Performance and Scalability Guide For Cisco Identity Services Engine
Performance and Scalability Guide For Cisco Identity Services Engine
Overview 2
Change History 2
Cisco ISE Node Terminology 2
Different Types of Cisco ISE Deployment 3
Sizing Guidelines for ISE Deployment 5
Considerations for Choosing a Deployment 6
RADIUS Authentication Rates 7
Overview
This document lists the sizing guidelines for Cisco Identity Services Engine (Cisco ISE).
Change History
The following table lists changes to this document since its initial release.
Policy Administration node (PAN) A Cisco ISE node with the Administration persona allows you to perform all
administrative operations and configurations on Cisco ISE. It serves as a single pane
of glass for viewing all administrative operations, configurations, and contextual data.
It synchronizes the configuration to the rest of the nodes in the deployment.
Policy Service node (PSN) A Cisco ISE node with the Policy Service persona provides network access, posture,
guest access, client provisioning, and profiling services. This persona evaluates the
policies and makes all the decisions.
Monitoring node (MnT) A Cisco ISE node with the Monitoring persona functions as the log collector and stores
log messages from all the Administration and Policy Service nodes in a network. This
persona provides advanced monitoring and troubleshooting tools that you can use to
effectively manage the network and resources. A node with this persona aggregates
and correlates the data that it collects, and provides you with meaningful reports.
2
Node Type Description
pxGrid node You can use Cisco pxGrid to share context-sensitive information from Cisco ISE session
directory with other network systems such as Cisco ISE ecosystem partner systems
and other Cisco platforms. The pxGrid framework can also be used to exchange policy
and configuration data between nodes (like sharing tags and policy objects between
Cisco ISE and third party vendors) and for other information exchanges.
3
Table 2: Types of Cisco ISE Deployments
4
Sizing Guidelines for ISE Deployment
You can choose the right ISE deployment based on the maximum scale numbers for active endpoints offered by specific deployment
type, maximum scale numbers for active endpoints supported by individual PSN nodes and other relevant factors that are described
in the below sections.
Every endpoint with unique MAC address is considered as one active session and the concurrent active sessions support is applicable
for all types of sessions including Dot1x, Mab, Guest, BYOD, and Posture.
The maximum number of active sessions in the below table are derived based on tests under following conditions:
ISE deployments are formed in single datacenter deployed in same region, low latency (less than 5 ms) between the ISE internode
communications, dot1xauthentications and accounting events generated by endpoints in the range of 2 to 4 repetitions per day, and
majority of the sessions are RADIUS protocols authenticating with local ID providers.
Table 3: Maximum Concurrent Active Sessions for Deployments with Different ISE Appliances Acting as PAN, MnT, PAN/MnT
Deployment Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
3595 3615 3715 3655 3755 3695 3795
Large 500,000 Unsupported Unsupported 500,000 750,000 2,000,000 2,000,000
Medium 20,000 12,500 75,000 25,000 150,000 50,000 150,000
Small 20,000 12,500 25,000 25,000 50,000 50,000 50,000
Note • Cisco SNS 3595 is supported only for Cisco ISE 3.2 and earlier releases.
• Small deployments with 32 GB memory instances (Cisco SNS 3615 or Cisco SNS 3715) or Medium deployments with
32 GB memory instances (Cisco SNS 3615 or Cisco SNS 3715) acting as PAN/MnT are highly recommended for either
RADIUS only or TACACS+ only workloads. If a deployment requires both RADIUS and TACACS+ at scaled workloads,
it is recommended to use Cisco ISE nodes with higher resources such as Cisco SNS 3655 or higher models. Advanced
features like Log Analytics, AI/ML Profiling, Cisco ACI Integration, Workload Connectors, and so on require higher
resources. Therefore, it is recommended that you enable these features only on Cisco SNS 3655, 3755, 3695, and 3795
for optimal performance.
