Prepare for upgrade
Before you start the upgrade process, ensure you complete these tasks:
Health check
Ensure you run a health check on your Cisco ISE deployment before upgrading to identify and resolve critical issues that may cause downtime. For more information, see "Health Check" in the “ Troubleshooting” chapter in the Cisco ISE Administrator Guide.
Guidelines to minimize upgrade time and maximize efficiency during upgrade
These guidelines help you address issues in your current deployment during the upgrade process, which reduces overall downtime.
-
Upgrade to the latest patch in the existing version before starting the upgrade.
Note
If you are upgrading from Cisco ISE release 2.6 patch 10 and later or 2.7 Patch 4 and laterrelease and have an SSM On-Prem server configured, you must disconnect the SSM On-Prem server before you begin the upgrade process.
If you are upgrading from earlier releases and have an SSM On-Prem server configured, you must disconnect the SSM On-Prem server before you begin the upgrade process.
-
We recommend that you test the upgrade in a staging environment to identify and address any issues without impacting the live system.
-
All the nodes in the Cisco ISE deployment should be in the same patch level in order to exchange data.
Note
If all the nodes in your deployment are not on the same Cisco ISE version and patch version, you will get a warning message: Upgrade cannot begin . This message indicates that the upgrade is in a blocked state. Ensure that all nodes are in the same version (including any patch versions) before you begin the upgrade.
-
Based on the number of PSNs in your deployment and availability of personnel, you can install the final version of Cisco ISE you need to upgrade to, apply latest patch, and keep it ready.
-
In case you want to retain the MnT logs, complete the tasks for MnT nodes and join them to the new deployment as MnT nodes. However, if you do not need to retain the operational logs, you can skip the step by re-imaging the MnT nodes.
-
Cisco ISE installation can be done in parallel if you have multi-node deployment without impact to the production deployment. Installing ISE servers in parallel saves time especially when you are using backup and restore from a previous release.
-
PSN can be added to the new deployment to download the existing policies during the registration process from the PAN. Use ISE latency and bandwidth calculator to understand the latency and bandwidth requirement in Cisco ISE deployment.
-
It is a best practice to archive the old logs and not transit them to the new deployments. This is because operational logs restored in the MnTs are not synchronized to different nodes in case you change the MnT roles later.
-
If you have two data centers with full distributed deployment, first upgrade the backup data center. Then test the use cases before upgrading the primary data center.
-
-
Download and store the upgrade software in a local repository before upgrade to speed up the process.
-
If you are currently upgrading to Cisco ISE, release 3.0 or later, you can either use Health Check or Upgrade Readiness Tool (URT) to run system diagnosis before you initiate the upgrade process.
-
If you are currently upgrading to a recent Cisco ISE release, you can either use Health Check or Upgrade Readiness Tool (URT) to run system diagnosis before you initiate the upgrade process.
-
Use the Upgrade Readiness Tool (URT) to detect and fix any configuration data upgrade issues before you start the upgrade process. Most upgrade failures occur due to configuration data issues during the upgrade. The URT validates the data to identify issues before the upgrade and fixes or reports them whenever possible. The URT is available as a separate downloadable bundle that can be run on a Secondary Policy Administration node or standalone node. There is no downtime to run this tool. This video explains how to use the URT: https://video.cisco.com/detail/video/5797832452001.
Warning
Do not run the URT on the Primary Policy Administration Node. The URT tool does not simulate MnT operational data upgrades.
-
Note that when upgrading Cisco ISE using the GUI, the timeout for the process per node is four hours. If the process takes longer, you must restart it. If upgrading with the Upgrade Readiness Tool (URT) will take you more than four hours, Cisco recommends that you use CLI for this process.
-
Back up the load balancers before changing the configuration. You can remove the PSNs from the load balancers during the upgrade window and add them back after the upgrade.
-
Disable automatic PAN Failover (if configured) and disable Heartbeat between PANs during the upgrade.
-
Review the existing policies and eliminate any outdated or redundant rules.
-
Remove unwanted monitoring logs and endpoint data.
-
You can take a backup of configuration and operations logs and restore it on a temporary server that is not connected to the network. You can use a remote logging target during the upgrade window.
You can use these options after the upgrade to reduce the number of logs that are sent to MnT nodes and improve the performance:
-
Use the MnT collection filters (To view this window, click the Menu icon (
) and choose ) to filter incoming logs and avoid duplication of entries in AAA logs.
