Prepare for upgrade

Before you start the upgrade process, ensure you complete these tasks:

Health check

Ensure you run a health check on your Cisco ISE deployment before upgrading to identify and resolve critical issues that may cause downtime. For more information, see "Health Check" in the “ Troubleshooting” chapter in the Cisco ISE Administrator Guide.

Guidelines to minimize upgrade time and maximize efficiency during upgrade

These guidelines help you address issues in your current deployment during the upgrade process, which reduces overall downtime.

  • Upgrade to the latest patch in the existing version before starting the upgrade.


    Note


    If you are upgrading from Cisco ISE release 2.6 patch 10 and later or 2.7 Patch 4 and laterrelease and have an SSM On-Prem server configured, you must disconnect the SSM On-Prem server before you begin the upgrade process.

    If you are upgrading from earlier releases and have an SSM On-Prem server configured, you must disconnect the SSM On-Prem server before you begin the upgrade process.


  • We recommend that you test the upgrade in a staging environment to identify and address any issues without impacting the live system.

    • All the nodes in the Cisco ISE deployment should be in the same patch level in order to exchange data.


      Note


      If all the nodes in your deployment are not on the same Cisco ISE version and patch version, you will get a warning message: Upgrade cannot begin . This message indicates that the upgrade is in a blocked state. Ensure that all nodes are in the same version (including any patch versions) before you begin the upgrade.


    • Based on the number of PSNs in your deployment and availability of personnel, you can install the final version of Cisco ISE you need to upgrade to, apply latest patch, and keep it ready.

    • In case you want to retain the MnT logs, complete the tasks for MnT nodes and join them to the new deployment as MnT nodes. However, if you do not need to retain the operational logs, you can skip the step by re-imaging the MnT nodes.

    • Cisco ISE installation can be done in parallel if you have multi-node deployment without impact to the production deployment. Installing ISE servers in parallel saves time especially when you are using backup and restore from a previous release.

    • PSN can be added to the new deployment to download the existing policies during the registration process from the PAN. Use ISE latency and bandwidth calculator to understand the latency and bandwidth requirement in Cisco ISE deployment.

    • It is a best practice to archive the old logs and not transit them to the new deployments. This is because operational logs restored in the MnTs are not synchronized to different nodes in case you change the MnT roles later.

    • If you have two data centers with full distributed deployment, first upgrade the backup data center. Then test the use cases before upgrading the primary data center.

  • Download and store the upgrade software in a local repository before upgrade to speed up the process.

  • If you are currently upgrading to Cisco ISE, release 3.0 or later, you can either use Health Check or Upgrade Readiness Tool (URT) to run system diagnosis before you initiate the upgrade process.

  • If you are currently upgrading to a recent Cisco ISE release, you can either use Health Check or Upgrade Readiness Tool (URT) to run system diagnosis before you initiate the upgrade process.

  • Use the Upgrade Readiness Tool (URT) to detect and fix any configuration data upgrade issues before you start the upgrade process. Most upgrade failures occur due to configuration data issues during the upgrade. The URT validates the data to identify issues before the upgrade and fixes or reports them whenever possible. The URT is available as a separate downloadable bundle that can be run on a Secondary Policy Administration node or standalone node. There is no downtime to run this tool. This video explains how to use the URT: https://video.cisco.com/detail/video/5797832452001.


    Warning


    Do not run the URT on the Primary Policy Administration Node. The URT tool does not simulate MnT operational data upgrades.


  • Note that when upgrading Cisco ISE using the GUI, the timeout for the process per node is four hours. If the process takes longer, you must restart it. If upgrading with the Upgrade Readiness Tool (URT) will take you more than four hours, Cisco recommends that you use CLI for this process.

  • Back up the load balancers before changing the configuration. You can remove the PSNs from the load balancers during the upgrade window and add them back after the upgrade.

  • Disable automatic PAN Failover (if configured) and disable Heartbeat between PANs during the upgrade.

  • Review the existing policies and eliminate any outdated or redundant rules.

  • Remove unwanted monitoring logs and endpoint data.

  • You can take a backup of configuration and operations logs and restore it on a temporary server that is not connected to the network. You can use a remote logging target during the upgrade window.

