Cisco ISE upgrade overview
![]() Note |
Cisco ISE Release 3.5 and the corresponding guides are available in a phased rollout. Until the software becomes generally available, contact your Cisco account manager to request this release. Upon completion of the phased rollout, Cisco ISE Release 3.5 and the corresponding guides will be made generally available to all customers. |
From Cisco Identity Services Engine (Cisco ISE) Release 3.1, all pxGrid connections must be based on pxGrid 2.0. pxGrid 1.0-based (XMPP-based) integrations will cease to work on Cisco ISE from Release 3.1 onwards.
pxGrid Version 2.0, which is based on WebSockets, was introduced in Cisco ISE Release 2.4. We recommend that you plan and upgrade your other systems to pxGrid 2.0-compliant versions in order to prevent potential disruptions, if any, to integrations.
This document describes how to upgrade your Cisco ISE software on Cisco ISE appliances and virtual machines (VMs) to Release 3.5. (See the section "What is new in Cisco ISE Release 3.5" in the Release Notes for Cisco Identity Services Engine, Release 3.5.)
Upgrading a Cisco ISE deployment involves multiple steps and must be carried out in the specified order in this document. Use the time estimates in this document to plan an upgrade with minimum downtime. For a deployment with multiple Policy Service Nodes (PSNs) that are a part of a PSN group, there is no downtime. If endpoints are not authenticated through a PSN undergoing upgrade, the request is processed by another PSN in the node group. The endpoint is reauthenticated and granted network access after the authentication is successful.
![]() Caution |
If you have a standalone deployment or a deployment with a single PSN, you might experience a downtime for all the authentications when the PSN is being upgraded. |
![]() Note |
When upgrading to Cisco ISE Release 3.2 and later, Root CA regeneration happens automatically in the upgrade process. Thus, post-upgrade Root CA regeneration is not required. |
Different types of deployment
Cisco ISE deployment options include two main types:
-
Standalone Node: A single Cisco ISE node takes on the roles of Administration, Policy Service, and Monitoring.
-
Multi-Node Deployment: Multiple Cisco ISE nodes are involved in a distributed deployment, with each node designated for specific tasks.
Differences in native cloud deployments of Cisco ISE
Cisco ISE instances deployed natively on cloud platforms do not support the upgrade workflow. Only new installations are supported. You can back up and restore configuration data. Cloud platforms that allow native deployment of Cisco ISE include:
-
Amazon Web Services (AWS)
-
Microsoft Azure Cloud
-
Oracle Cloud Infrastructure (OCI)
To upgrade the Cisco ISE release versions on AWS, from 3.4 to Release 3.5:
-
Back up the configuration data from the Cisco ISE release 3.4 AWS instance.
-
Reconfigure the AWS instance with Cisco ISE Release 3.5.
-
Restore configuration data on the newly created Cisco ISE Release 3.5 instance.
Regenerate the root CA chain
If any of these events occur, you must regenerate the root CA chain:
-
Change the domain name or hostname of your PAN or PSN.
-
Restore a backup on a new deployment.
-
Promote the old primary PAN to a new primary PAN after an upgrade.
To regenerate the root CA chain
-
In the Cisco ISE GUI, click the Menu icon (
) and choose Choose .
-
Click Generate Certificate Signing Request (CSR).
-
From the Certificate(s) will be used for drop-down list, choose ISE Root CA.
-
Click Replace ISE root CA Certificate Chain.