37

    Ethernet Port Connector 37

    Connect the Console 38

    Connect the Keyboard and Video Monitor 39

    Cable Management 40

    Connect and Power On the Cisco SNS 3515 or 3595 Appliance 40

    Connect and Power On the Server (Standalone Mode) 40

    Local Connection Procedure 41

    Remote Connection Procedure 41

    Cisco Integrated Management Controller 42

    Setup CIMC Configuration Utility 42

    NIC Modes and NIC Redundancy Settings 44

    Install Cisco ISE Software on Cisco SNS Appliances 45

    Install Cisco ISE on the Cisco SNS 3515 or 3595 Appliance 45

    Cisco Identity Services Engine Installation Guide, Release 2.1iv

    Contents

  • Download the Cisco ISE ISO Image 46

    Install the ISE Server 46

    Install ISE 2.1 on the Cisco SNS 3515 or 3595 Appliance Remotely Using CIMC 47

    Install ISE 2.1 on the Cisco 3500 Appliance Using the USB Drive 48

    Create a Bootable USB Device to Install Cisco ISE 49

    Run the Setup Program 50

    Verify the Installation Process 52

    Reset the Administrator Password 53

    Reimage the Cisco SNS 3500 Series Appliance 55

    C H A P T E R 3 Install ISE on a VMware Virtual Machine 57

    Supported VMware Versions 57

    Support for VMware vMotion 57

    Support for Open Virtualization Format 58

    Virtual Machine Requirements 59

    Virtual Machine Appliance Size Recommendations 62

    Disk Space Requirements 62

    Disk Space Guidelines 63

    Virtual Machine Resource and Performance Checks 64

    On Demand Virtual Machine Performance Check Using the Show Tech Support Command 65

    Virtual Machine Resource Check from the Cisco ISE Boot Menu 65

    Obtain the Cisco ISE Evaluation Software 66

    Install Cisco ISE on Virtual Machines 66

    Deploy Cisco ISE on Virtual Machines Using OVA Templates 67

    Install Cisco ISE on Virtual Machines Using the ISO File 67

    Prerequisites for Configuring a VMware ESXi Server 68

    Virtualization Technology Check 69

    Enable Virtualization Technology on an ESXi Server 70

    Configure VMware Server Interfaces for the Cisco ISE Profiler Service 70

    Connect to the VMware Server Using the Serial Console 70

    Configure a VMware Server 71

    Increase Virtual Machine Power On Boot Delay Configuration 72

    Configure a VMware System to Boot From a Cisco ISE Software DVD 72

    Install Cisco ISE Software on a VMware System 73

    Cisco ISE ISO Installation on Virtual Machine Fails 74

    Cisco Identity Services Engine Installation Guide, Release 2.1 v

    Contents

  • Clone a Cisco ISE Virtual Machine 75

    Clone a Cisco ISE Virtual Machine Using a Template 76

    Create a Virtual Machine Template 76

    Deploy a Virtual Machine Template 77

    Change the IP Address and Hostname of a Cloned Virtual Machine 77

    Connect a Cloned Cisco Virtual Machine to the Network 79

    Migrate Cisco ISE VM from Evaluation to Production 79

    C H A P T E R 4 Install Cisco ISE on a Linux KVM 81

    KVM Hypervisor Support 81

    KVM Virtualization Check 81

    KVM Hardware Requirements 81

    Virtual Machine Appliance Size Recommendations 83

    Disk Space Requirements 83

    Disk Space Guidelines 84

    Virtual Machine Resource and Performance Checks 86

    On Demand Virtual Machine Performance Check Using the Show Tech Support

    Command 86

    Virtual Machine Resource Check from the Cisco ISE Boot Menu 86

    Obtain the Cisco ISE Evaluation Software 87

    Install Cisco ISE on KVM 88

    C H A P T E R 5 Manage Administrator Accounts 91

    CLI-Admin and Web-Based Admin User Right Differences 91

    CLI Admin Users Creation 92

    Web-Based Admin Users Creation 92

    C H A P T E R 6 Post-Installation and Maintenance Tasks 93

    Log in to the Cisco ISE Web-Based Interface 93

    Cisco ISE Configuration Verification 94

    Verify Configuration Using a Web Browser 95

    Verify Configuration Using the CLI 95

    VMware Tools Installation Verification 97

    Verify VMWare Tools Installation Using the Summary Tab in the vSphere Client 97

    Verify VMWare Tools Installation Using the CLI 97

    Cisco Identity Services Engine Installation Guide, Release 2.1vi

    Contents

  • Support for Upgrading VMware Tools 98

    Bond Ethernet Interfaces for High Availability 98

    Supported Platforms 99

    Guidelines for Bonding Ethernet Interfaces 99

    Configure NIC Bonding 100

    Verify NIC Bonding Configuration 101

    Remove NIC Bonding 101

    Return Material Authorization 102

    Reset a Password Due to Administrator Lockout 103

    Change the IP Address of a Cisco ISE Appliance 103

    View Installation and Upgrade History 104

    Perform a System Erase 105

    A P P E N D I X A Cisco ISE Ports Reference 107

    Cisco ISE Infrastructure 107

    Cisco ISE Administration Node Ports 108

    Cisco ISE Monitoring Node Ports 110

    Cisco ISE Policy Service Node Ports 111

    Cisco ISE pxGrid Service Ports 116

    OCSP and CRL Service Ports 116

    Cisco Identity Services Engine Installation Guide, Release 2.1 vii

    Contents

  • Cisco Identity Services Engine Installation Guide, Release 2.1viii

    Contents

  • C H A P T E R 1Network Deployments in Cisco ISE

    Cisco ISE Network Architecture, page 1

    Cisco ISE Deployment Terminology, page 2

    Node Types and Personas in Distributed Deployments, page 2

    Standalone and Distributed ISE Deployments, page 4

    Distributed Deployment Scenarios, page 4

    Small Network Deployments, page 4

    Medium-Sized Network Deployments, page 6

    Large Network Deployments, page 7

    Deployment Size and Scaling Recommendations, page 10

    Switch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions, page13

    Cisco ISE Network ArchitectureCisco ISE architecture includes the following components:

    Nodes and persona types

    Cisco ISE nodeACisco ISE node can assume any or all of the following personas: Administration,Policy Service, Monitoring, or pxGrid

    Network resources

    Endpoints

    The policy information point represents the point at which external information is communicated to the PolicyService persona. For example, external information could be a Lightweight Directory Access Protocol (LDAP)attribute.

    Cisco Identity Services Engine Installation Guide, Release 2.1 1

  • Cisco ISE Deployment TerminologyThis guide uses the following terms when discussing Cisco ISE deployment scenarios:

    DefinitionTerm

    A specific feature that a persona provides such as network access,profiling, posture, security group access, monitoring, andtroubleshooting.

    Service

    An individual physical or virtual Cisco ISE appliance.Node

    The Cisco ISE node can assume any of the following personas:Administration, Policy Service, Monitoring

    Node Type

    Determines the services provided by a node. A Cisco ISE nodecan assume any or all of the following personas: . The menuoptions that are available through the administrative user interfacedepend on the role and personas that a node assumes.

    Persona

    Determines if a node is a standalone, primary, or secondary nodeand applies only to Administration and Monitoring nodes.

    Role

    Node Types and Personas in Distributed DeploymentsACisco ISE node can provide various services based on the persona that it assumes. Each node in a deploymentcan assume the Administration, Policy Service, pxGrid, andMonitoring personas. In a distributed deployment,you can have the following combination of nodes on your network:

    Primary and secondary Administration nodes for high availability

    A pair of Monitoring nodes for automatic failover

    One or more Policy Service nodes for session failover

    One or more pxGrid nodes for pxGrid services

    Administration NodeA Cisco ISE node with the Administration persona allows you to perform all administrative operations onCisco ISE. It handles all system-related configurations that are related to functionality such as authentication,authorization, and accounting. In a distributed deployment, you can have a maximum of two nodes runningthe Administration persona. The Administration persona can take on the standalone, primary, or secondaryrole.

    Cisco Identity Services Engine Installation Guide, Release 2.12

    Network Deployments in Cisco ISECisco ISE Deployment Terminology

  • Policy Service NodeA Cisco ISE node with the Policy Service persona provides network access, posture, guest access, clientprovisioning, and profiling services. This persona evaluates the policies and makes all the decisions. You canhave more than one node assume this persona. Typically, there would be more than one Policy Service nodein a distributed deployment. All Policy Service nodes that reside in the same high-speed Local Area Network(LAN) or behind a load balancer can be grouped together to form a node group. If one of the nodes in a nodegroup fails, the other nodes detect the failure and reset any URL-redirected sessions.

    At least one node in your distributed setup should assume the Policy Service persona.

    Monitoring NodeA Cisco ISE node with the Monitoring persona functions as the log collector and stores log messages fromall the Administration and Policy Service nodes in a network. This persona provides advanced monitoringand troubleshooting tools that you can use to effectively manage a network and resources. A node with thispersona aggregates and correlates the data that it collects, and provides you with meaningful reports. CiscoISE allows you to have a maximum of two nodes with this persona, and they can take on primary or secondaryroles for high availability. Both the primary and secondary Monitoring nodes collect log messages. In casethe primary Monitoring node goes down, the secondary Monitoring node automatically becomes the primaryMonitoring node.