Table 4: Maximum Concurrent Active Sessions for Different ISE Appliances Acting as PSNs
PSN Type Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
3595 3615 3715 3655 3755 3695 3795*
Dedicated PSN 40,000 25,000 50,000 50,000 100,000 100,000 100,000
(Cisco ISE
node has only
PSN persona)
5
PSN Type Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
3595 3615 3715 3655 3755 3695 3795*
Shared PSN 20,000 12,500 25,000 25,000 50,000 50,000 50,000
(Cisco ISE
node has
multiple
personas)
*Cisco SNS 3795 is equipped with more RAM and better Disk Read/Write performance. It is best suited for dedicated PAN, dedicated
MnT, or PAN/MnT personas and provides no added value when deployed as a dedicated PSN.
Note • SNS 3595 is supported in Cisco ISE Release 3.2 and earlier versions.
• SNS 3515 is supported in Cisco ISE Release 3.0 and previous versions. The number of maximum concurrent active
endpoints supported by a dedicated PSN is 7,500 and a shared PSN is 5,000.
6
• PSN node variations include TACACS+ PSN (T+PSN), TC-NAC PSN (TCNPSN), Guest PSN (GPSN), Cisco TrustSec PSN
(CTSPSN), Security Group eXchange Protocol PSN (SXPSN), and PassiveID PSN (PIDPSN). For better performance, it is
recommended to reserve TACACS+, RADIUS, Guest/BYOD workloads to dedicated PSN groups within a deployment.
• It is recommended to assign separate Cisco TrustSec PSNs (CTSPSNs) to handle TrustSec functions for TrustSec deployments
to avoid overloading of RADIUS PSNs while pushing policies.
• For large scale NAC environments with huge number of Device Administration tasks (for example, heavy usage of scripts or
Network management Systems), we recommend that you split the deployments and use a separate deployment for Device
Administration (TACACS+).
Table 5: RADIUS Transactions per Second (TPS) for a Dedicated PSN Node
Authentication Method Cisco SNS 3615/3715 Cisco SNS 3595 Cisco SNS
3655/3755/3695/3795
PAP with internal user database 900 1100 1300
PAP with Active Directory 250 250 300
PAP with LDAP Directory 300 300 350
PEAP (MSCHAPv2) with internal user 150 150 200
database
PEAP (MSCHAPv2) with Active 150 150 175
Directory
PEAP (GTC) with internal user 150 150 250
database
PEAP (GTC) with Active Directory 100 150 175
EAP-FAST (MSCHAPv2) with 350 400 500
internal user database
EAP-FAST (MSCHAPv2) with Active 200 250 300
Directory
EAP-FAST (GTC) with internal user 350 400 450
database
EAP-FAST (GTC) with Active 200 200 300
Directory
EAP-FAST (GTC) with LDAP 200 300 300
Directory
EAP-TLS with internal user database 150 150 200
EAP-TLS with Active Directory 150 150 200
7
Authentication Method Cisco SNS 3615/3715 Cisco SNS 3595 Cisco SNS
3655/3755/3695/3795
EAP-TLS with LDAP Directory 150 200 200
EAP TEAP with internal user database 100 100 200
MAB with internal user database 500 900 1000
MAB with LDAP Directory 400 500 600
EAP-TTLS PAP with Microsoft Entra 30 30 50
ID
EAP-TLS with Microsoft Entra ID 40 40 50
Note • EAP-TLS authentication rates for Microsoft Entra ID are applicable for Cisco ISE Release 3.2 Patch 3 and above and
Cisco ISE Release 3.3 and above releases.
• EAP-TTLS PAP authentication rates for Microsoft Entra ID are applicable for Cisco ISE Release 3.3 and above releases.
• When DTLS is enabled, RADIUS transactions per second (TPS) might show around 15% reduction in the authentication
rates compared to the values shown in RADIUS Authentication Rates .
Table 6: TACACS+ Transactions per Second (TPS) for a Dedicated PSN Node
8
The authentication values provided below may have + or - 5 percent deviation in production environment.