    You can use these options after the upgrade to reduce the number of logs that are sent to MnT nodes and improve the performance:

    • Use the MnT collection filters (To view this window, click the Menu icon () and choose Administration > System > Logging > Collection Filters) to filter incoming logs and avoid duplication of entries in AAA logs.

    • You can create Remote Logging Targets (To view this window, click the Menu icon () and choose Administration > System > Logging > Remote Logging Targets) and route each individual logging category to specific Logging Target (To view this window, click the Menu icon () and choose System > Logging > Logging categories.

    • Enable the Ignore Repeated Updates options. To view this window, click the Menu icon () and choose Administration > System > Settings > Protocols > RADIUS window to avoid repeated accounting updates.

  • Download and use the latest upgrade bundle for upgrade. Use this query in the Bug Search Tool to find the upgrade related defects that are open and fixed: http://cs.co/ise-upgrade-bugsearch

  • Test all the use cases for the new deployment with fewer users to ensure service continuity.

Validate data to prevent upgrade failures

Cisco ISE offers an Upgrade Readiness Tool (URT) that you can run to detect and fix any data upgrade issues before you start the upgrade process.

Most upgrade failures happen due to data upgrade issues. Use the URT to validate your data before an upgrade, identify and report issues, and fix issues when possible.

The URT is available as a separate downloadable bundle. Run the URT on a Secondary Administration Node for high availability and other deployments with multiple nodes, or on the Standalone Node for a single-node deployment.


Warning


In multiple-node deployments, do not run the URT on the Primary Policy Administration Node.


You can run the URT from the Command-Line Interface (CLI) of the Cisco ISE node. The URT:

  1. Checks whether the URT is run on a supported version of Cisco ISE. The supported versions are Release 2.7, 3.0 and 3.1.

  2. Verifies that the URT is run on either a standalone Cisco ISE node or a Secondary Policy Administration Node (secondary PAN).

  3. Checks if the URT bundle is less than 45 days old. This check ensures that you use the most recent URT bundle.

  4. Checks whether all these prerequisites are met.

    • Version compatibility

    • Persona checks

    • Disk space


      Note


      Verify the available disk size with Disk Requirement Size. If you need to increase the disk size, reinstall Cisco ISE and restore a configuration backup.


    • NTP server

    • Memory

    • System and trusted certificate validation

  5. Clones the configuration database

  6. Copies the latest upgrade files to the upgrade bundle


    Note


    If there are no patches in the URT bundle, the output will return N/A. This is expected behavior during the installation of a hot patch.


  7. Performs a schema and data upgrade on the cloned database

    • If the upgrade on the cloned database is successful, the tool provides an estimate of the time required for the upgrade to complete.

    • If the upgrade is successful, the tool removes the cloned database.

    • If the upgrade on the cloned database fails, the tool collects the required logs, prompts for an encryption password, generates a log bundle, and stores the bundle on the local disk.

Download and run the Upgrade Readiness Tool

The URT checks the configuration data before the upgrade to identify issues that could cause an upgrade failure.

Before you begin

While running the URT, do not simultaneously :

  • Back up or restore data

  • Make any persona changes

Procedure


Step 1

Create a repository and copy the URT bundle

Step 2

Run the URT


Create a repository and copy the URT bundle

Create a repository, then copy the URT bundle. For more information about creating a repository, see “Create Repositories” in the Chapter “Maintain and Monitor” in the Cisco ISE Administrator Guide.

To improve performance and reliability, use File Transfer Protocol (FTP). Avoid using repositories located across slow WAN links. Choose a local repository near your nodes.

Before you begin

Make sure your connection to the repository has enough bandwidth.

Procedure

Step 1

Download the URT bundle from the Cisco ISE Download Software Center (ise-urtbundle-3.2.xxx-1.0.0.SPA.x86_64.tar.gz).