    At least one node in your distributed setup should assume the Monitoring persona. We recommend that youdo not have theMonitoring and Policy Service personas enabled on the same Cisco ISE node. We recommendthat the Monitoring node be dedicated solely to monitoring for optimum performance.

    pxGrid NodeYou can use Cisco pxGrid to share the context-sensitive information from Cisco ISE session directory withother network systems such as ISE Eco system partner systems and other Cisco platforms. The pxGridframework can also be used to exchange policy and configuration data between nodes like sharing tags andpolicy objects between Cisco ISE and third party vendors, and for other information exchanges. Cisco pxGridalso allows third party systems to invoke adaptive network control actions (EPS) to quarantine users/devicesin response to a network or security event. The TrustSec information like tag definition, value, and descriptioncan be passed fromCisco ISE via TrustSec topic to other networks. The endpoint profiles with Fully QualifiedNames (FQNs) can be passed from Cisco ISE to other networks through a endpoint profile meta topic. CiscopxGrid also supports bulk download of tags and endpoint profiles.

    You can publish and subscribe to SXP bindings (IP-SGT mappings) through pxGrid. For more informationabout SXP bindings, see Source Group Tag Protocol section in Cisco Identity Services Engine AdministratorGuide.

    In a high-availability configuration, Cisco pxGrid servers replicate information between the nodes throughthe PAN. When the PAN goes down, pxGrid server stops handling the client registration and subscription.You need to manually promote the PAN for the pxGrid server to become active.

    Cisco Identity Services Engine Installation Guide, Release 2.1 3

    Network Deployments in Cisco ISEPolicy Service Node

  • Standalone and Distributed ISE DeploymentsA deployment that has a single Cisco ISE node is called a standalone deployment. This node runs theAdministration, Policy Service, and Monitoring personas.

    A deployment that has more than one Cisco ISE node is called a distributed deployment. To support failoverand to improve performance, you can set up a deployment with multiple Cisco ISE nodes in a distributedfashion. In a Cisco ISE distributed deployment, administration and monitoring activities are centralized, andprocessing is distributed across the Policy Service nodes. Depending on your performance needs, you canscale your deployment. A Cisco ISE node can assume any of the following personas: Administration, PolicyService, and Monitoring.

    Distributed Deployment Scenarios Small Network Deployments

    Medium-Sized Network Deployments

    Large Network Deployments

    Small Network DeploymentsThe smallest Cisco ISE deployment consists of two Cisco ISE nodes with one Cisco ISE node functioning asthe primary appliance in a small network.

    The primary node provides all the configuration, authentication, and policy capabilities that are required forthis networkmodel, and the secondary Cisco ISE node functions in a backup role. The secondary node supportsthe primary node and maintains a functioning network whenever connectivity is lost between the primarynode and network appliances, network resources, or RADIUS.

    Centralized authentication, authorization, and accounting (AAA) operations between clients and the primaryCisco ISE node are performed using the RADIUS protocol. Cisco ISE synchronizes or replicates all of thecontent that resides on the primary Cisco ISE node with the secondary Cisco ISE node. Thus, your secondarynode is current with the state of your primary node. In a small network deployment, this type of configuration

    Cisco Identity Services Engine Installation Guide, Release 2.14

    Network Deployments in Cisco ISEStandalone and Distributed ISE Deployments

  • model allows you to configure both your primary and secondary nodes on all RADIUS clients by using thistype of deployment or a similar approach.

    Figure 1: Small Network Deployment

    As the number of devices, network resources, users, and AAA clients increases in your network environment,you should change your deployment configuration from the basic small model and use more of a split ordistributed deployment model.

    Split DeploymentsIn split Cisco ISE deployments, you continue to maintain primary and secondary nodes as described in a smallCisco ISE deployment. However, the AAA load is split between the two Cisco ISE nodes to optimize theAAAworkflow. Each Cisco ISE appliance (primary or secondary) needs to be able to handle the full workloadif there are any problems with AAA connectivity. Neither the primary node nor the secondary nodes handlesall AAA requests during normal network operations because this workload is distributed between the twonodes.

    The ability to split the load in this way directly reduces the stress on each Cisco ISE node in the system. Inaddition, splitting the load provides better loading while the functional status of the secondary node ismaintained during the course of normal network operations.

    In split Cisco ISE deployments, each node can perform its own specific operations, such as network admissionor device administration, and still perform all the AAA functions in the event of a failure. If you have twoCisco ISE nodes that process authentication requests and collect accounting data from AAA clients, werecommend that you set up one of the Cisco ISE nodes to act as a log collector.

    Cisco Identity Services Engine Installation Guide, Release 2.1 5

    Network Deployments in Cisco ISESplit Deployments

  • In addition, the split Cisco ISE deployment design provides an advantage because it allows for growth.

    Figure 2: Split Network Deployment

    Medium-Sized Network DeploymentsAs small networks grow, you can keep pace and manage network growth by adding Cisco ISE nodes to createamedium-sized network. Inmedium-sized network deployments, you can dedicate the new nodes for all AAAfunctions, and use the original nodes for configuration and logging functions.

    In a medium-sized network deployment, you cannot enable the Policy Service persona on a node that runsthe Administration persona, Monitoring persona, or both. You need dedicated policy service node(s).

    Note

    Cisco Identity Services Engine Installation Guide, Release 2.16

    Network Deployments in Cisco ISEMedium-Sized Network Deployments

  • As the amount of log traffic increases in a network, you can choose to dedicate one or two of the secondaryCisco ISE nodes for log collection in your network.

    Figure 3: Medium-Sized Network Deployment

    Large Network Deployments

    Centralized LoggingWe recommend that you use centralized logging for large Cisco ISE networks. To use centralized logging,you must first set up a dedicated logging server that serves as a Monitoring persona (for monitoring andlogging) to handle the potentially high syslog traffic that a large, busy network can generate.

    Because syslog messages are generated for outbound log traffic, any RFC 3164-compliant syslog appliancecan serve as the collector for outbound logging traffic. A dedicated logging server enables you to use thereports and alert features that are available in Cisco ISE to support all the Cisco ISE nodes.

    You can also consider having the appliances send logs to both a Monitoring persona on the Cisco ISE nodeand a generic syslog server. Adding a generic syslog server provides a redundant backup if the Monitoringpersona on the Cisco ISE node goes down.

    Load BalancersIn large centralized networks, you should use a load balancer, which simplifies the deployment of AAA clients.Using a load balancer requires only a single entry for the AAA servers, and the load balancer optimizes therouting of AAA requests to the available servers.

    Cisco Identity Services Engine Installation Guide, Release 2.1 7

    Network Deployments in Cisco ISELarge Network Deployments

  • However, having only a single load balancer introduces the potential for having a single point of failure. Toavoid this potential issue, deploy two load balancers to ensure a measure of redundancy and failover. Thisconfiguration requires you to set up two AAA server entries in each AAA client, and this configuration remainsconsistent throughout the network.

    Figure 4: Large Network Deployment

    Dispersed Network DeploymentsDispersed Cisco ISE network deployments are most useful for organizations that have a main campus withregional, national, or satellite locations elsewhere. The main campus is where the primary network resides,is connected to additional LANs, ranges in size from small to large, and supports appliances and users indifferent geographical regions and locations.

    Large remote sites can have their own AAA infrastructure for optimal AAA performance. A centralizedmanagement model helps maintain a consistent, synchronized AAA policy. A centralized configuration modeluses a primary Cisco ISE node with secondary Cisco ISE nodes. We still recommend that you use a separate

    Cisco Identity Services Engine Installation Guide, Release 2.18

    Network Deployments in Cisco ISEDispersed Network Deployments

  • Monitoring persona on the Cisco ISE node, but each remote location should retain its own unique networkrequirements.

    Figure 5: Dispersed Deployment

    Considerations for Planning a Network with Several Remote Sites Verify if a central or external database is used, such as Microsoft Active Directory or LightweightDirectory Access Protocol (LDAP). Each remote site should have a synchronized instance of the externaldatabase that is available for Cisco ISE to access for optimizing AAA performance.

    The location of AAA clients is important. You should locate the Cisco ISE nodes as close as possibleto the AAA clients to reduce network latency effects and the potential for loss of access that is causedby WAN failures.

    Cisco ISE has console access for some functions such as backup. Consider using a terminal at each site,which allows for direct, secure console access that bypasses network access to each node.

    If small, remote sites are in close proximity and have reliable WAN connectivity to other sites, considerusing a Cisco ISE node as a backup for the local site to provide redundancy.

    Domain Name System (DNS) should be properly configured on all Cisco ISE nodes to ensure access tothe external databases.

    Cisco Identity Services Engine Installation Guide, Release 2.1 9

    Network Deployments in Cisco ISEConsiderations for Planning a Network with Several Remote Sites

  • Deployment Size and Scaling Recommendations

    The data given below for Cisco SNS 3515 and Cisco SNS 3595 appliances is applicable only for CiscoISE 2.1 and later releases.

    Note

    The following table provides guidance on the type of deployment, number of Cisco ISE nodes, and the typeof appliance (small, medium, large) that you need based on the number of active sessions in your network.

    Table 1: Cisco ISE DeploymentSize and Scaling Recommendations

    Maximum ActiveSessions

    Maximum Numberof Dedicated PolicyService Nodes

    Appliance PlatformNumber ofNodes/Personas

    Deployment Type

    5,0000Cisco SNS 3415Standalone orredundant (2) nodeswithAdministration,Policy Service, andMonitoring personasenabled

    Small

    10,0000Cisco SNS 3495

    7,5000Cisco SNS 3515

    20,0000Cisco SNS 3595

    5,0005Cisco SNS 3415appliances forAdministration andMonitoring personas

    Administration andMonitoring personason single orredundant nodes.Maximum of 2Administration andMonitoring nodes.

