Ise Upgrade Guide Chapter 01
Ise Upgrade Guide Chapter 01
Ise Upgrade Guide Chapter 01
Cisco Identity Services Engine (ISE) supports application upgrades only from the command-line Interface
(CLI). You can upgrade Cisco ISE from any previous release to the next release. A previous release can
have patches installed on it, or it can be any maintenance release.
Instructions for Upgrading to Cisco ISE, Release 1.2.1, page 1
Important Notes To Read Before You Upgrade, page 2
Obtain a Backup Before Upgrade to Prevent Any Data Loss, page 5
Cisco ISE 1.2 Upgrade Process, page 9
Cisco ISE 1.2 Supported Upgrade Paths, page 10
Downloading the Upgrade Software, page 10
Upgrade CLI Command, page 11
Upgrade Methods for Different Types of Deployments, page 11
Verifying the Upgrade Process, page 12
Post-Upgrade Tasks, page 12
Known Upgrade Issues, page 13
The process for upgrading to Release 1.2.1 is the same as upgrading to Release 1.2. The system reboots twice
when you upgrade from Release 1.1.x to 1.2.1 because it involves a 32-bit to 64-bit system upgrade, but only
once when you upgrade from Release 1.2.x to 1.2.1 because Release 1.2 is a 64-bit system.
The application upgrade command is enhanced and includes the cleanup, prepare, and proceed options.
You can use:
CleanupTo clean a previously prepared upgrade bundle on a node locally. You can use this option
if:
The application upgrade prepare command was interrupted for some reason
The application upgrade prepare command was run with an incorrect upgrade bundle
The upgrade failed for some reason
PrepareTo download and extract an upgrade bundle locally. You can use this command followed by
the application upgrade proceed command.
ProceedTo upgrade Cisco ISE using the upgrade bundle you extracted with the prepare option. You
can use this option after preparing an upgrade bundle instead of using the application upgrade
ise-upgradebundle-1.2-to-1.2.1.xxx.i386.tar.gz remote-repository command.
If upgrade is successful, this option removes the upgrade bundle.
If upgrade fails for any reason, this option retains the upgrade bundle.
OL-27087-01
Verify the MD5sum of the upgrade bundle. After you download the upgrade bundle to a repository such
as FTP or SFTP, check and verify that the MD5sum is correct. You can use the md5sum command in
Linux or the md5 command in MAC OSX.
Ensure that you have read the VMware Virtual Machine Settings, on page 4 section if you are upgrading
Cisco ISE on a virtual machine. These recommendations are useful when you choose to reimage some
nodes, in case of replacing nodes with new VMs or appliances and also if there are any secondary node
upgrade failures where remediation is not possible.
Record the alarm, e-mail settings, report customization, favorite reports, monitoring data backup schedules,
and data purge settings. You must reconfigure these settings after upgrade.
Disable services such as Guest, Profiler, Device Onboarding, and so on before upgrade and enable them
after upgrade. Otherwise, you must add the guest users who are lost, and devices must be profiled and
onboarded again.
Record the SNMP profiler probe settings. You must reconfigure the profiler SNMP polling from the
primary Administration node after upgrade if you are using it for profiling.
Disable the console timeout temporarily from the Cisco ISE CLI for remote upgrades. Use the following
command from the Cisco ISE CLI: terminal session-timeout 0. After you disable the console timeout,
log out and log in to the Cisco ISE CLI. After upgrade is complete, ensure that the terminal session
timeout is set to its original value. The default value is 30 minutes.
We strongly recommend that you delay any deployment configuration changes such as changing node
personas, system synchronization, and node registration or deregistration until all the nodes in your
deployment are completely upgraded. One exception to this recommendation, however, involves steps
that are required to recover from a failed upgrade.
The Monitoring node's database size is reduced after you upgrade to Release 1.2 because of database
design and schema changes in Release 1.2, which optimizes disk space utilization and offers better
performance.
The upgrade process from Cisco ISE 1.1.x to 1.2 includes the operating system and application binary
upgrade from a 32-bit to a 64-bit system. During upgrade, the node is rebooted twice following the
database and operating system upgrade. After the second reboot, the 64-bit application binaries are
installed and the database is migrated to the 64-bit system. During this process, you can monitor the
progress of the upgrade from the CLI using the show application status ise command. The following
message appears: "% NOTICE: Identity Services Engine upgrade is in progress..."