Scenario Cisco SNS 3615/3715 Cisco SNS 3595 Cisco SNS 3655/3
Posture authentication 50 50
Guest Hotspot authentication 75 100
Guest Sponsored authentication 50 75
BYOD Onboarding single SSID 10 10
BYOD Onboarding dual SSID 10 15
MDM 150 200
Internal CA certificate issuance 50 50
New endpoints profiled per second/profile 200 250
updates per second
Maximum PassiveID sessions processed per 1000 1000
second
Sessions published per second to pxGrid 300 400
subscribers
Note Cisco ISE integration with Duo MFA for RADIUS and TACACS+ flows is applicable from Cisco ISE 3.3 Patch 1 onwards.
The authentication rates are applicable to deployments, where the latency between Cisco ISE and Duo is 4 or 5 seconds.
9
Scenario Cisco SNS 3615/3715 Cisco SNS 3595 Cisco SNS
3655/3755/3695/3795
Time taken for pxGrid ANC APIs to 120 120 120
quarantine or unquarantine 10,000
endpoints (with 100 requests per
second)
Attribute M a x i m u m
Limit
Maxm i um 4
pxGrid
nodes
in
Large
or
Dedicated
deployment
Maxmi um Cisco SNS
pxGrid 3695/3795 as
subscribers dedicated/shared
per pxGrid node:
pxGrid 200
node
Cisco SNS
3655/3755 as
dedicated/shared
pxGrid node: 50
Cisco SNS
3715/3615 as
dedicated/shared
pxGrid node: 5
Dedicated 8 nodes, or 4
PSN pairs
with
SXP
service
enabled
10
Attribute M a x i m u m
Limit
Maxm
i um 200
ISE
SXP
peers
per
PSN
with
SXP
service
enabled
Maxm
i um 100,000 (unicast
network addresses)
device
entries*
Maxm
i um 10,000
network
device
groups
(NDG)
Maxmi um 50
Active
Directory
forests
(Join
Points)
Maxmi um 100
Active
Directory
controllers
(WMI
query)
Maxm
i um 300,000
internal
users
Maxm
i um 1,000,000
internal
guests**
Maxm i um 1,000,000
user
certificates
Maxm i um 1,000
server
certificates
11
Attribute M a x i m u m
Limit
Maxm i um 1,000
trusted
certificates
Maxm i um Cisco SNS
concurrent 3695/3795 as
active dedicated
endponist/esoins PAN/MnT:
2,000,000
Refer to Sizing
Guidelines for
ISE
Deployment, on
page 5 for
other appliance
combinations
Maxm
i um 200
policy
sets
Maxm i um 3000
authorization
(3,200
rules****
authorization
profiles)
12
Attribute M a x i m u m
Limit
Maxm i um 1000
authentication
rules
Maxm i um 64
atribute-value
(AV)
pairs
Maxm
i um 1,000
user
identity
groups
Maxm
i um 1,000
endpoint
identity
groups
TrustSec 10,000
Security
50,000
Group
Tags
(SGTs)
TrustSec
SGTs
on
Cisco
SNS
3655/3755
and
above
models
from
Cisco
ISE
Release
3.4
Patch
1
onwards
TrustSec 1,000
Security
Group
ACLs
(SGACLs)
13
Attribute M a x i m u m
Limit
TrustSec 10,000
IP-SGT
Static
Bindings
(over
SSH)
Maxmi um ERS API: 100
concurrent
OpenAPI: 150
REST
API
connections
Maxm i um Cisco SNS
PassiveID 3695/3795
sessions PAN, MnT:
for 2,000,000
Large
Cisco SNS 3595
deployment
PAN, MnT:
500,000
Cisco SNS 3655
PAN, MnT:
500,000
Cisco SNS 3755
PAN, MnT:
750,000
Maxmi um 300
network milliseconds
latency
between
primary
PAN
and
any
other
Cisco
ISE
node
including
the
secondary
PAN,
MnT,
and
PSNs
14
Attribute M a x i m u m
Limit
Maxm
i um 150
IPSec
tunnels
per
dedicated
PSN
Maximum PassiveID
sessions providers
Maxm
i um 100
AD
50
Domain
Controlers 70
Maxm
i um
REST
API
Providers
Maxm
i um
Syslog
Providers
MnT API
Performance
15
Attribute M a x i m u m
Limit
Time 40 seconds
taken
by
MnT
API
</M
/p:sth(tnTPI>
ad/m
A
n/im
P/ISo/neA
ist/vei)L
ctsi
to
download
200,000
endpoints
in
Medium
and
Large
deployments
*Up to 300,000 NADs are supported. You must provide the network address and subnet in the Administration > Network Resources
> Network Devices page.