Step 2

Optionally, to save time, copy the URT bundle to the local-disk on the Cisco ISE node using the command:

copy repository_url/path/ise-urtbundle-3.2.xxx-1.0.0.SPA.x86_64.tar.gz disk:/

To copy the upgrade bundle using SFTP, perform these steps:

(Add the host key if it does not exist) crypto host_key add host mySftpserver
copy sftp://aaa.bbb.ccc.ddd/ ise-urtbundle-3.2.xxx-1.0.0.SPA.x86_64.tar.gz disk:/

The value "aaa.bbb.ccc.ddd" represents the IP address or hostname of the SFTP server; "ise-urtbundle-3.2.xxx-1.0.0.SPA.x86_64.tar.gz" is the name of the URT bundle.


Run the URT

The URT identifies data issues that might cause an upgrade failure. It reports or fixes these issues where possible. To run the URT:

Before you begin

Storing the URT bundle on the local disk allows the installation process to complete more quickly.

Procedure

Enter the application install command to install the URT.

application install ise-urtbundle-3.2.0.x.SPA.x86_64.tar.gz reponame

Note

 

If the application is not installed successfully, URT provides the reason for the upgrade failure. Fix any reported issues, then run the URT again.

Before upgrading to Cisco ISE release 3.2, you must remove the 5G attribute. For more information, see the "Configure Cisco Private 5G as a Service" section in the "Secure Access" chapter in the Cisco ISE Administrator Guide.

Note

 

If you do not remove the 5G attribute, you will see this error:

Error Occurred while adding 5G field to access service

Error while applying changes in version: 3.2.0.100 class: com.cisco.cpm.acs.nsf.im.NetworkAccessUpgrade

com.cisco.cpm.infrastructure.upgrade.api.UpgradeFailureException: com.cisco.cpm.nsf.api.exceptions.NSFEntityAttributeException: AccessService FIVEG DuplicateAttributeException~AttributeName : FIVEG already exists as FIVEG

        at com.cisco.cpm.acs.nsf.im.NetworkAccessUpgrade.upgradeAllowFiveG(NetworkAccessUpgrade.java:2671)

        at com.cisco.cpm.acs.nsf.im.NetworkAccessUpgrade.upgrade(NetworkAccessUpgrade.java:585)

        at com.cisco.cpm.infrastructure.upgrade.impl.UpgradeServiceRegistrar.UpgradeServices(UpgradeServiceRegistrar.java:132)

        at com.cisco.cpm.infrastructure.upgrade.impl.UpgradeServiceRegistrar.main(UpgradeServiceRegistrar.java:185)

Caused by: com.cisco.cpm.nsf.api.exceptions.NSFEntityAttributeException: AccessService FIVEG DuplicateAttributeException~AttributeName : FIVEG already exists as FIVEG

Remove the URT

Uninstall URT if the installation failed or if the installed version is outdated. Follow these steps to uninstall URT.

Before you begin

Make sure URT appears in the installed programs list.

Procedure

Step 1

Enter this command in the CLI:

application remove urt

Step 2

Enter Y when you are prompted with this message:

Continue with application removal? (y/n) 

This message is displayed when the uninstallation is complete:

Application successfully uninstalled

What to do next

After the unistallation is complete, you can install URT if needed.

Change the name of authorization simple condition if a predefined authorization compound condition with the same name exists

Cisco ISE comes with several predefined authorization compound conditions. If you have an authorization simple condition in your old deployment that shares a name with a predefined authorization compound condition, the upgrade process fails. Before upgrading, rename your authorization simple condition to avoid using a predefined compound condition name.

  • Compliance_Unknown_Devices

  • Non_Compliant_Devices

  • Compliant_Devices

  • Non_Cisco_Profiled_Phones

  • Switch_Local_Web_Authentication

  • Catalyst_Switch_Local_Web_Authentication

  • Wireless_Access

  • BYOD_is_Registered

  • EAP-MSCHAPv2

  • EAP-TLS

  • Guest_Flow

  • MAC_in_SAN

  • Network_Access_Authentication_Passed

Change VMware virtual machine Guest Operating System and settings

If you are upgrading Cisco ISE nodes on virtual machines, change the Guest Operating System to Red Hat Enterprise Linux (RHEL) 7. Power down the VM, change the Guest Operating System to RHEL 7, and then power on the VM.

RHEL 7 supports only E1000 and VMXNET3 network adapters. Change the network adapter type before you upgrade.

Remove non-ASCII characters from sponsor group names

If your sponsor groups include non-ASCII characters and were created before Cisco ISE Release 2.2, rename your sponsor groups to use only ASCII characters before you upgrade.