    Medium

    10,0005Cisco SNS 3495appliances forAdministration andMonitoring personas

    7,5005Cisco SNS 3515appliances forAdministration andMonitoring personas

    20,0005Cisco SNS 3595appliances forAdministration andMonitoring personas

    Cisco Identity Services Engine Installation Guide, Release 2.110

    Network Deployments in Cisco ISEDeployment Size and Scaling Recommendations

  • Maximum ActiveSessions

    Maximum Numberof Dedicated PolicyService Nodes

    Appliance PlatformNumber ofNodes/Personas

    Deployment Type

    250,00040Cisco SNS 3495appliances forAdministration andMonitoring personas

    DedicatedAdministrationnode/nodes.Maximum of 2Administrationnodes.

    DedicatedMonitoringnode/nodes.Maximum of 2Monitoring nodes.

    Large

    500,00050Cisco SNS 3595appliances forAdministration andMonitoring personas

    DedicatedAdministrationnode/nodes.Maximum of 2Administrationnodes.

    DedicatedMonitoringnode/nodes.Maximum of 2Monitoring nodes.

    The following table provides guidance on the type of appliance that you would need for a dedicated PolicyService node based on the maximum number of active sessions the node services.

    Table 2: Policy Service Node Size Recommendations

    Maximum SessionsAppliancePlatform SizeForm Factor

    5,000Cisco SNS 3415SmallPhysical

    7,500Cisco SNS 3515

    20,000Cisco SNS 3495Large

    40,000Cisco SNS 3595

    5,000 to 40,000Comparable to physicalappliance

    Small/LargeVirtual Machine

    The following table provides guidance on the type of appliance that you would need for a dedicated pxGridnode based on the number of maximum active sessions that the node services.

    Cisco Identity Services Engine Installation Guide, Release 2.1 11

    Network Deployments in Cisco ISEDeployment Size and Scaling Recommendations

  • Table 3: pxGrid Node Sizing Recommendations

    MaximumpxGridSubscribers

    MaximumRADIUSSessions perDeployment

    MaximumDedicatedNodes pxGrid

    MaximumDedicatedNodes PSNs

    PlatformDeploymentModel

    25,000003415Standalone (allpersonas onsame node) (twonodesredundant)

    210,000003495

    27,500003515

    220,000003595

    55,000053415 asPAN+MNT+PXG

    Admin +MnT +pxGrid on samenode; DedicatedPSNs(Minimum 4nodesredundant)

    510,000053495 asPAN+MNT+PXG

    57,500053515 asPAN+MNT+PXG

    520,000053595 asPAN+MNT+PXG

    25250,0002383495 as Adminand MNT

    Dedicated (Allpersonas ondedicated nodes(Minimum 6nodesredundant))

    25500,0002483595 as Adminand MNT

    MaximumpxGridSubscribers

    MaximumRADIUSSessions perPSN

    PlatformScaling perPXG Node

    105,000SNS-3415DedicatedpxGrid Nodes(MaximumPublish RateGated by TotalDeploymentSize)

    2020,000SNS-3495

    157,500SNS-3515

    2540,000SNS-3595

    Cisco Identity Services Engine Installation Guide, Release 2.112

    Network Deployments in Cisco ISEDeployment Size and Scaling Recommendations

  • Switch and Wireless LAN Controller Configuration Required toSupport Cisco ISE Functions

    To ensure that Cisco ISE can interoperate with network switches and that functions from Cisco ISE aresuccessful across the network segment, you must configure your network switches with certain requiredNetwork Time Protocol (NTP), RADIUS/AAA, IEEE 802.1X, MAC Authentication Bypass (MAB), andother settings.

    Cisco Identity Services Engine Installation Guide, Release 2.1 13

    Network Deployments in Cisco ISESwitch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

  • Cisco Identity Services Engine Installation Guide, Release 2.114

    Network Deployments in Cisco ISESwitch and Wireless LAN Controller Configuration Required to Support Cisco ISE Functions

  • C H A P T E R 2Install Cisco ISE Software on Cisco SNSAppliances

    Cisco SNS 3400 Series Appliance Overview, page 15

    Cisco SNS 3500 Series Appliance Overview, page 15

    Before You Begin, page 24

    Install the Cisco SNS 3515 and Cisco SNS 3595 Hardware Appliances, page 30

    Install Cisco ISE Software on Cisco SNS Appliances, page 45

    Cisco SNS 3400 Series Appliance OverviewCisco SNS-3400 series appliance hardware consists of Cisco SNS 3415 and Cisco SNS 3495 appliances.

    For the Cisco SNS 3400 series hardware specifications, see the Cisco Secure Network Server Data Sheet.

    For the LED indicators on the Cisco SNS 3400 series appliances, see the Cisco Identity Services EngineHardware Installation Guide, Release 2.0.

    Cisco SNS 3500 Series Appliance Overview

    Cisco SNS 3500 Series AppliancesThe Cisco SNS 3515 or Cisco SNS 3595 appliance is designed for performance and density over a wide rangeof business workloads, from web serving to distributed databases.

    The SNS 3515 and SNS 3595 appliances support only Cisco ISE 2.0.1 or later releases. You cannot installa release earlier than 2.0.1 on the SNS 3515 or SNS 3595 appliance.

    Note

    Cisco Identity Services Engine Installation Guide, Release 2.1 15

    http://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-726524.htmlhttp://www.cisco.com/c/en/us/td/docs/security/ise/2-0/installation_guide/b_ise_InstallationGuide20/Cisco_SNS_3400_Series_Appliances.htmlhttp://www.cisco.com/c/en/us/td/docs/security/ise/2-0/installation_guide/b_ise_InstallationGuide20/Cisco_SNS_3400_Series_Appliances.html

  • Support for UEFI Secure Boot

    The SNS 3515 and SNS 3595 appliances support the Unified Extensible Firmware Interface (UEFI) secureboot feature. This feature ensures that only a Cisco-signed ISE image can be installed on the SNS 3515 andSNS 3595 appliances, and prevents installation of any unsigned operating system even with physical accessto the device. For example, generic operating systems, such as Red Hat Enterprise Linux orMicrosoftWindowscannot boot on this appliance.

    LED Indicators on Cisco SNS 3515 and 3595 AppliancesThis section describes the front- and rear-panel controls, ports, and LED indicators on the Cisco SNS 3515and Cisco SNS 3595 appliances.

    Cisco SNS-3515 and SNS-3595 Appliances Hardware Specifications

    The following table describes the hardware specifications of Cisco SNS-3515 and Cisco SNS-3595 appliances.

    DiagramsHardware SpecificationsCisco Identity ServicesEngine Appliance

    Cisco SNS-3515 or 3595ApplianceFront Panel View, on page 17

    Cisco SNS 3515 or SNS 3595Appliance Back Panel View, onpage 20

    Cisco UCS C220 M4

    Single socket Intel Xeon E5-2620v3 series CPU@ 2.40GHz, 6 totalcores, 6*2 total threads

    16 GB RAM

    1 x 600-GB disk

    6 GbE network interfaces

    For physical, environmental, andpower specifications, see ServerSpecifications, on page 28

    Cisco SNS-3515-K9

    Cisco UCS C220 M4

    Dual socket Intel Xeon E5-2640v3 series CPU@ 2.60GHz, 8 totalcores, 8*2 total threads

    64 GB RAM

    4 x 600-GB disks

    RAID 10

    6 GbE network interfaces

    For physical, environmental, andpower specifications, see ServerSpecifications, on page 28.

    Cisco SNS-3595-K9

    Cisco Identity Services Engine Installation Guide, Release 2.116

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • Cisco SNS-3515 or 3595 Appliance Front Panel View

    The following figure shows the components of the Cisco SNS-3515 or Cisco SNS-3595 appliance front panelview.

    Figure 6: Front Panel LEDs

    System status LED7Drive bays 1-8 support SAS/SATA drives1

    Fan status LED8Drive bays 1 and 2 support SAS/SATAand NVMe PCIe solid state drives (SSDs)

    2

    Temperature status LED9Pull-out asset tag3

    Power supply status LED10Operations panel buttons and LEDs4

    Network link activity LED11Power button/power status LED5

    KVMconnector (usedwith KVMcable thatprovides two USB 2.0, one VGA, and oneserial connector)

    12Unit identification button/LED6

    The following table describes the LEDs located on the front panel of the Cisco SNS-3515 or Cisco SNS-3595appliance.

    Cisco Identity Services Engine Installation Guide, Release 2.1 17

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • Front Panel LEDs

    OffThe hard drive is operating properly.

    AmberDrive fault detected.

    Amber, blinkingThe device is rebuilding.

    Amber, blinking with one-secondintervalDrive locate function activated.

    Hard drive fault

    OffThere is no hard drive in the hard drivetray (no access, no fault).

    GreenThe hard drive is ready.

    Green, blinkingThe hard drive is reading orwriting data.

    Hard drive activity

    OffThere is no AC power to the server.

    AmberThe server is in standby power mode.Power is supplied only to the Cisco IMC andsome motherboard functions.

    GreenThe server is in main power mode.Power is supplied to all server components.