**Having more than 500,000 guest users might create latency in user authentication.
***Sample use case: Cisco SNS 3795 can support a maximum of 2,000,000 active endpoints/sessions (as stated in Sizing Guidelines
for ISE Deployment, on page 5). In addition, it can handle a maximum of 2,000,000 inactive endpoints, resulting in a total of
4,000,000 endpoints in the Cisco ISE database for large deployments. For medium deployments, it can handle up to 150,000 active
endpoints/sessions and 3,850,000 inactive endpoints. For small deployments it can handle up to 50,000 active endpoints/sessions and
3,950,000 inactive endpoints.
****It is not recommended to have more than 600 authorization rules in a single policy set. Increasing the number of conditions per
authorization rule might impact the performance.
Deployment Type Platform Max PSNs Max ISE SXP Bindings Max ISE SXP Listener
Peers
16
Deployment Type Platform Max PSNs Max ISE SXP Bindings Max ISE SXP Listener
Peers
Table 11: Cisco ISE pxGrid Direct connector integration via URL Fetcher
17
Note • The above values are applicable only when the network latency between Cisco ISE and CMDB is less than 50 milliseconds.
• The above data is applicable for endpoints with 15 attributes each.
• Data size for each endpoint with its attributes should not exceed 5 GB.
• Timeout for Full Sync download is 120 minutes.
• It is highly recommended to schedule synchronization during off-peak hours.
• Cisco ISE can fetch data from 5 connectors simultaneously.
Table 12: Cisco ISE pxGrid Direct connector integration via URL Pusher
Note • The URL Pusher data is applicable only from Cisco ISE Release 3.4.
• Each push API request payload size should not exceed 5 MB.
• It is recommended to schedule large synchronization tasks during off-peak hours.
18
Note the following points while integrating Cisco ISE with Cisco ACI:
• It is recommended to integrate scaled ACI Fabric during off-peak hours. If the RADIUS traffic rate is high in the Cisco ISE
deployment, TrustSec traffic enforcement might be delayed.
• Maximum SXP binding values specified in the above table are applicable for both deployments using only IPv4 addresses and
deployments using a combination of IPv4 and IPv6 addresses.
• Time taken for an ACI connection with 20,000 to 32,000 endpoints to reach the Connected state can be up to 5 minutes and time
taken to download the bindings can be up to 10 minutes.
• The initial time taken to download EPG endpoints or create SXP bindings can increase if the overall load on the Cisco ISE
system is increased.