-
You can create Remote Logging Targets (To view this window, click the Menu icon (
) and choose ) and route each individual logging category to specific Logging Target (To view this window, click the Menu icon (
) and choose .
-
Enable the Ignore Repeated Updates options. To view this window, click the Menu icon (
) and choose Administration > System > Settings > Protocols > RADIUS window to avoid repeated accounting updates.
-
-
Download and use the latest upgrade bundle for upgrade. Use this query in the Bug Search Tool to find the upgrade related defects that are open and fixed: http://cs.co/ise-upgrade-bugsearch
-
Test all the use cases for the new deployment with fewer users to ensure service continuity.
Validate data to prevent upgrade failures
Cisco ISE offers an Upgrade Readiness Tool (URT) that you can run to detect and fix any data upgrade issues before you start the upgrade process.
Most upgrade failures happen due to data upgrade issues. Use the URT to validate your data before an upgrade, identify and report issues, and fix issues when possible.
The URT is available as a separate downloadable bundle. Run the URT on a Secondary Administration Node for high availability and other deployments with multiple nodes, or on the Standalone Node for a single-node deployment.
![]() Warning |
In multiple-node deployments, do not run the URT on the Primary Policy Administration Node. |
You can run the URT from the Command-Line Interface (CLI) of the Cisco ISE node. The URT:
-
Checks whether the URT is run on a supported version of Cisco ISE. The supported versions are Release 2.7, 3.0 and 3.1.
-
Verifies that the URT is run on either a standalone Cisco ISE node or a Secondary Policy Administration Node (secondary PAN).
-
Checks if the URT bundle is less than 45 days old. This check ensures that you use the most recent URT bundle.
-
Checks whether all these prerequisites are met.
-
Version compatibility
-
Persona checks
-
Disk space
Note
Verify the available disk size with Disk Requirement Size. If you need to increase the disk size, reinstall Cisco ISE and restore a configuration backup.
-
NTP server
-
Memory
-
System and trusted certificate validation
-
-
Clones the configuration database
-
Copies the latest upgrade files to the upgrade bundle
Note
If there are no patches in the URT bundle, the output will return
N/A
. This is expected behavior during the installation of a hot patch.
-
Performs a schema and data upgrade on the cloned database
-
If the upgrade on the cloned database is successful, the tool provides an estimate of the time required for the upgrade to complete.
-
If the upgrade is successful, the tool removes the cloned database.
-
If the upgrade on the cloned database fails, the tool collects the required logs, prompts for an encryption password, generates a log bundle, and stores the bundle on the local disk.
-
Download and run the Upgrade Readiness Tool
The URT checks the configuration data before the upgrade to identify issues that could cause an upgrade failure.
Before you begin
While running the URT, do not simultaneously :
-
Back up or restore data
-
Make any persona changes
Procedure
Step 1 |
|
Step 2 |
Create a repository and copy the URT bundle
Create a repository, then copy the URT bundle. For more information about creating a repository, see “Create Repositories” in the Chapter “Maintain and Monitor” in the Cisco ISE Administrator Guide.
To improve performance and reliability, use File Transfer Protocol (FTP). Avoid using repositories located across slow WAN links. Choose a local repository near your nodes.
Before you begin
Make sure your connection to the repository has enough bandwidth.
Procedure
Step 1 |
Download the URT bundle from the Cisco ISE Download Software Center (ise-urtbundle-3.2.xxx-1.0.0.SPA.x86_64.tar.gz). |
Step 2 |
Optionally, to save time, copy the URT bundle to the local-disk on the Cisco ISE node using the command:
To copy the upgrade bundle using SFTP, perform these steps:
The value "aaa.bbb.ccc.ddd" represents the IP address or hostname of the SFTP server; "ise-urtbundle-3.2.xxx-1.0.0.SPA.x86_64.tar.gz" is the name of the URT bundle. |
Run the URT
The URT identifies data issues that might cause an upgrade failure. It reports or fixes these issues where possible. To run the URT:
Before you begin
Storing the URT bundle on the local disk allows the installation process to complete more quickly.
Procedure
Enter the application install command to install the URT.
Before upgrading to Cisco ISE release 3.2, you must remove the 5G attribute. For more information, see the "Configure Cisco Private 5G as a Service" section in the "Secure Access" chapter in the Cisco ISE Administrator Guide.
|
Remove the URT
Uninstall URT if the installation failed or if the installed version is outdated. Follow these steps to uninstall URT.
Before you begin
Make sure URT appears in the installed programs list.