    Power button/LED

    OffThe unit identification function is not inuse.

    BlueThe unit identification function isactivated.

    Unit identification

    Cisco Identity Services Engine Installation Guide, Release 2.118

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • Front Panel LEDs

    GreenThe server is running in normaloperating condition.

    Green, blinkingThe server is performingsystem initialization and memory check.

    Amber, steadyThe server is in a degradedoperational state. For example:

    Power supply redundancy is lost.

    CPUs are mismatched.

    At least one CPU is faulty.

    At least one DIMM is faulty.

    At least one drive in a RAID configurationfailed.

    Amber, blinkingThe server is in a criticalfault state. For example:

    Boot failed.

    Fatal CPU and/or bus error is detected.

    Server is in an over-temperature condition.

    System status

    GreenAll fanmodules are operating properly.

    Amber, steadyOne or more fan modulesbreached the critical threshold.

    Amber, blinkingOne or more fan modulesbreached the non-recoverable threshold.

    Fan status

    GreenThe server is operating at normaltemperature.

    Amber, steadyOne or more temperaturesensors breached the critical threshold.

    Amber, blinkingOne or more temperaturesensors breached the non-recoverable threshold.

    Temperature status

    Cisco Identity Services Engine Installation Guide, Release 2.1 19

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • Front Panel LEDs

    GreenAll power supplies are operatingnormally.

    Amber, steadyOne or more power suppliesare in a degraded operational state.

    Amber, blinkingOne or more power suppliesare in a critical fault state.

    Power supply status

    OffThe Ethernet link is idle.

    GreenOne or more Ethernet LOM ports arelink-active, but there is no activity.

    Green, blinkingOne or more Ethernet LOMports are link-active, with activity.

    Network link activity

    Cisco SNS 3515 or SNS 3595 Appliance Back Panel View

    The following figure shows the components of the Cisco SNS-3515 and Cisco 3595 appliance back panelview.

    Figure 7: Back Panel LEDs

    1-GbEEthernet dedicatedmanagement port;used to access CIMC

    9Grounding-lug hole (for DC powersupplies)

    1

    Serial port (RJ-45 connector)10PCIe riser 1/slot 12

    1-GbE Ethernet port (Eth 0)11PCIe riser 2/slot 23

    1-GbE Ethernet port (Eth 1)121-GbE Ethernet port (Eth 2)4

    VGA video port (DB-15)131-GbE Ethernet port (Eth 3)5

    Rear unit identification button/LED141-GbE Ethernet port (Eth 4)6

    Cisco Identity Services Engine Installation Guide, Release 2.120

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • Power supplies (up to two, redundant as1+1)

    151-GbE Ethernet port (Eth 5)7

    USB 3.0 ports (two)8

    The following table describes the LEDs located on the back panel of the Cisco SNS 3515 or Cisco SNS 3595appliance.

    StateLED Name

    OffNo link is present.

    Green, steadyLink is active.

    Green, blinkingTraffic is present on the activelink.

    Optional mLOM1-GbE SFP+ (there is a single statusLED)

    OffLink speed is 10 Mbps.

    AmberLink speed is 100 Mbps/1 Gbps.

    GreenLink speed is 10 Gbps.

    Optional mLOM 1-GbE BASE-T link speed

    OffNo link is present.

    GreenLink is active.

    Green, blinkingTraffic is present on the activelink.

    Optional mLOM 1-GbE BASE-T link status

    OffLink speed is 10 Mbps.

    AmberLink speed is 100 Mbps.

    GreenLink speed is 1 Gbps.

    1-GbE Ethernet dedicated management link speed

    OffNo link is present.

    GreenLink is active.

    Green, blinkingTraffic is present on the activelink.

    1-GbE Ethernet dedicated management link status

    OffLink speed is 10 Mbps.

    AmberLink speed is 100 Mbps.

    GreenLink speed is 1 Gbps.

    1-GbE Ethernet link speed

    Cisco Identity Services Engine Installation Guide, Release 2.1 21

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • StateLED Name

    OffNo link is present.

    GreenLink is active.

    Green, blinkingTraffic is present on the activelink.

    1-GbE Ethernet link status

    OffThe unit identification LED is not in use.

    BlueThe unit identification LED is activated.

    Rear unit identification

    AC power supplies:

    OffNo AC input (12 V main power off, 12 Vstandby power off).

    Green, blinking12 V main power off; 12 Vstandby power on.

    Green, solid12 V main power on; 12 Vstandby power on.

    Amber, blinkingWarning detected but 12 Vmain power on.

    Amber, solidCritical error detected; 12 Vmain power off.

    Power supply status

    Internal Diagnostic LEDsThe server has internal fault LEDs for CPUs, DIMMs, fan modules, SD cards, the RTC battery, and the mLOMcard. These LEDs are available only when the server is in standby power mode. An LED lights amber toindicate a faulty component.

    Power must be connected to the server for these LEDs to be operate.Note

    Cisco Identity Services Engine Installation Guide, Release 2.122

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • The following figure shows the locations of these internal LEDs in Cisco SNS-3515 or Cisco SNS-3595appliance.

    Figure 8: Cisco SNS-3515 or 3595 Internal Diagnostic LED Locations

    The following table describes the callouts in the above figure.

    SD card fault LEDs (one next to each bay)4Fan module fault LEDs (one next to each fanconnector on the motherboard)

    1

    RTC battery fault LED5CPU fault LEDs (one in front of each CPU)2

    mLOM card fault LED (on motherboard nextto mLOM socket)

    6DIMM fault LEDs (one in front of eachDIMM socket on the motherboard)

    3

    The following table describes the internal diagnostic LEDs located inside the Cisco SNS-3515 or CiscoSNS-3595 appliance.

    StateLED Name

    OffComponent is functioning normally.

    AmberComponent has failed.

    Internal diagnostic LEDs (all)

    Cisco Identity Services Engine Installation Guide, Release 2.1 23

    Install Cisco ISE Software on Cisco SNS AppliancesCisco SNS 3500 Series Appliances

  • Regulatory ComplianceFor regulatory compliance and safety information, see Regulatory Compliance and Safety Information forCisco SNS-3415, Cisco SNS-3495, Cisco SNS-3515, and Cisco SNS-3595 Appliances.

    Before You BeginThis section provides information on how you can prepare your site for safely installing the Cisco SNS-3515or Cisco SNS-3595 appliance.

    Safety Guidelines

    Before you install, operate, or service a Cisco SNS-3515 or Cisco SNS-3595 appliance, review theRegulatory Compliance and Safety Information for Cisco SNS-3415, Cisco SNS-3495, Cisco SNS-3515,and Cisco SNS-3595 Appliances for important safety information.

    Note

    Warning: IMPORTANT SAFETY INSTRUCTIONS

    This warning symbol means danger. You are in a situation that could cause bodily injury. Before youwork on any equipment, be aware of the hazards involved with electrical circuitry and be familiar withstandard practices for preventing accidents. Use the statement number provided at the end of each warningto locate its translation in the translated safety warnings that accompanied this device.

    Statement 1071

    Warning

    Warning: To prevent the system from overheating, do not operate it in an area that exceeds the maximumrecommended ambient temperature of: 40 C (104 F).

    Statement 1047

    Warning

    Warning: The plug-socket combination must be accessible at all times, because it serves as the maindisconnecting device.

    Statement 1019

    Warning

    This product relies on the buildings installation for short-circuit (overcurrent) protection. Ensure that theprotective device is rated not greater than: 250 V, 15 A.

    Statement 1005

    Warning

    Cisco Identity Services Engine Installation Guide, Release 2.124

    Install Cisco ISE Software on Cisco SNS AppliancesBefore You Begin

    http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/regulatory/compliance/csacsrcsi.htmlhttp://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/regulatory/compliance/csacsrcsi.htmlhttp://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/regulatory/compliance/csacsrcsi.htmlhttp://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/regulatory/compliance/csacsrcsi.html

  • Installation of the equipment must comply with local and national electrical codes.

    Statement 1074

    Warning

    When you are installing a server, use the following guidelines:

    Plan your site configuration and prepare the site before installing the server. See the Cisco UCS SitePreparation Guide for the recommended site planning tasks.

    Ensure that there is adequate space around the server to allow for servicing the server and for adequateairflow. The airflow in this server is from front to back.

    Ensure that the air-conditioning meets the thermal requirements listed in the Server Specifications, onpage 28.

    Ensure that the cabinet or rack meets the requirements listed in the Rack Requirements, on page 27.

    Ensure that the site power meets the power requirements listed in the Power Specifications, on page29. If available, you can use an uninterruptible power supply (UPS) to protect against power failures.

    Avoid UPS types that use ferroresonant technology. These UPS types can become unstable with systemssuch as the Cisco UCS, which can have substantial current draw fluctuations from fluctuating data trafficpatterns.

    Caution

    Unpack and Inspect the Server

    When handling internal server components, wear an ESD strap and handle modules by the carrier edgesonly.

    Caution

    Keep the shipping container in case the server requires shipping in the future.Note

    The chassis is thoroughly inspected before shipment. If any damage occurred during transportation or anyitems are missing, contact your customer service representative immediately.

    Note

    To inspect the shipment:

    Step 1 Remove the server from its cardboard container and save all packaging material.Step 2 Compare the shipment to the equipment list provided by your customer service representative and the list given below.