• The total number of SXP bindings in the Cisco ISE deployment must not exceed 1,400,000. This count includes:
• SXP bindings created by SGT assignment in authorization policies for RADIUS workload
• SXP bindings received from SXP speakers
• SXP bindings from IP-EPG mappings learned from Cisco ACI or SXP bindings created for workloads from all the Workload
Connections
• SXP bindings created by evaluating the Inbound SGT Domain rules
• SXP bindings created by the Workload Classification rules
Following are few examples for calculating the number of Cisco ACI connections that can be integrated with Cisco ISE based on
scale:
Example 1
If the total number of SXP bindings created by SGT assignment in an authorization policy for RADIUS workload is 1,000,000, the
total number of ACI connections that can be created is:
• If each ACI Fabric has 20,000 endpoints to be shared with Cisco ISE, total number of ACI Fabrics that can be integrated =
(1,400,000-1,000,000) / 20,000 = 20
• If each ACI Fabric has 32,000 endpoints to be shared with Cisco ISE, total number of ACI connections that can be integrated
= (1,400,000-1,000,000) / 32,000 = 12 or 13
Example 2
If the total number of SXP bindings created by SGT assignment in an authorization policy for RADIUS workload is 50,000, the total
number of ACI connections that can be created is:
• If each ACI Fabric has 20,000 endpoints to be shared with Cisco ISE, the total number of ACI connections that can be integrated
= (1,400,000-50,000) / 20,000 = 67 or 68
• If each ACI Fabric has 32,000 endpoints to be shared with Cisco ISE, the total number of ACI connections that can be integrated
= (1,400,000-50,000) / 32000 = 42
Example 3
In a small deployment with Cisco SNS 3655/3755/3695/3795 as PAN/MnT, if the:
• Total number of SXP bindings created by SGT assignment in an authorization policy for RADIUS workload is 10,000
• Total SXP bindings for this deployment is 40,000
19
• Total ACI Connections is 3
Maximum endpoints per ACI connection = (Total SXP bindings in deployment - Total SXP bindings)/Number of connectors for
deployment = (40,000-10,000)/3 = 10,000
Table 14: Cisco ISE Workload Connector Scaling for Azure, AWS, GCP, and vCenter Connections
*This could be a combination of different workload connections like AWS, GCP, Azure, and vCenter, or of same type. For example,
if the maximum workload connection value is specified as 10, this deployment can include 3 GCP connections, 4 AWS connections,
and 3 Azure connections, or 10 Azure connections.
Deployment requirements while integrating Cisco ISE with Cisco ACI and Workload Connectors
• Small deployments with Cisco SNS 3615/3715 or Medium deployments with Cisco SNS 3615/3715 acting as PAN/MnT are
not recommended for production use.
• Instances of the SXP persona must be configured as dedicated nodes for optimal performance in Medium and Large deployments.
• When Inbound SGT domain rules are configured, additional SXP bindings might be created for specific endpoints.
• While creating the Outbound SGT Domain rules, ensure that the maximum number of SGTs from all the rules and filters does
not exceed 500. For example, if there are 5 Outbound SGT Domain rules, the number of SGTs per rule can be up to 100. It is
recommended to have less than 10 Outbound SGT Domain rules in a deployment.
• The maximum number of SXP bindings includes:
• SXP bindings created by SGT assignment in authorization policies for RADIUS workload
• SXP bindings received from SXP speakers
• Static IP-SGT bindings
20
• SXP bindings from IP-EPG mappings learned from Cisco ACI or SXP bindings created for workloads from all the Workload
Connections
• SXP bindings created by evaluating the Inbound SGT domain rules
• SXP bindings created by the Workload Classification rules
• It is strongly recommended to add scaled workload connections to Cisco ISE during the off-peak hours. If the RADIUS traffic
rate is high in the Cisco ISE deployment, SXP binding creation might be delayed.
Each of above event results in new authentication (Access-Request), accounting-interim update, or accounting stops.
Attribute Recommendation
Profiling probes If you are not using the profiling feature, turn off all the profiling probes.
Endpoint Attribute filter This filter is disabled by default. We recommend that you enable this filter.
MnT suppression Ensure that the Suppress Repeated Passed and Failed Clients option in the RADIUS Settings
page is enabled.
This option is enabled by default.
EAP-FAST reconnect and session Enable this option in the Policy > Results > Allowed Protocols > Allow EAP-FAST page.
resume
This helps client devices to reduce the load on Cisco ISE for EAP. In case of BYOD flow where
remote management of client device is not possible, this feature has minimal impact.