Cisco ISE does not support non-ASCII characters in sponsor group names.

Key firewall ports to enable for communication

If you have a firewall deployed between your Primary Administration Node (PAN) and any other node, you must open these ports before upgrading:

  • TCP 1521: For communication between the PAN and monitoring nodes.

  • TCP 443: For communication between the PAN and all other secondary nodes.

  • TCP 12001: For global cluster replication.

  • TCP 7800 and 7802: Required for Policy Service Node (PSN) group clustering when policy service nodes are part of a node group.

For a full list of ports that Cisco ISE uses, see the chapter "Cisco ISE Ports Reference" in the Cisco ISE Installation Guide.

Back up Cisco ISE configuration and operational data from the PAN

Obtain a backup of the Cisco ISE configuration and operational data from either the Command Line Interface (CLI) or the GUI. To back up the configuration and operational data using the CLI, enter this command:

backup backup-name repository repository-name {ise-config | ise-operational} encryption-key {hash | plain} encryption-keyname


Note


When Cisco ISE runs on VMware, VMware snapshots are not supported for backing up ISE data.

A VMware snapshot saves the status of a VM at a specific point in time. In a multi-node Cisco ISE deployment, all nodes continuously synchronize data with the current database. Restoring a snapshot might cause database replication and synchronization issues. Use the Cisco ISE backup functionality for data archival and restoration.

If you use VMware snapshots to back up Cisco ISE data, Cisco ISE services stop. To restore the ISE node, reboot it.


You can also obtain the configuration and operational data backup from the Cisco ISE Admin Portal. Ensure that you have created repositories that store the backup file. Do not use a local repository to back up data. You cannot back up the monitoring data in the local repository of a Remote Monitoring node. Do not use CD-ROM, HTTP, HTTPS, or TFTP repositories, because they are read-only or do not support file listing.

  1. Choose Administration > Maintenance > Backup and Restore.

  2. In the Cisco ISE GUI, click the Menu icon () and choose Administration > Maintenance > Backup and Restore.

  3. Click Backup Now.

  4. Enter the values as required to perform a backup.

  5. Click OK.

  6. Verify that the backup completed successfully.

    Wait for the backup to finish before changing or promoting node roles. Changing node roles during backup shuts down all processes and may cause data inconsistencies.

After backup, verify the backup file exists in the specified repository. Cisco ISE appends the backup filename with a timestamp, and adds a CFG tag for configuration backups and an OPS tag for operational backups.


Note


Cisco ISE allows you to obtain a backup from an ISE node (A) and restore it on another ISE node (B), both having the same hostnames (but different IP addresses). However, after you restore the backup on node B, do not change the hostname of node B because it might cause issues with certificates and portal group tags.


Back up system logs from the PAN

Obtain a backup of the system logs from the PAN using the Command Line Interface (CLI). Use this CLI command:

backup-logs backup-name repository repository-name encryption-key { hash | plain} encryption-key name

CA certificate chain

Before upgrading to Cisco ISE release 3.2, ensure that the internal CA certificate chain is valid.

  1. In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Certificates > Certificate Authority Certificates

  2. For each node in the deployment, select the certificate labeled Certificate Services Endpoint Sub CA in the Friendly Name column.

  3. Click View. Check if the Certificate Status is Good message is visible.

  4. If any certificate chain is broken, you must fix the issue before upgrading Cisco ISE. To view this window, click the Menu icon () and choose Administration > System > Certificates > Certificate Management > Certificate Signing Requests > ISE Root CA

Check certificate validity

If any certificate in the Cisco ISE Trusted Certificates or System Certificates store has expired, the upgrade fails. Ensure that you check the validity in the Expiration Date field of the Trusted Certificates and System Certificates windows (To view this window, click the Menu icon () and choose Administration > System > Certificates > Certificate Management), and renew them before you upgrade.

Check the validity in the Expiration Date field of the certificates in the CA Certificates window (To view this window, click the Menu icon () and choose Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates). Renew any expired certificates before you upgrade.

Delete a certificate

To delete an expired certificate, complete these steps:

Procedure


Step 1

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Certificates > Certificate Management > System Certificates.