    Verify that you have all items.Step 3 Check for damage and report any discrepancies or damage to your customer service representative. Have the following

    information ready:

    Cisco Identity Services Engine Installation Guide, Release 2.1 25

    Install Cisco ISE Software on Cisco SNS AppliancesUnpack and Inspect the Server

    http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/site-prep-guide/ucs_site_prep/ucs_siteprep_appendix_0100.htmlhttp://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/site-prep-guide/ucs_site_prep/ucs_siteprep_appendix_0100.html

  • Invoice number of shipper (see the packing slip)

    Model and serial number of the damaged unit

    Description of damage

    Effect of damage on the installation

    Figure 9: Shipping Box Contents

    Prepare for Server Installation Installation Guidelines, on page 26

    Rack Requirements, on page 27

    Equipment Requirements, on page 28

    Slide Rail Adjustment Range, on page 28

    Installation Guidelines

    Warning: To prevent the system from overheating, do not operate it in an area that exceeds the maximumrecommended ambient temperature of: 40 C (104 F).

    Statement 1047

    Warning

    Cisco Identity Services Engine Installation Guide, Release 2.126

    Install Cisco ISE Software on Cisco SNS AppliancesPrepare for Server Installation

  • Warning: The plug-socket combination must be accessible at all times, because it serves as the maindisconnecting device.

    Statement 1019

    Warning

    This product relies on the buildings installation for short-circuit (overcurrent) protection. Ensure that theprotective device is rated not greater than: 250 V, 15 A.

    Statement 1005

    Warning

    Installation of the equipment must comply with local and national electrical codes.

    Statement 1074

    Warning

    Avoid UPS types that use ferroresonant technology. These UPS types can become unstable with systemssuch as the Cisco UCS, which can have substantial current draw fluctuations from fluctuating data trafficpatterns.

    Caution

    When you are installing a server, use the following guidelines

    Plan your site configuration and prepare the site before installing the server. See the Cisco UCS SitePreparation Guide for the recommended site planning tasks.

    Ensure that there is adequate space around the server to allow for servicing the server and for adequateairflow. The airflow in this server is from front to back.

    Ensure that the air-conditioning meets the thermal requirements listed in the Server Specifications, onpage 28.

    Ensure that the cabinet or rack meets the requirements listed in the Rack Requirements, on page 27.

    Ensure that the site power meets the power requirements listed in the Power Specifications, on page29. If available, you can use an uninterruptible power supply (UPS) to protect against power failures.

    Rack RequirementsThis section provides the requirements for the standard open racks.

    The rack must be of the following type:

    A standard 19-in. (48.3-cm) wide, four-post EIA rack, with mounting posts that conform to Englishuniversal hole spacing, per section 1 of ANSI/EIA-310-D-1992.

    The rack post holes can be square 0.38-inch (9.6 mm), round 0.28-inch (7.1 mm), #12-24 UNC, or#10-32 UNC when you use the supplied slide rails.

    The minimum vertical rack space per server must be one RU, equal to 1.75 in. (44.45 mm).

    Cisco Identity Services Engine Installation Guide, Release 2.1 27

    Install Cisco ISE Software on Cisco SNS AppliancesPrepare for Server Installation

    http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/site-prep-guide/ucs_site_prep/ucs_siteprep_appendix_0100.htmlhttp://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/hw/site-prep-guide/ucs_site_prep/ucs_siteprep_appendix_0100.html

  • Equipment RequirementsThe slide rails supplied by Cisco Systems for this server do not require tools for installation. The inner rails(mounting brackets) are pre-attached to the sides of the server.

    Slide Rail Adjustment RangeThe slide rails for this server have an adjustment range of 24 to 36 inches (610 to 914 mm).

    Server SpecificationsThis section lists the technical specifications for the server and includes the following sections:

    Physical SpecificationsThe following table lists the physical specifications of the server.

    SpecificationDescription

    1.7 in. (4.3 cm)Height

    16.9 in. (42.9 cm)Width

    29.8 in. (75.8 cm)Depth

    SNS 3515: 37.9 lb. (17.2 Kg)

    SNS 3595: 39.9 lb. (18.1 Kg)

    Weight (fully loaded chassis)

    Environmental SpecificationsThe following table lists the environmental specifications of the server.

    SpecificationDescription

    32 to 104F (0 to 40C)

    (Operating, sea level, no fan fail, no CPU throttling,turbo mode)

    Temperature, operating

    -40 to 158F (-40 to 70C)Temperature, non-operating (when the server is storedor transported)

    10 to 90% noncondensingHumidity, operating

    5 to 93% noncondensingHumidity, nonoperating

    Cisco Identity Services Engine Installation Guide, Release 2.128

    Install Cisco ISE Software on Cisco SNS AppliancesServer Specifications

  • SpecificationDescription

    0 to 10,000 feet (0 to 3000m); maximum ambienttemperature decreases by 1C per 300m

    Altitude, operating

    0 to 40,000 feet (12,000m)Altitude, non-operating

    5.4Sound power level

    Measure A-weighted per ISO7779 LwAd (Bels)

    Operation at 73F (23C)

    37Sound pressure level

    Measure A-weighted per ISO7779 LpAm (dBA)

    Operation at 73F (23C)

    Power SpecificationsThe power specifications for the power supply options are listed in the following section:

    Do not mix power supply types in the server. Both power supplies must be identical.Note

    770-WAC Power Supply

    SpecificationDescription

    90 to 264 VAC (self-ranging, 100 to 264 VACnominal)

    AC input voltage range

    Range: 47 to 63 Hz (single phase, 50 to 60 Hznominal)

    AC input frequency

    9.5 A peak at 100 VAC

    4.5 A peak at 208 VAC

    AC line input current (steady state)

    770 WMaximum output power for each power supply

    Main power: 12 VDC

    Standby power: 12 VDC

    Power supply output voltage

    Cisco Identity Services Engine Installation Guide, Release 2.1 29

    Install Cisco ISE Software on Cisco SNS AppliancesServer Specifications

  • Install the Cisco SNS 3515 and Cisco SNS 3595 HardwareAppliances

    This section describes how to install your Cisco SNS 3515 or 3595 appliance and connect it to the network.It contains:

    Install the Cisco SNS 3515 or 3595 Appliance in a Rack, on page 30

    Cisco Integrated Management Controller, on page 42

    Connect Cables, on page 36

    Connect and Power On the Cisco SNS 3515 or 3595 Appliance, on page 40

    Before you begin the installation, read the Regulatory Compliance and Safety Information for the Cisco SNS3515 or Cisco SNS 3595 Hardware Appliance.

    Warning: Only trained and qualified personnel should be allowed to install, replace, or service thisequipment.

    Statement 1030

    Warning

    Warning: This unit is intended for installation in restricted access areas. A restricted access area can beaccessed only through the use of a special tool, lock and key, or other means of security.

    Statement 1017

    Warning

    Install the Cisco SNS 3515 or 3595 Appliance in a RackThis section describes how to install the Cisco SNS 3515 or Cisco SNS 3595 appliance in a rack.

    Cisco Identity Services Engine Installation Guide, Release 2.130

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the Cisco SNS 3515 and Cisco SNS 3595 Hardware Appliances

    http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/regulatory/compliance/csacsrcsi.htmlhttp://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/regulatory/compliance/csacsrcsi.html

  • Install the Side Rails

    Warning: To prevent bodily injury when mounting or servicing this unit in a rack, you must take specialprecautions to ensure that the system remains stable. The following guidelines are provided to ensure yoursafety:

    This unit should be mounted at the bottom of the rack if it is the only unit in the rack. When mountingthis unit in a partially filled rack, load the rack from the bottom to the top with the heaviest component atthe bottom of the rack.

    If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the unitin the rack.

    Statement 1006

    Warning

    Step 1 Attach the inner rails to the sides of the server:

    Figure 10: Attach Inner Rail to Side of Server

    Locking clip on inner rail2Front side of the server1

    a) Align an inner rail with one side of the server so that the three keyed slots in the rail align with the three pegs on theside of the server (see the figure above).

    b) Set the keyed slots over the pegs, and then slide the rail toward the front to lock it in place on the pegs. The front slothas a metal clip that locks over the front peg.

    c) Install the second inner rail to the opposite side of the server.

    Step 2 Open the front securing plate on both slide-rail assemblies. The front end of the slide-rail assembly has a spring-loadedsecuring plate that must be open before you can insert the mounting pegs into the rack-post holes.

    Cisco Identity Services Engine Installation Guide, Release 2.1 31

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the Cisco SNS 3515 or 3595 Appliance in a Rack

  • On the outside of the assembly, push the green arrow button toward the rear to open the securing plate.

    Figure 11: Front Securing Mechanism, Inside of Front End

    Securing plate shown pulled back to open position3Front mounting pegs1

    Rack post2

    Step 3 Install the outer slide rails into the rack:a) Align one slide-rail assembly front end with the front rack-post holes that you want to use. The slide rail front-end

    wraps around the outside of the rack post and the mounting pegs enter the rack-post holes from the outside-front (seethe figure above).

    The rack post must be between the mounting pegs and the open securingplate.

    Note

    b) Push the mounting pegs into the rack-post holes from the outside-front.c) Press the securing plate release button, marked PUSH. The spring-loaded securing plate closes to lock the pegs in

    place.d) Adjust the slide-rail length, and then push the rear mounting pegs into the corresponding rear rack-post holes. The

    slide rail must be level front-to-rear.The rear mounting pegs enter the rear rack-post holes from the inside of the rack post.

    e) Attach the second slide-rail assembly to the opposite side of the rack. Ensure that the two slide-rail assemblies areat the same height with each other and are level front-to-back.

    f) Pull the inner slide rails on each assembly out toward the rack front until they hit the internal stops and lock in place.