Procedure
Step 1 |
Enter this command in the CLI:
|
Step 2 |
Enter Y when you are prompted with this message:
This message is displayed when the uninstallation is complete:
|
What to do next
After the unistallation is complete, you can install URT if needed.
Change the name of authorization simple condition if a predefined authorization compound condition with the same name exists
Cisco ISE comes with several predefined authorization compound conditions. If you have an authorization simple condition in your old deployment that shares a name with a predefined authorization compound condition, the upgrade process fails. Before upgrading, rename your authorization simple condition to avoid using a predefined compound condition name.
-
Compliance_Unknown_Devices
-
Non_Compliant_Devices
-
Compliant_Devices
-
Non_Cisco_Profiled_Phones
-
Switch_Local_Web_Authentication
-
Catalyst_Switch_Local_Web_Authentication
-
Wireless_Access
-
BYOD_is_Registered
-
EAP-MSCHAPv2
-
EAP-TLS
-
Guest_Flow
-
MAC_in_SAN
-
Network_Access_Authentication_Passed
Change VMware virtual machine Guest Operating System and settings
If you are upgrading Cisco ISE nodes on virtual machines, change the Guest Operating System to Red Hat Enterprise Linux (RHEL) 7. Power down the VM, change the Guest Operating System to RHEL 7, and then power on the VM.
RHEL 7 supports only E1000 and VMXNET3 network adapters. Change the network adapter type before you upgrade.
Remove non-ASCII characters from sponsor group names
If your sponsor groups include non-ASCII characters and were created before Cisco ISE Release 2.2, rename your sponsor groups to use only ASCII characters before you upgrade.
Cisco ISE does not support non-ASCII characters in sponsor group names.
Key firewall ports to enable for communication
If you have a firewall deployed between your Primary Administration Node (PAN) and any other node, you must open these ports before upgrading:
-
TCP 1521: For communication between the PAN and monitoring nodes.
-
TCP 443: For communication between the PAN and all other secondary nodes.
-
TCP 12001: For global cluster replication.
-
TCP 7800 and 7802: Required for Policy Service Node (PSN) group clustering when policy service nodes are part of a node group.
For a full list of ports that Cisco ISE uses, see the chapter "Cisco ISE Ports Reference" in the Cisco ISE Installation Guide.
Back up Cisco ISE configuration and operational data from the PAN
Obtain a backup of the Cisco ISE configuration and operational data from either the Command Line Interface (CLI) or the GUI. To back up the configuration and operational data using the CLI, enter this command:
backup backup-name repository repository-name {ise-config | ise-operational} encryption-key {hash | plain} encryption-keyname
![]() Note |
When Cisco ISE runs on VMware, VMware snapshots are not supported for backing up ISE data. A VMware snapshot saves the status of a VM at a specific point in time. In a multi-node Cisco ISE deployment, all nodes continuously synchronize data with the current database. Restoring a snapshot might cause database replication and synchronization issues. Use the Cisco ISE backup functionality for data archival and restoration. If you use VMware snapshots to back up Cisco ISE data, Cisco ISE services stop. To restore the ISE node, reboot it. |
You can also obtain the configuration and operational data backup from the Cisco ISE Admin Portal. Ensure that you have created repositories that store the backup file. Do not use a local repository to back up data. You cannot back up the monitoring data in the local repository of a Remote Monitoring node. Do not use CD-ROM, HTTP, HTTPS, or TFTP repositories, because they are read-only or do not support file listing.
-
Choose Administration > Maintenance > Backup and Restore.
-
In the Cisco ISE GUI, click the Menu icon (
) and choose .
-
Click Backup Now.
-
Enter the values as required to perform a backup.
-
Click OK.
-
Verify that the backup completed successfully.
Wait for the backup to finish before changing or promoting node roles. Changing node roles during backup shuts down all processes and may cause data inconsistencies.
After backup, verify the backup file exists in the specified repository. Cisco ISE appends the backup filename with a timestamp, and adds a CFG tag for configuration backups and an OPS tag for operational backups.
![]() Note |
Cisco ISE allows you to obtain a backup from an ISE node (A) and restore it on another ISE node (B), both having the same hostnames (but different IP addresses). However, after you restore the backup on node B, do not change the hostname of node B because it might cause issues with certificates and portal group tags. |
Back up system logs from the PAN
Obtain a backup of the system logs from the PAN using the Command Line Interface (CLI). Use this CLI command:
backup-logs backup-name repository repository-name encryption-key { hash | plain} encryption-key name
CA certificate chain
Before upgrading to Cisco ISE release 3.2, ensure that the internal CA certificate chain is valid.