Step 2

Identify and select the certificate that has expired.

Step 3

Click Delete to remove the selected certificate.

Step 4

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Certificates > Certificate Management > Trusted Certificates.

Step 5

Select the expired certificate.

Step 6

Click Delete.

Step 7

Choose Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates.

Step 8

Select the expired certificate.

Step 9

Click Delete.


Export certificates from all nodes

Export all local certificates and their private keys from every node in your deployment to a secure location. Record the configuration for each certificate, including the service with which it is used.

Procedure


Step 1

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Certificates > Certificate Management > System Certificates.

Step 2

Select the certificate and click Export.

Step 3

Select Export Certificates and Private Keys radio button.

Step 4

Enter the Private Key Password and Confirm Password.

Step 5

Click Export.


Export certificates from Trusted Certificates Store

We recommend that you export all certificates from the Trusted Certificates Store of the PAN. Record the certificate configuration (what service the certificate was used for).

Procedure


Step 1

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Certificates > Certificate Management > System Certificates.

Step 2

Select the certificate and click Export.

Step 3

Click Save File to export the certificate.

Step 4

In the Cisco ISE GUI, click the Menu icon () and choose Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates.

Step 5

Select the certificate and click Export.

Step 6

Select Export Certificates and Private Keys radio button.

Step 7

Enter the Private Key Password and Confirm Password.

Step 8

Click Export.

Step 9

Click Save File to export the certificate.


Disable automatic failover and scheduled backups for upgrade

You cannot perform deployment changes when running a backup in Cisco ISE. Disable automatic configurations to ensure your upgrade goes smoothly. You should disable these configurations before you upgrade Cisco ISE:

  • PAN Automatic Failover: Disable this option in the PAN before upgrading Cisco ISE.

  • Scheduled backups: Disable all backup schedules before upgrading. After the upgrade, reschedule and recreate the backup schedules.

    Backups scheduled to run once are triggered every time the Cisco ISE application restarts. If you have a backup schedule set to run only once, disable it before upgrading.

Configure NTP server and verify availability

During upgrade, the Cisco ISE nodes reboot, migrate, and replicate data from the PAN to the secondary administration node. For these operations, it is important that the NTP server in your network is configured correctly and is reachable. If the NTP server is not set up correctly or is unreachable, the upgrade process fails.

Ensure that the NTP servers in your network are reachable, responsive, and synchronized throughout the upgrade process.

Earlier versions of Cisco ISE use chrony instead of the Network Time Protocol daemon (ntpd). Ntpd synchronizes with servers having a root dispersion up to 10 seconds, whereas chrony synchronizes with servers having a root dispersion of less than 3 seconds. Therefore, we recommend that you use an NTP server with low root dispersion before upgrading to required Cisco ISE version to avoid NTP service disruption. For more information, see Troubleshoot ISE and NTP Server Synchronization Failures on Microsoft Windows.

Upgrade virtual machine

Cisco ISE software must synchronize with the chip and appliance capacity to support the latest CPU and memory resources available in UCS hardware. As ISE versions progress, support for older hardware is phased out, and newer hardware is introduced.

Upgrade your virtual machine (VM) capacity to improve performance. Use OVA files when planning VM upgrades to install the software efficiently.

Each OVA file is a package that describes the VM and reserves the hardware resources needed to install Cisco ISE software on your appliance.

For more information about the VM and hardware requirements, see the "Hardware and Virtual Appliance Requirements" in Cisco Identity Services Engine Installation Guide

Cisco ISE VMs need dedicated resources in the VM infrastructure. Cisco ISE needs adequate number of CPU cores, similar to a hardware appliance, for performance and scale. Resource sharing affects performance, resulting in high CPU usage, delays in user authentications and registrations, dropped logs, slow reporting, and reduced dashboard responsiveness. This directly affects the experiences of end users and admin users within your enterprise.


Note


Use reserved resources for CPU, memory, and hard disk space during upgrades instead of shared resources.

Cisco ISE Release 2.4 and later requires a minimum disk size of 300 GB for virtual machines because the local disk allocation increases to 29 GB.

Cisco ISE requires a minimum disk size of 300 GB for virtual machines because the local disk allocation increases to 29 GB.