    Step 4 Insert the server into the slide rails:

    Cisco Identity Services Engine Installation Guide, Release 2.132

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the Cisco SNS 3515 or 3595 Appliance in a Rack

  • This server can weigh up to 67 pounds (59 kilograms) when fully loaded with components. We recommendthat you use a minimum of two people or a mechanical lift when lifting the server. Attempting this procedurealone could result in personal injury or equipment damage.

    Caution

    Figure 12: Inner Rail Release Clip

    Outer rail attached to rack post3Inner rail release clip1

    Inner rail attached to server and inserted into outerrail

    2

    Step 5 (Optional) Secure the server in the rack more permanently by using the two screws that are provided with the slide rails.Perform this step if you plan to move the rack with servers installed.With the server fully pushed into the slide rails, open a hinged slam latch lever on the front of the server and insert thescrew through the hole that is under the lever. The screw threads into the static part of the rail on the rack post andprevents the server from being pulled out. Repeat for the opposite slam latch.

    Cisco Identity Services Engine Installation Guide, Release 2.1 33

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the Cisco SNS 3515 or 3595 Appliance in a Rack

  • What to Do Next

    Install the Cable Management Arm (Optional)

    The CMA is reversible left to right. To reverse the CMA, see Reversing the Cable Management Arm(Optional) before installation.

    Note

    Step 1 With the server pushed fully into the rack, slide the CMA tab of the CMA arm that is farthest from the server onto theend of the stationary slide rail that is attached to the rack post (see the following figure). Slide the tab over the end ofthe rail until it clicks and locks.

    Step 2 Slide the CMA tab that is closest to the server over the end of the inner rail that is attached to the server (see the followingfigure). Slide the tab over the end of the rail until it clicks and locks.

    Step 3 Pull out the width-adjustment slider that is at the opposite end of the CMA assembly until it matches the width of yourrack (see the following figure).

    Step 4 Slide the CMA tab that is at the end of the width-adjustment slider onto the end of the stationary slide rail that is attachedto the rack post (see the following figure). Slide the tab over the end of the rail until it clicks and locks.

    Step 5 Open the hinged flap at the top of each plastic cable guide and route your cables through the cable guides as desired.

    Figure 13: Attach the Cable Management Arm to the Rear of the Slide Rails

    Cisco Identity Services Engine Installation Guide, Release 2.134

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the Cisco SNS 3515 or 3595 Appliance in a Rack

  • CMA tab on width-adjustment slider and end ofstationary outer slide rail

    3CMA tab on arm farthest from server and end ofstationary outer slide rail

    1

    Rear of server4CMA tab on arm closest to the server and end ofinner slide rail attached to server

    2

    Cisco Identity Services Engine Installation Guide, Release 2.1 35

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the Cisco SNS 3515 or 3595 Appliance in a Rack

  • Reverse the Cable Management Arm (Optional)

    Step 1 Rotate the entire CMA assembly 180 degrees. The plastic cable guides must remain pointing upward.Step 2 Flip the tabs at the end of each CMA arm so that they point toward the rear of the server.Step 3 Pivot the tab that is at the end of the width-adjustment slider. Depress and hold the metal button on the outside of the

    tab and pivot the tab 180 degrees so that it points toward the rear of the

    Figure 14: Reverse the CMA

    Metal button for rotating2CMA tab on end of width-adjustment slider1

    Connect CablesThis section describes how to connect your Cisco SNS-3515 or Cisco SNS-3595 appliance to the networkand the appliance console.

    Connect the Network Interface, on page 37

    Connect the Console, on page 38

    Connect the Keyboard and Video Monitor, on page 39

    Cable Management, on page 40

    Attach cables (such as keyboard, monitor cables, if required) to the rear of the server. Route the cables properlyand use the cable straps to secure the cables to the slide rails. See the Cisco SNS 3515 or SNS 3595 ApplianceBack Panel View, on page 20 for reference on the rear view of the appliance.

    Cisco Identity Services Engine Installation Guide, Release 2.136

    Install Cisco ISE Software on Cisco SNS AppliancesConnect Cables

  • Connect the Network Interface

    Warning: Do not work on the system or connect or disconnect cables during periods of lightning activity.

    Statement 1001

    Warning

    This section describes how to connect the Cisco SNS-3515 or Cisco SNS-3595 appliance Ethernet port.

    The Ethernet connector supports Serial over LAN (SOL) cables. The RJ-45 port supports standardstraight-through and crossover Category 5 unshielded twisted-pair (UTP) cables. Cisco does not supplyCategory 5 UTP cables; these cables are available commercially.

    To connect the cable to the appliance Ethernet port:

    Step 1 Verify that the appliance is turned off.Step 2 Connect one end of the cable to the GigabitEthernet 0 port on the appliance.Step 3 Connect the other end to a switch in your network.

    Ethernet Port Connector

    The Cisco SNS 3515 or Cisco SNS-3595 appliance comes with twosix integrated dual-port Ethernet controllers.The controllers provide an interface for connecting to 10-Mb/s, 100-Mb/s, or 1000-Mb/s networks and providefull-duplex (FDX) capability, which enables simultaneous transmission and reception of data on the EthernetLAN. Cisco ISE supports multiple NICs.

    To access the Ethernet port, connect a Category 3, 4, 5, 5E, or 6 unshielded twisted-pair (UTP) cable to theRJ-45 connector on the back of the appliance.

    The following table describes the UTP cable categories.

    DescriptionType

    EIA Categories 3, 4, or 5 UTP (2 or 4 pair) up to 328ft (100 m)

    10BASE-T

    EIA Category 5 UTP (2 pair) up to 328 ft (100 m)100BASE-TX

    EIA Category 6 UTP (recommended), Category 5EUTP or 5 UTP (2 pair) up to 328 ft (100 m)

    1000BASE-T

    Cisco Identity Services Engine Installation Guide, Release 2.1 37

    Install Cisco ISE Software on Cisco SNS AppliancesConnect Cables

  • The following figure shows the RJ-45 port and plug.

    Figure 15: RJ-45 Port and Plug

    Ethernet Port Pin-out

    DescriptionSignalEthernet PortPin

    Transmit data +TxD+1

    Transmit data -TxD-2

    Receive data +RxD+3

    No connectionTerminationnetwork

    4

    No connectionTerminationnetwork

    5

    Receive data-RxD-6

    No connectionTerminationnetwork

    7

    No connectionTerminationnetwork

    8

    Connect the Console

    Warning: Do not work on the system or connect or disconnect cables during periods of lightning activity.

    Statement 1001

    Warning

    Your Cisco SNS-3515 or Cisco SNS-3595 appliance has a DCE-mode console port for connecting a consoleterminal to your appliance. The appliance uses a DB-9 serial connector for the console port.

    The console port on the Cisco SNS-3515 or Cisco SNS-3595 appliance includes an EIA/TIA-232 asynchronousserial (DB-9) connector. This serial console connector (port) allows you to access the appliance locally by

    Cisco Identity Services Engine Installation Guide, Release 2.138

    Install Cisco ISE Software on Cisco SNS AppliancesConnect Cables

  • connecting a terminaleither a PC running terminal-emulation software or an ASCII terminalto the consoleport.

    To connect a PC running terminal-emulation software to the console port, use a DB-9 female to DB-9 femalestraight-through cable.

    To connect an ASCII terminal to the console port, use a DB-9 female to DB-25 male straight-through cablewith a DB-25 female to DB-25 female gender changer.

    To connect a terminal or a PC running terminal-emulation software to the console port on the Cisco SNS-3515or Cisco SNS-3595 appliance:

    Step 1 Connect the terminal using a straight-through cable to the console port.Step 2 Configure your terminal or terminal-emulation software for 9600 baud, 8 data bits, no parity, 1 stop bit, and no hardware

    flow control.

    Connect the Keyboard and Video Monitor

    Do not work on the system or connect or disconnect cables during periods of lightning activity.

    Statement 1001

    Warning

    This section describes how to connect a keyboard and videomonitor to the Cisco SNS-3515 or Cisco SNS-3595appliance.

    You can connect the keyboard and video monitor to the Cisco SNS-3515 or Cisco SNS-3595 appliance usingthe KVMconnector available in the front panel of the Cisco SNS-3515 or Cisco SNS-3595 appliance. AKVMcable is shipped along with the appliance that provides two USB, one VGA, and one serial connector.

    The Cisco SNS-3515 or Cisco SNS-3595 appliance does not provide support for a mouse.

    The Cisco SNS-3515 or Cisco SNS-3595 provides USB ports on the rear of the appliance that can be used toconnect a keyboard and video monitor.

    To connect a keyboard and video monitor to the appliance:

    Step 1 Verify that the appliance is turned off.Step 2 Connect the end of the keyboard cable to the PS/2 (keyboard) port which is located on the back panel of the appliance.Step 3 Connect the end of the video monitor cable to the PS/2 (video monitor) port which is located on the back panel of the

    appliance.Step 4 Power on the appliance.

    Cisco Identity Services Engine Installation Guide, Release 2.1 39

    Install Cisco ISE Software on Cisco SNS AppliancesConnect Cables

  • Cable ManagementCable management is the most visual aspect of your appliance setup. However, cable management is oftenoverlooked because it can be time consuming.