Related Topics
Cisco Identity Services Engine User Guide, Release 1.2
Cisco Identity Services Engine CLI Reference Guide, Release 1.2
Note
You must power down the virtual machine before you make the following changes, and power it back on
after the changes are done.
Cisco ISE, Release 1.2, is a 64-bit system. Ensure that your virtual machine's hardware is compatible
with 64-bit systems. See the Cisco Identity Services Engine Hardware Installation Guide, Release 1.2
for more information. Enable BIOS settings that are required for 64-bit systems. Refer to the VMware
Knowledge Base for hardware and firmware requirements for 64-bit guest operating systems. After you
upgrade to Release 1.2, choose Linux as the Guest Operating System and Red Hat Enterprise Linux 5
(64-bit) as the version. See the VMware Knowledge Base for more information.
OL-27087-01
You can also increase the CPU and memory size of the virtual machine. Refer to Cisco Identity Services
Engine Hardware Installation Guide, Release 1.2 for deployment sizing and scaling recommendations
for the SNS 3400 Series appliances. If you increase the disk size of a virtual machine, you cannot upgrade
so you must do a fresh installation of Release 1.2. After you install Release 1.2, you can check the CPU
and memory size using the show inventory command from the Cisco ISE CLI.
Node Persona
1 hour 20 minutes
Secondary Administration
2 hours
Monitoring
1.5 hours
Note
Cisco ISE nodes on virtual machines might take a longer time to upgrade than physical appliances.
not support file listing. In a distributed deployment, if the primary Administration and primary Monitoring
personas run on the same node (appliance or virtual machine), then you can use the local repository for the
backup. If they run on separate nodes (appliances or virtual machines), the local repository cannot be used
for the backup. You can use the CLI and GUI to create repositories, but for Cisco ISE, Release 1.2, it is
recommended to use the GUI due to the following reasons:
Repositories that are created through the CLI are saved locally and do not get replicated to the other
deployment nodes. These repositories do not get listed in the repository GUI page.
Repositories that are created on the primary Administration node through the GUI get replicated to the
other deployment nodes.
Note
Operational (Monitoring data) backup can be obtained only from the primary and secondary Monitoring
nodes.
Procedure
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
OL-27087-01
Note
Operational backups can be obtained only from the primary and secondary Monitoring nodes.
For backup and restore operations, the following repository types are not supported: CD-ROM, HTTP,
HTTPS, or TFTP. This is because, these repository types are read-only or the protocol does not support
file listings.
In a distributed deployment, if the primary Administration and primary Monitoring personas run on the
same node (appliance or virtual machine), then you can use the local repository for the backup. If they
run on separate nodes (appliances or virtual machines), the local repository cannot be used for the backup.
Procedure
To obtain Cisco ISE configuration data, enter the backup command with the ise-config command operator
parameter in the CLI of the primary Administration node in your old deployment. To obtain Cisco ISE
operational (monitoring and troubleshooting) data, enter the backup command with the ise-operational
command operator parameter in the CLI of the primary or secondary Monitoring node in your old deployment.
CLI command to obtain a Cisco ISE configuration backup.
backup backup-name repository repository-name ise-config encryption-key{hash | plain}
encryption-keyname
CLI command to obtain a Cisco ISE operational backup.
repository
repository-name
ise-config
ise-operational
encryption-key
hash
plain
encryption-key name
The backup command performs a backup of the Cisco ISE and ADE-OS configuration data and monitoring
data and places the backup in a repository with an encrypted (hashed) or unencrypted plaintext password.
You can encrypt and decrypt the backup by using a user-defined encryption key.
ise/admin# backup mybackup repository myrepository ise-config encryption-key plain Lab12345
% Creating backup with timestamped filename: backup-111125-1252.tar.gpg
ise/admin#
ise/admin# backup mybackup repository myrepository ise-operational encryption-key plain
Lab12345
% Creating backup with timestamped filename: backup-111125-1235.tar.gpg
ise/admin#
Related Topics
Cisco Identity Services Engine CLI Reference Guide, Release 1.1.x
OL-27087-01
Note
To upgrade to Cisco ISE, Release 1.2, you do not have to deregister the nodes from the deployment and
register them to the new deployment as was the case in previous releases. When you run the application
upgrade command from the CLI, the upgrade software deregisters the node and registers it to the new
deployment automatically.