Record profiler configuration

If you use the Profiler service, record the profiler configuration for each Policy Service node from the Admin portal. Follow these steps to find the profiler configuration information.
  1. To view this window, click the Menu icon () and choose Administration > System > Deployment.

  2. Select the node.

  3. On the Edit Node page, go to the Profiling Configuration tab.

  4. Note the configuration information or capture screenshots.

Obtain Active Directory and internal administrator account credentials

If you use Active Directory as your external identity source, make sure you have your Active Directory credentials and a valid internal administrator account ready. After the upgrade, your Active Directory connection might be lost. If that happens, use your Cisco ISE internal administrator account to log in to the Admin portal and use your Active Directory credentials to rejoin Cisco ISE to Active Directory.

Activate MDM vendor before upgrade

If you use the MDM feature, ensure that the MDM vendor status is active before upgrading.

If an MDM server name is used in an authorization policy and the corresponding MDM server is disabled, the upgrade process fails. As a workaround, you can do one of these:

  1. Enable the MDM server before upgrade.

  2. Delete the condition that uses the MDM server name attribute from the authorization policy.

Create repository and copy the upgrade bundle

Create a repository to obtain backups and copy the upgrade bundle. For information on how to create a repository, see “Create Repositories” in the chapter “Maintain and Monitor” in the Cisco ISE Administrator Guide.

Use FTP for faster performance and reliability. Choose a local repository near your nodes instead of one on a slow WAN link.

Ensure your Internet connection to the repository is stable and reliable.


Note


If downloading the upgrade bundle from the repository to the node takes more than 35 minutes, the process times out. Poor Internet bandwidth causes this issue.

Place the upgrade bundle on the local disk to save time during the upgrade process. You can also use the application upgrade prepare <upgrade bundle name> <repository name> command to copy and extract the upgrade bundle on the local disk.


Note


  • Ensure your connection to the repository is fast and stable. If the upgrade bundle (about 9GB) takes more than 35 minutes to download to the node, the process will time out.

  • If you store configuration files on a local disk, these files are deleted during the upgrade. Create a Cisco ISE repository and copy them to the repository to keep your files.


Download the upgrade bundle from Cisco.com.

To upgrade to Cisco ISE release 3.2, use this upgrade bundle: ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz

To perform the upgrade, copy the upgrade bundle to the Cisco ISE node local disk using this command:

copy repository_url/path/ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz disk:/

For example, if you want to use SFTP to copy the upgrade bundle, you can do this:

  1. (Add the host key if it does not exist) crypto host_key add host mySftpserver

  2. copy sftp://aaa.bbb.ccc.ddd/ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz disk:/

    aaa.bbb.ccc.ddd is the IP address or hostname of the SFTP server and ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz is the name of the upgrade bundle.

Check the available disk space

Ensure that you allocate the required disk space for virtual machines. For more information, see Cisco ISE Installation Guide. If you need to increase the disk size, reinstall Cisco ISE and restore a configuration backup.

Check load balancer configuration

If you use a load balancer between the PAN and the Policy Service node (PSN), set the session timeout on the load balancer high enough so it does not disrupt the upgrade process. A session timeout that is too short can interrupt the upgrade on PSNs. For instance, if a session ends during a database transfer from the PAN to a PSN, the upgrade on the PSN fails.

Log retention and resizing MnT hard disk

Upgrading does not require changes to the MnT disk capacity. If your logs consistently reach capacity and you need additional hardware resources, plan the MnT hard disk size based on your log retention needs. Log retention capacity has increased significantly since Cisco ISE release 3.1.

You can activate collection filters (To view this window, click the Menu icon () and choose Administration > System > Logging > Collection filters) to filter unnecessary logs from different devices. Unnecessary logs can overwhelm your Cisco ISE MnT.

For more information on collection filter, see "Configure Collection Filters section" in the "Maintain & Monitor" Chapter in Cisco Identity Services Engine Administrator Guide

Refer to the ISE storage requirements on the Cisco ISE Performance and Scalability community page. The table provides log retention information that is based on the number of endpoints for RADIUS and the number of network devices for TACACS+. Calculate log retention separately for TACACS+ and RADIUS.