DNS caching If Remote Logging Targets (Administration > System > Logging > Remote Logging Targets)
are used with FQDN, DNS caching must be enabled. Set Time To Live value as 180 by using
the following command in the command line interface:
configure terminal
service cache enable hosts ttl 180
21
Table 16: Configuration Best Practices for Network Devices
Attribute Recommendation
RADIUS timeout Recommended range is from 5 to 10 seconds. This range will help the endpoints to boot
without causing the DHCP requests to expire and will also avoid latency between Cisco
ISE and network devices.
RADIUS interim accounting This option must be disabled or set to more than 24 hours for wireless and wired devices.
This limits the interim accounts from the network devices when there is no significant
change in the network. This also limits the incoming data to Cisco ISE, thereby reducing
the RADIUS accounting updates and logs and allowing PSNs to effectively process the
new incoming authentication requests.
If the ratio of authentication to accounting interim updates is more than 1:5, we strongly
recommended that you check the network connectivity and the network device
configuration for accounting updates. You must update the configuration to reduce the
frequent interim updates from the network access devices.
If you have enabled automated turning off for the network devices in large scale, we
recommend that you do this operation in batches. In addition, ensure that each batch
does not include more than 500 devices. Otherwise, this operation might cause delay
in incoming authentications.
Client exclusion This configuration is applicable for wireless IOS devices. Set the value to 60 seconds.
Session timeout Recommended value is more than 24 hours for both wired and wireless devices, unless
your security policy dictates that you must perform authentication more frequently.
Inactivity timeout Set the value to 300 seconds or more. This helps reduce the number of reauthentication
requests.
RADIUS device sensor If profiling is required, use the device sensor instead of other probes. While using the
device sensor, other probes can be disabled for wireless devices.
RADIUS Dead Timer Recommended range is from 10 to 15 minutes. This ensures that the RADIUS server
marked down is not used for the specified interval.
Guest Anchoring If WLAN is anchored, RADIUS accounting must be disabled in the WLAN settings on
the anchor controller.
Polling interval for SNMP We recommend that you set the SNMP Polling Interval value (Administration >
Network Resources > Network Devices > Add > SNMP Settings) to 8 hours or higher
to reduce performance impact due to large number of SNMP events. Setting a lower
value might create large profiling events and impact system performance.
22
Table 17: Specifications for Cisco SNS 3500/3600 Series Hardware Appliances
Specifications Cisco SNS 3615 Cisco SNS 3595 Cisco SNS 3655 Cisco SNS 3695
Processor Intel Xeon 2.10 Intel Xeon 2.60 Intel Xeon 2.10 Intel Xeon 2.10
GHz 4110 GHz E5-2640 GHz 4116 GHz 4116
Cores per Processor 8 Cores and 16 8 Cores and 16 12 Cores and 24 12 Cores and 24
Threads Threads Threads Threads
Table 18: Specifications for Cisco SNS 3700 Series Hardware Appliances
Specifications Cisco SNS 3715 Cisco SNS 3755 Cisco SNS 3795
Processor Intel Xeon 2.1 GHz 4310 Intel Xeon 2.3 GHz 4316 Intel Xeon 2.3 GHz 4316
Cores per 12 Cores and 24 Threads 20 Cores and 40 Threads 20 Cores and 40 Threads
processor
Memory 32 GB 96 GB 256 GB
2 x 16GB 6 x 16GB 8 x 32GB
Storage 1 4 8
60012G SAS 10K RPM SFF HDD 60012G SAS 10K RPM SFF HDD 60012G SAS 10K RPM SFF HDD
Or Or Or
800 GB 2.5in Enterprise 800 GB 2.5in Enterprise Performance 800 GB 2.5in Enterprise Performance
Performance 12G SAS SSD (3x 12G SAS SSD (3x endurance) 12G SAS SSD (3x endurance)
endurance)
23
Specifications Cisco SNS 3715 Cisco SNS 3755 Cisco SNS 3795
Network interface 2 x 10Gbase-T 2 x 10Gbase-T 2 x 10Gbase-T
4 x 10GE SFP 4 x 10GE SFP 4 x 10GE SFP
Note • Cisco ISE Release 3.1 Patch 6 and later and Cisco ISE Release 3.2 Patch 2 and later versions support Cisco SNS 3700
series appliances.