-
In the Cisco ISE GUI, click the Menu icon (
) and choose
-
For each node in the deployment, select the certificate labeled
Certificate Services Endpoint Sub CA
in the Friendly Name column. -
Click View. Check if the
Certificate Status is Good
message is visible. -
If any certificate chain is broken, you must fix the issue before upgrading Cisco ISE. To view this window, click the Menu icon (
) and choose
Check certificate validity
If any certificate in the Cisco ISE Trusted Certificates or System Certificates store has expired, the upgrade fails. Ensure that you check the validity in the
Expiration Date field of the Trusted Certificates and System Certificates windows (To view this window, click the Menu icon () and choose
Administration > System > Certificates > Certificate Management), and renew them before you upgrade.
Check the validity in the Expiration Date field of the certificates in the CA Certificates window (To view this window, click the Menu icon () and choose
Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates). Renew any expired certificates before you upgrade.
Delete a certificate
To delete an expired certificate, complete these steps:
Procedure
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 |
Identify and select the certificate that has expired. |
Step 3 |
Click Delete to remove the selected certificate. |
Step 4 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 5 |
Select the expired certificate. |
Step 6 |
Click Delete. |
Step 7 |
Choose Administration > System > Certificates > Certificate Authority > Certificate Authority Certificates. |
Step 8 |
Select the expired certificate. |
Step 9 |
Click Delete. |
Export certificates from all nodes
Export all local certificates and their private keys from every node in your deployment to a secure location. Record the configuration for each certificate, including the service with which it is used.
Procedure
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 |
Select the certificate and click Export. |
Step 3 |
Select Export Certificates and Private Keys radio button. |
Step 4 |
Enter the Private Key Password and Confirm Password. |
Step 5 |
Click Export. |
Export certificates from Trusted Certificates Store
We recommend that you export all certificates from the Trusted Certificates Store of the PAN. Record the certificate configuration (what service the certificate was used for).
Procedure
Step 1 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 2 |
Select the certificate and click Export. |
Step 3 |
Click Save File to export the certificate. |
Step 4 |
In the Cisco ISE GUI, click the Menu icon ( |
Step 5 |
Select the certificate and click Export. |
Step 6 |
Select Export Certificates and Private Keys radio button. |
Step 7 |
Enter the Private Key Password and Confirm Password. |
Step 8 |
Click Export. |
Step 9 |
Click Save File to export the certificate. |
Disable automatic failover and scheduled backups for upgrade
You cannot perform deployment changes when running a backup in Cisco ISE. Disable automatic configurations to ensure your upgrade goes smoothly. You should disable these configurations before you upgrade Cisco ISE:
-
PAN Automatic Failover: Disable this option in the PAN before upgrading Cisco ISE.
-
Scheduled backups: Disable all backup schedules before upgrading. After the upgrade, reschedule and recreate the backup schedules.
Backups scheduled to run once are triggered every time the Cisco ISE application restarts. If you have a backup schedule set to run only once, disable it before upgrading.
Configure NTP server and verify availability
During upgrade, the Cisco ISE nodes reboot, migrate, and replicate data from the PAN to the secondary administration node. For these operations, it is important that the NTP server in your network is configured correctly and is reachable. If the NTP server is not set up correctly or is unreachable, the upgrade process fails.
Ensure that the NTP servers in your network are reachable, responsive, and synchronized throughout the upgrade process.
Earlier versions of Cisco ISE use chrony instead of the Network Time Protocol daemon (ntpd). Ntpd synchronizes with servers having a root dispersion up to 10 seconds, whereas chrony synchronizes with servers having a root dispersion of less than 3 seconds. Therefore, we recommend that you use an NTP server with low root dispersion before upgrading to required Cisco ISE version to avoid NTP service disruption. For more information, see Troubleshoot ISE and NTP Server Synchronization Failures on Microsoft Windows.
Upgrade virtual machine
Cisco ISE software must synchronize with the chip and appliance capacity to support the latest CPU and memory resources available in UCS hardware. As ISE versions progress, support for older hardware is phased out, and newer hardware is introduced.
Upgrade your virtual machine (VM) capacity to improve performance. Use OVA files when planning VM upgrades to install the software efficiently.
Each OVA file is a package that describes the VM and reserves the hardware resources needed to install Cisco ISE software on your appliance.