The upgrade fails if you make any node persona changes in the old deployment after you start the upgrade
on the secondary Administration node.
You must first upgrade the secondary Administration node. Then, upgrade the primary Monitoring node,
followed by the Policy Service nodes and Inline Posture nodes, respectively. Next, upgrade the secondary
Monitoring node (if you have one in your old deployment). Finally, upgrade the primary Administration node
from your old deployment. For Policy Service nodes, the database schema is not upgraded. Instead, the Policy
Service nodes get a copy of the new database from the primary Administration node in the new deployment.
From Version
Upgrade Path
Procedure
Command or Action
Step 1
Purpose
Go to http://www.cisco.com/go/ise. You
must already have valid Cisco.com login
credentials to access this link.
OL-27087-01
Command or Action
Purpose
Step 2
Step 3
Download
ise-upgradebundle-1.1.x-to-1.2.0.899.i386.tar.gz
to upgrade from Release 1.1.x to Release 1.2.
Download
ise-upgradebundle-1.2.0.899.x86_64.tar.gz to
upgrade from the Limited Availability Release to
Release 1.2.
11
Post-Upgrade Tasks
Note
If you have recently upgraded to Cisco ISE 1.3, perform the post-upgrade tasks listed in the Cisco Identity
Services Upgrade Guide, Release 1.3.
Refer to Cisco Identity Services Engine User Guide, Release 1.2, for details about each of these tasks.
Check if the local and Certificate Authority (CA) certificates are available. Reimport them, if necessary.
Reconfigure your backup schedules (configuration and operational). Scheduled backups configured in
the old deployment are lost during upgrade.
Join Cisco ISE with Active Directory again, if you use Active Directory as your external identity source
and connection to Active Directory is lost.
Reset the RSA node secret if you use RSA SecurID server as your external identity source.
Perform a posture update from the primary Administration node after upgrade if you have enabled the
Posture service.
Check and import custom profiler policies. If you changed the default profiler policies, the upgrade
process overwrites the changes.
Check profiling probe configurations and reconfigure them, if necessary.
Customize default language templates after upgrade. If you had customized the default language templates
in the old deployment, the upgrade process overwrites the changes.
Reconfigure profiler SNMP polling. This configuration is lost during an upgrade.
After upgrade, the OUI entries might be missing in the database, which might result in the endpoints
matching incorrect authorization policies. Run the feed service to update the OUI.
In previous releases of Cisco ISE, guest user records were available in the Internal Users database. Cisco
ISE, Release 1.2 introduces a Guest Users database, which is different than the Internal Users database.
If you have added the Internal Users database to your identity source sequence, the Guest Users database
also becomes part of your identity source sequence. If guest user login is not applicable, remove the
Guest Users database from the identity source sequence.
OL-27087-01
the configuration data before upgrade and restored it in Cisco ISE, Release 1.2, the scheduled backup
configurations are lost.
Solution You must reconfigure the scheduled backups in Cisco ISE, Release 1.2.
13
New Users or Endpoints Added to the Old Deployment During Upgrade Are
Lost
Problem Guest users or endpoints that are added to the old deployment when the new deployment is formed
are lost.
Solution Ensure that you disable services such as Guest, Profiler, Device Onboarding, and so on before an
upgrade and enable them after upgrade. Otherwise, you must add the guest users who are lost, and devices
must be profiled and onboarded again.
node after an upgrade. Refer to the Cisco Identity Services Engine User Guide, Release 1.2, for more
information.
upgrade.
Solution Customize the default language templates again after the upgrade.
OL-27087-01
to all nodes.
Solution After you upgrade to Release 1.2, configure the password policy from the Cisco ISE Admin portal
Settings > Posture > Updates. Check the Cisco supported OS version. If it is set to 0.0.0.0, perform a posture
update.
browser opens "safe files" after a download. This setting decompresses the upgrade bundle after download
and causes the manifest error during upgrade.
Solution Uncheck the "open safe files after downloading" option under Preferences in the Apple Safari web
browser.
15
OL-27087-01