• You cannot add additional hardware resources like memory, processor, or storage to a Cisco SNS hardware appliance.
• Mixing SAS/SATA hard drives and SAS/SATA SSDs is not supported. You must use either SAS/SATA hard drives or
SAS/SATA SSDs.
• SSD offers improved performance in disk read/write operations and other Cisco ISE operations like boot, installation
(up to 10% improvement), and upgrade database intensive tasks like backup and reports generation (up to 20%
improvement). Note that the PSN performance for RADIUS and TACACS+ operations will remain the same as described
in preceding sections.
• Additional power supplies can be ordered separately for SNS 3615 and SNS 3715. For component part numbers, see the
Cisco Secure Network Server Data Sheet.
24
See Deploy Cisco ISE Natively on Cloud Platforms and respective cloud documentations for resource specifications of supported
instances.
Table below describes matrix of VM specification, cloud instances to their equivalent Cisco SNS appliances.
Models Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS Cisco SNS
3615 3595 3655 3695 3715 3755 3795
VM 16vCPU 16vCPU 24vCPU 24vCPU 24vCPU 40vCPU 40vCPU
Specification
32 GB 64 GB 96 GB 256 GB 32GB 96GB 256GB
*This instance is compute-optimized and provides better performance compared to the general purpose instances.
**In OCI, you choose CPU in terms of Oracle CPU (OCPU). Each OCPU provides CPU capacity equal to one physical core of an
Intel Xeon processor with hyper-threading enabled. Each OCPU equals two hardware execution threads known as vCPUs.
Note There is no equivalent cloud profile for Cisco SNS 3755. We recommend that you use the cloud instances that are specified
for Cisco SNS 3795.
Extra Small Form Factor for Cisco ISE VM and Cloud Instances
Extra Small VM specification is available only on virtualization platforms such as VMware, KVM, Hyper-V, Nutanix AHV hypervisors,
and Cloud instances.
This form factor is not supported for SNS appliances.
Table 20: Extra Small Form Factor for Cisco ISE VM and Cloud Instances
AWS m5.2xlarge
Azure Standard_D8s_v4
25
Virtual Machines Specifications
Extra Small form factor supports the following two deployment types:
• PSNLite: The node can be deployed as a dedicated PSN persona in a medium deployment. PSNLite is not supported for large
deployments.
Performance for RADIUS and TACACS+ authentication is around 50 percent of that of Cisco SNS 3615. For example, if the
RADIUS authentication rate of Cisco SNS 3615 for PEAP-MSCHAP2 with internal user database is 150, this value will be 75
(50% of 150) for the PSNLite.
• ISELite: The node can be deployed as a standalone Cisco ISE node. It is not recommended to use ISELite for Small (HA)
deployments.
ISELite is optimized to run only for small office scenario supporting up to a maximum of 1000 concurrently active endpoints
with an optimal RADIUS performance at 50 TPS.
ISELite is recommended only for RADIUS or TACACS+ traffic. It is not recommended to enable advanced services like SXP,
PassiveID, pxGrid Direct , pxGrid Cloud, TC-NAC, Log Analytics, and Cisco AI Analytics on an ISELite node.
Ensure that the Log Analytics option (under Operations > System 360) is disabled in the ISELite node.
26
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2021 Cisco Systems, Inc. All rights reserved.
Americas Headquarters Asia Pacific Headquarters Europe Headquarters
Cisco Systems, Inc. CiscoSystems(USA)Pte.Ltd. CiscoSystemsInternationalBV
San Jose, CA 95134-1706 Singapore Amsterdam,TheNetherlands
USA
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the
Cisco Website at www.cisco.com/go/offices.