For more information about the VM and hardware requirements, see the "Hardware and Virtual Appliance Requirements" in Cisco Identity Services Engine Installation Guide
Cisco ISE VMs need dedicated resources in the VM infrastructure. Cisco ISE needs adequate number of CPU cores, similar to a hardware appliance, for performance and scale. Resource sharing affects performance, resulting in high CPU usage, delays in user authentications and registrations, dropped logs, slow reporting, and reduced dashboard responsiveness. This directly affects the experiences of end users and admin users within your enterprise.
![]() Note |
Use reserved resources for CPU, memory, and hard disk space during upgrades instead of shared resources. |
Cisco ISE Release 2.4 and later requires a minimum disk size of 300 GB for virtual machines because the local disk allocation increases to 29 GB.
Cisco ISE requires a minimum disk size of 300 GB for virtual machines because the local disk allocation increases to 29 GB.
Record profiler configuration
-
To view this window, click the Menu icon (
) and choose Administration > System > Deployment.
-
Select the node.
-
On the Edit Node page, go to the Profiling Configuration tab.
-
Note the configuration information or capture screenshots.
Obtain Active Directory and internal administrator account credentials
If you use Active Directory as your external identity source, make sure you have your Active Directory credentials and a valid internal administrator account ready. After the upgrade, your Active Directory connection might be lost. If that happens, use your Cisco ISE internal administrator account to log in to the Admin portal and use your Active Directory credentials to rejoin Cisco ISE to Active Directory.
Activate MDM vendor before upgrade
If you use the MDM feature, ensure that the MDM vendor status is active before upgrading.
If an MDM server name is used in an authorization policy and the corresponding MDM server is disabled, the upgrade process fails. As a workaround, you can do one of these:
-
Enable the MDM server before upgrade.
-
Delete the condition that uses the MDM server name attribute from the authorization policy.
Create repository and copy the upgrade bundle
Create a repository to obtain backups and copy the upgrade bundle. For information on how to create a repository, see “Create Repositories” in the chapter “Maintain and Monitor” in the Cisco ISE Administrator Guide.
Use FTP for faster performance and reliability. Choose a local repository near your nodes instead of one on a slow WAN link.
Ensure your Internet connection to the repository is stable and reliable.
![]() Note |
If downloading the upgrade bundle from the repository to the node takes more than 35 minutes, the process times out. Poor Internet bandwidth causes this issue. |
Place the upgrade bundle on the local disk to save time during the upgrade process. You can also use the application upgrade prepare <upgrade bundle name> <repository name> command to copy and extract the upgrade bundle on the local disk.
![]() Note |
|
Download the upgrade bundle from Cisco.com.
To upgrade to Cisco ISE release 3.2, use this upgrade bundle: ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz
To perform the upgrade, copy the upgrade bundle to the Cisco ISE node local disk using this command:
copy repository_url/path/ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz disk:/
For example, if you want to use SFTP to copy the upgrade bundle, you can do this:
-
(Add the host key if it does not exist) crypto host_key add host mySftpserver
-
copy sftp://aaa.bbb.ccc.ddd/ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz disk:/
aaa.bbb.ccc.ddd is the IP address or hostname of the SFTP server and ise-upgradebundle-2.x-to-3.2.0.xxx.SPA.x86_64.tar.gz is the name of the upgrade bundle.
Check the available disk space
Ensure that you allocate the required disk space for virtual machines. For more information, see Cisco ISE Installation Guide. If you need to increase the disk size, reinstall Cisco ISE and restore a configuration backup.
Check load balancer configuration
If you use a load balancer between the PAN and the Policy Service node (PSN), set the session timeout on the load balancer high enough so it does not disrupt the upgrade process. A session timeout that is too short can interrupt the upgrade on PSNs. For instance, if a session ends during a database transfer from the PAN to a PSN, the upgrade on the PSN fails.
Log retention and resizing MnT hard disk
Upgrading does not require changes to the MnT disk capacity. If your logs consistently reach capacity and you need additional hardware resources, plan the MnT hard disk size based on your log retention needs. Log retention capacity has increased significantly since Cisco ISE release 3.1.
You can activate collection filters (To view this window, click the Menu icon () and choose
) to filter unnecessary logs from different devices. Unnecessary logs can overwhelm your Cisco ISE MnT.
For more information on collection filter, see "Configure Collection Filters section" in the "Maintain & Monitor" Chapter in Cisco Identity Services Engine Administrator Guide
Refer to the ISE storage requirements on the Cisco ISE Performance and Scalability community page. The table provides log retention information that is based on the number of endpoints for RADIUS and the number of network devices for TACACS+. Calculate log retention separately for TACACS+ and RADIUS.