    Equipment racks and enclosures house more equipment today than ever before. This growth has increasedthe need for organized cable management both inside and outside the rack. Poor cable management not onlyleads to damaged cables or increased time for adding or changing cables, but also blocks critical airflow oraccess. These problems can lead to inefficiencies in the performance of your equipment or even downtime.

    There are many solutions to address cable management. They can range from simple cable management rings,to vertical or horizontal organizers, to troughs and ladders.

    All Cisco SNS-3515 or Cisco SNS-3595 appliance cables should be properly dressed so as not to interferewith each other or other pieces of equipment. Use local practices to ensure that the cables attached to yourappliance are properly dressed.

    Proceed to the next section, Connect and Power On the Cisco SNS 3515 or 3595 Appliance, on page 40, tocontinue the installation process.

    Connect and Power On the Cisco SNS 3515 or 3595 Appliance Connect and Power On the Server (Standalone Mode), on page 40

    Cisco Integrated Management Controller, on page 42

    NIC Modes and NIC Redundancy Settings, on page 44

    Connect and Power On the Server (Standalone Mode)

    This section describes how to power on the server, assign an IP address, and connect to server managementwhen using the server in standalone mode.

    Note

    The server is shipped with the following default settings:

    The NIC mode is Shared LOM EXT.Shared LOM EXT mode enables the 1-Gb Ethernet ports and the ports on any installed Cisco virtualinterface card (VIC) to access Cisco Integrated Management Interface (Cisco IMC). If you want to usethe 10/100/1000 dedicated management ports to access Cisco IMC, you can connect to the server andchange the NIC mode as described in Step 1 of the procedures given below.

    The NIC redundancy is active-active.All Ethernet ports are utilized simultaneously.

    DHCP is enabled.

    IPv4 is enabled.

    You can connect to the system using two methods:

    Cisco Identity Services Engine Installation Guide, Release 2.140

    Install Cisco ISE Software on Cisco SNS AppliancesConnect and Power On the Cisco SNS 3515 or 3595 Appliance

  • Local setupUse this procedure if you want to connect a keyboard and monitor to the system for setup.This procedure can use a KVM cable (Cisco PID N20-BKVM) or the ports on the rear of the server.See Local Connection Procedure, on page 41.

    Remote setupUse this procedure if you want to perform setup through your dedicated managementLAN. See Remote Connection Procedure, on page 41.

    To configure the system remotely, you must have a DHCP server on the same network as the system.Your DHCP server must be preconfigured with the range of MAC addresses for this server node. TheMAC address is printed on a label on the rear of the server node. This server node has a range of six MACaddresses assigned to the Cisco IMC. The MAC address printed on the label is the beginning of the rangeof six contiguous MAC addresses.

    Note

    Local Connection Procedure

    Step 1 Attach a power cord to each power supply unit in your server, and then attach each power cord to a grounded AC poweroutlet. See Power Specifications, on page 29 for power specifications.Wait for approximately two minutes to let the server boot in standby power during the first bootup.

    You can verify system power status by looking at the system Power Status LED on the front panel (see LED Indicatorson Cisco SNS 3515 and 3595 Appliances, on page 16). The system is in standby power mode when the LED is amber.

    Step 2 Connect a USB keyboard and VGA monitor to the server using one of the following methods:

    Connect a USB keyboard and VGA monitor to the corresponding connectors on the rear panel (see Cisco SNS3515 or SNS 3595 Appliance Back Panel View, on page 20).

    Connect an optional KVM cable (Cisco PID N20-BKVM) to the KVM connector on the front panel (see CiscoSNS-3515 or 3595 Appliance Front Panel View, on page 17 for the connector location). Connect your USBkeyboard and VGA monitor to the KVM cable.

    Step 3 Open the Cisco IMC Configuration Utility:a) Press and hold the front panel power button for four seconds to boot the server.b) During bootup, press F8 when prompted to open the Cisco IMC Configuration Utility.

    This utility has two windows that you can switch between by pressing F1 or F2.

    c) Continue with Setup CIMC Configuration Utility, on page 42.

    Remote Connection Procedure

    Step 1 Attach a power cord to each power supply unit in your server, and then attach each power cord to a grounded AC poweroutlet. See Power Specifications, on page 29 for power specifications.

    Cisco Identity Services Engine Installation Guide, Release 2.1 41

    Install Cisco ISE Software on Cisco SNS AppliancesConnect and Power On the Cisco SNS 3515 or 3595 Appliance

  • Wait for approximately two minutes to let the server boot in standby power during the first bootup.

    You can verify system power status by looking at the system Power Status LED on the front panel (see LED Indicatorson Cisco SNS 3515 and 3595 Appliances, on page 16). The system is in standby power mode when the LED is amber.

    Step 2 Plug your management Ethernet cable into the dedicated management port on the rear panel (see Cisco SNS 3515 orSNS 3595 Appliance Back Panel View, on page 20).

    Step 3 Allow your preconfigured DHCP server to assign an IP address to the server node.Step 4 Use the assigned IP address to access and log in to the Cisco IMC for the server node. Consult with your DHCP server

    administrator to determine the IP address.The default user name for the server is admin. The default password is password.Note

    Step 5 From the Cisco IMC Server Summary page, click Launch KVM Console. A separate KVM console window opens.Step 6 From the Cisco IMC Summary page, click Power Cycle Server. The system reboots.Step 7 Select the KVM console window.

    The KVM console window must be the active window for the following keyboard actions towork.

    Note

    Step 8 When prompted, press F8 to enter the Cisco IMC Configuration Utility. This utility opens in the KVM console window.This utility has two windows that you can switch between by pressing F1 or F2.

    Step 9 Continue with Setup CIMC Configuration Utility, on page 42.

    Cisco Integrated Management ControllerYou can monitor the server inventory, health, and system event logs by using the built-in Cisco IntegratedManagement Controller (CIMC) GUI or CLI interfaces. See the user documentation for your firmware releaseat the following URL:

    http://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-integrated-management-controller/products-installation-and-configuration-guides-list.html

    Setup CIMC Configuration Utility

    The following procedure is performed after you connect to the system and open the Cisco IMC ConfigurationUtility.

    Step 1 Set NIC mode and NIC redundancy:a) Set the NIC mode to choose which ports to use to access Cisco IMC for server management:

    Shared LOM EXT (default)This is the shared LOM extended mode, the factory-default setting. With thismode, the Shared LOM and Cisco Card interfaces are both enabled.

    In this mode, DHCP replies are returned to both the shared LOM ports and the Cisco card ports. If the systemdetermines that the Cisco card connection is not getting its IP address from a Cisco UCS Manager systembecause the server is in standalone mode, further DHCP requests from the Cisco card are disabled. Use theCisco Card NIC mode if you want to connect to Cisco IMC through a Cisco card in standalone mode.

    Cisco Identity Services Engine Installation Guide, Release 2.142

    Install Cisco ISE Software on Cisco SNS AppliancesConnect and Power On the Cisco SNS 3515 or 3595 Appliance

    http://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-integrated-management-controller/products-installation-and-configuration-guides-list.htmlhttp://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-integrated-management-controller/products-installation-and-configuration-guides-list.html

  • Shared LOMThe 1-Gb Ethernet ports are used to access Cisco IMC. You must select a NIC redundancy andIP setting.

    DedicatedThe dedicated management port is used to access Cisco IMC. You must select a NIC redundancyand IP setting.

    Cisco CardThe ports on an installed Cisco UCS virtual interface card (VIC) are used to access the CiscoIMC. You must select a NIC redundancy and IP setting.

    See also the required VIC Slot setting below.

    VIC SlotIf you use the Cisco Card NIC mode, you must select this setting to match where your VIC isinstalled. The choices are Riser1, Riser2, or Flex-LOM (the mLOM slot).

    If you select Riser1, slot 1 is used.

    If you select Riser2, slot 2 is used.

    If you select Flex-LOM, you must use an mLOM-style VIC in the mLOM slot.

    b) Use this utility to change the NIC redundancy to your preference. This server has three possible NIC redundancysettings:

    NoneThe Ethernet ports operate independently and do not fail over if there is a problem. This setting can beused only with the Dedicated NIC mode.

    Active-standbyIf an active Ethernet port fails, traffic fails over to a standby port.

    Active-activeAll Ethernet ports are utilized simultaneously. The Shared LOM EXT mode can have only thisNIC redundancy setting. Shared LOM and Cisco Card modes can have both Active-standby and Active-activesettings.

    Step 2 Choose whether to enable DHCP for dynamic network settings, or to enter static network settings.Before you enable DHCP, you must preconfigure your DHCP server with the range of MAC addresses for thisserver. The MAC address is printed on a label on the rear of the server. This server has a range of six MACaddresses assigned to Cisco IMC. The MAC address printed on the label is the beginning of the range of sixcontiguous MAC addresses.

    Note

    The static IPv4 and IPv6 settings include the following:

    The Cisco IMC IP address.

    The prefix/subnet.For IPv6, valid values are 1127.

    The gateway.For IPv6, if you do not know the gateway, you can set it as none by entering :: (two colons).

    The preferred DNS server address.For IPv6, you can set this as none by entering :: (two colons).

    Step 3 (Optional) Use this utility to make VLAN settings.Step 4 Press F1 to go to the second settings window, then continue with the next step.

    From the second window, you can press F2 to switch back to the first window.

    Cisco Identity Services Engine Installation Guide, Release 2.1 43

    Install Cisco ISE Software on Cisco SNS AppliancesConnect and Power On the Cisco SNS 3515 or 3595 Appliance

  • Step 5 (Optional) Set a hostname for the server.Step 6 (Optional) Enable dynamic DNS and set a dynamic DNS (DDNS) domain.Step 7 (Optional) If you check the Factory Default check box, the server reverts to the factory defaults.Step 8 (Optional) Set a default user password.Step 9 (Optional) Enable auto-negotiation of port settings or set the port speed and duplex mode manually.

    Auto-negotiation is applicable only when you use the Dedicated NICmode. Auto-negotiation sets the port speedand duplex mode automatically based on the switch port to which the server is connected. If you disableauto-negotiation, you must set the port speed and duplex mode manually.

    Note

    Step 10 (Optional) Reset port profiles and the port name.Step 11 Press F5 to refresh the settings that you made. You might have to wait about 45 seconds until the new settings appear

    and the message, Network settings configured is displayed before you reboot the server in the next step.Step 12 Press F10 to save your settings and reboot the server.

    If you chose to enable DHCP, the dynamically assigned IP and MAC addresses are displayed on the consolescreen during bootup.

    Use a browser and the IP address of the Cisco IMC to connect to the Cisco IMC management interface. The IPaddress is based upon the settings that you made (either a static address or the address assigned by your DHCPserver).

    The default username for the server is admin. The default password is password.

    Note

    To manage the server, see the Cisco UCS C-Series Rack-Mount Server Configuration Guide or the Cisco UCS C-SeriesRack-Mount Server CLI Configuration Guide for instructions on using those interfaces. The links to these documentsare in the C-Series documentation roadmap:

    http://www.cisco.com/go/unifiedcomputing/c-series-doc

    NIC Modes and NIC Redundancy Settings

    NIC Modes

    This server has the following NIC mode settings that you can choose from:

    Shared LOM EXT (default)This is the Shared LOM extended mode, the factory-default setting. Withthis mode, the shared LOM and Cisco Card interfaces are both enabled.

    In this mode, DHCP replies are returned to both the shared LOM ports and the Cisco card ports. If thesystem determines that the Cisco card connection is not getting its IP address from a Cisco UCSManagersystem because the server is in standalonemode, further DHCP requests from the Cisco card are disabled.If the system determines that the Cisco card connection is getting its IP address from a Cisco UCSManager system, the reply has parameters that automatically move the server to UCSM mode.

    DedicatedThe dedicated management port is used to access Cisco IMC. You must select a NICredundancy and IP setting.

    Shared LOMThe 1-Gb Ethernet ports are used to access Cisco IMC. Youmust select a NIC redundancyand IP setting.

    Cisco CardThe ports on an installed Cisco UCS virtual interface card (VIC) are used to access CiscoIMC. You must select a NIC redundancy and IP setting.

    Cisco Identity Services Engine Installation Guide, Release 2.144

    Install Cisco ISE Software on Cisco SNS AppliancesConnect and Power On the Cisco SNS 3515 or 3595 Appliance

    http://www.cisco.com/go/unifiedcomputing/c-series-doc

  • See also the required VIC Slot setting below.

    VIC SlotIf you use the Cisco Card NIC mode, you select this setting to match where your VIC isinstalled. The choices are Riser1, Riser2, or Flex-LOM (the mLOM slot).

    If you select Riser1, slot 1 is used.

    If you select Riser2, slot 2 is used.

    If you select Flex-LOM, you must use an mLOM-style VIC in the mLOM sl

    NIC Redundancy

    This server has the following NIC redundancy settings that you can choose from:

    NoneThe Ethernet ports operate independently and do not fail over if there is a problem. This settingcan be used only with the Dedicated NIC mode.

    Active-standbyIf an active Ethernet port fails, traffic fails over to a standby port.

    Active-activeAll Ethernet ports are utilized simultaneously. Shared LOM EXT mode can have onlythis NIC redundancy setting. Shared LOM and Cisco Card modes can have both Active-standby andActive-active settings.

    The active/active setting usesMode 5 or Balance-TLB (adaptive transmit load balancing). This is channelbonding that does not require any special switch support. The outgoing traffic is distributed accordingto the current load (computed relative to the speed) on each slave. Incoming traffic is received by thecurrent slave. If the receiving slave fails, another slave takes over theMAC address of the failed receivingslave.

    Install Cisco ISE Software on Cisco SNS Appliances

    Install Cisco ISE on the Cisco SNS 3515 or 3595 ApplianceThe Cisco SNS 3515 and Cisco SNS 3595 appliances are preinstalled with the ISE software. This sectiongives you an overview of the installation process and the tasks that you must perform before installing ISE.

    Cisco Identity Services Engine Installation Guide, Release 2.1 45

    Install Cisco ISE Software on Cisco SNS AppliancesInstall Cisco ISE Software on Cisco SNS Appliances

  • Before you begin installing ISE, you must:

    Step 1 Open the box and check the contents. See Unpack and Inspect the Server, on page 25.Step 2 Read about the Cisco SNS 3500 Series Appliances, on page 15.Step 3 Read the general precautions and safety warnings in Before You Begin, on page 24.Step 4 Install the appliance in the rack. See Prepare for Server Installation, on page 26.Step 5 Connect the Cisco SNS-3515 or Cisco SNS-3595 to the network and appliance console. See Connect Cables, on page

    36.Step 6 Power up the Cisco SNS-3515 or Cisco SNS-3595 appliance. See Connect and Power On the Cisco SNS 3515 or 3595

    Appliance, on page 40.Step 7 Run the setup command at the CLI prompt to configure the initial settings for the ISE server. See Run the Setup Program,

    on page 50. The setup can be done by using the appliance console or CIMC.You can use the Cisco UCS Server Configuration Utility, Release 3.0 User Guide to configure the Cisco SNS-3515 orCisco SNS-3595 appliance. You can also see the Cisco UCS C-Series Rack Server guides for more information on CiscoSNS-3515 or Cisco SNS-3595 appliance.

    Download the Cisco ISE ISO ImageDownload the ISO image to install Cisco ISE on Cisco SNS appliance.

    Step 1 Go to http://www.cisco.com/go/ise. You must already have valid Cisco.com login credentials to access this link.Step 2 Click Download Software for this Product

    The Cisco ISE software image comes with a 90-day evaluation license already installed, so you can begin testing allCisco ISE services when the installation and initial configuration is complete.

    Install the ISE ServerAfter you download the Cisco ISE ISO image, you can use any of the following options to install and set upthe Cisco ISE software on your appliance:

    If you are reimaging a 3400 series appliance with Release 2.0.1 or later software, ensure that you havethe latest BIOS and CIMC version on your appliance.

    Note

    Configure the Cisco Integrated Management Interface (CIMC) and use it to install Cisco ISE remotelyvia the network. See:

    1 Set up the CIMC configuration utility. See Cisco Integrated Management Controller, on page 42for more information.

    Cisco Identity Services Engine Installation Guide, Release 2.146

    Install Cisco ISE Software on Cisco SNS AppliancesDownload the Cisco ISE ISO Image

    http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/ucsscu/user/guide/30/UCS_SCU.htmlhttp://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-rack-servers/tsd-products-support-series-home.htmlhttp://www.cisco.com/go/ise

  • 2 Install ISE 2.1 on the Cisco SNS 3515 or 3595 Appliance Remotely Using CIMC, on page 473 Run the Setup Program, on page 50

    Create a bootable USB Drive and use it to install Cisco ISE. See:

    1 Create a Bootable USB Device to Install Cisco ISE, on page 492 Install ISE 2.1 on the Cisco 3500 Appliance Using the USB Drive, on page 483 Run the Setup Program, on page 50

    Install ISE 2.1 on the Cisco SNS 3515 or 3595 Appliance Remotely Using CIMCAfter you have configured the CIMC for your appliance, you can use it to manage your Cisco SNS-3515 orCisco SNS-3595 appliance. You can perform all operations including BIOS configuration on your CiscoSNS-3515 or Cisco SNS-3595 appliance through the CIMC.

    Step 1 Connect to the CIMC for server management. Connect Ethernet cables from your LAN to the server, using the ports thatyou selected in NICMode setting. The Active-active and Active-passive NIC redundancy settings require you to connectto two ports.

    Step 2 Use a browser and the IP address of the CIMC to log in to the CIMC Setup Utility. The IP address is based upon yourCIMC config settings that you made (either a static address or the address assigned by your DHCP server).

    The default user name for the server is admin. The default password is password.Note

    Step 3 Use your CIMC credentials to log in.Step 4 Click Launch KVM Console.Step 5 Choose Virtual Media > Activate Virtual Devices.Step 6 Choose Virtual Media > Map CD/DVD to select the ISE ISO from the system running your client browser, and click

    Map Device.Step 7 ChooseMacros > Static Macros > Ctrl-Alt-Del to boot the Cisco SNS-3515 or Cisco SNS-3595 appliance using the

    ISO image.Step 8 Press F6 to bring up the boot menu. A screen similar to the following one appears.

    Figure 16: Select Boot Device

    Step 9 Select the CD/DVD that you mapped and press Enter. The following message is displayed.

    Cisco Identity Services Engine Installation Guide, Release 2.1 47

    Install Cisco ISE Software on Cisco SNS AppliancesInstall the ISE Server

  • Example:Please wait, preparing to boot...................................................................................