Cisco Secure Network Server Data Sheet

Data Sheet

Available Languages

Download Options

  • PDF
    (388.4 KB)
    View with Adobe Reader on a variety of devices
Updated:June 24, 2024

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (388.4 KB)
    View with Adobe Reader on a variety of devices
Updated:June 24, 2024
 

 

Product overview

Granting and denying network access has evolved beyond simple username and password verifications. Today, additional attributes related to users and their devices are used as decision criteria in determining authorized network access. Additionally, network service provisioning can be based on data such as the type of device accessing the network, including whether it is a corporate or personal device.

The Cisco® Secure Network Server is a scalable solution that helps network administrators meet complex network access control demands by managing the many different operations that can place heavy loads on applications and servers, including:

     Authorization and authentication requests.

     Queries to identity stores such as Active Directory (on-premise or Microsoft Entra ID), LDAP, and other databases.

    API queries to fetch attributes from third-party systems (such as ServiceNow or other CMDB systems).

     Device profiling and compliance checking.

     Enforcement actions to remove devices from the network.

     Reporting.

The Cisco Secure Network Server is based on the Cisco UCS® C220 Rack Server and is configured specifically to support the Cisco Identity Services Engine (ISE) security application. The Cisco Secure Network Server supports these applications in three versions. The Cisco Secure Network Server 3715 is designed for small deployments. The Cisco Secure Network Server 3755 and 3795 have several redundant components such as hard disks and power supplies, making it suitable for larger deployments that require highly reliable system configurations.

Figure 1 shows the Cisco Secure Network Server.

Cisco Secure Network Server

Figure 1.               

Cisco Secure Network Server

Product specifications

Table 1 lists specifications of the Cisco Secure Network Server.

Table 1.           Secure Network Server Specifications

Product name

Cisco SNS-3715

Cisco SNS-3755

Cisco SNS-3795

Processor

Intel 4310

2.1GHz

Intel 4316

2.3GHz

Intel 4316

2.3GHz

Cores per processor

12 Cores and 24 Threads

20 Cores and 40 Threads

20 Cores and 40 Threads

Memory

32GB

2 X 16GB

96GB

6 X 16GB

256GB

8 X 32GB

Hard disk

1

60012G SAS 10K RPM SFF HDD

Or

800GB 2.5in Enterprise Performance 12G SAS SSD (3X endurance)

Or

960GB 2.5 in Enterprise value SATA SSD Self Encrypted Drive (1X, SED)

4

60012G SAS 10K RPM SFF HDD

Or

800GB 2.5in Enterprise Performance 12G SAS SSD (3X endurance)

Or

960GB 2.5 in Enterprise value SATA SSD Self Encrypted Drive (1X, SED)

8

60012G SAS 10K RPM SFF HDD

Or

800GB 2.5in Enterprise Performance 12G SAS SSD (3X endurance)

Or

960GB 2.5 in Enterprise value SATA SSD Self Encrypted Drive (1X, SED)

Hardware RAID

Level 0

Level 10

Cisco 12G SAS Modular RAID Controller

Level 10

Cisco 12G SAS Modular RAID Controller

Network interface

2 X 10Gbase-T

4 X 10GE SFP

2 X 10Gbase-T

4 X 10GE SFP

2 X 10Gbase-T

4 X 10GE SFP

Power supplies

1 Or 2 X 1200W

2 X 1200W

2 X 1200W

TPM chip

Yes

Yes

Yes

Security applications

The Cisco Secure Network Server supports Cisco’s powerful network access and control security applications:

Cisco Identity Services Engine

As the industry’s only complete Network Access Control (NAC) solution, the Cisco Identity Services Engine (ISE) is a revolutionary product that extends the network access and admission control capabilities and is the bedrock of a zero trust solution. Teams gain agility with zero trust provisioning and flexibility in automating their environment through the entire life cycle of managing Cisco ISE. With Cisco ISE as the centerpiece for zero trust access to the workplace (self managed infrastructure), organizations are lowering risk, protecting the integrity of their business, and accelerating secure network access across the distributed network.

Looking beyond username and password, Cisco ISE delivers unprecedented abilities to acquire user and device identity and context information to forge flexible and powerful policies that govern authorized network access. Cisco ISE is an all-in-one enterprise policy control platform that can reliably provide secure access for wired, wireless, VPN, and Private 5G networks. Cisco ISE can also help IT with secure BYOD on-boarding and allow IT to provide differentiated Guest Access. Cisco ISE provides enforcement actions that allow administrators to restrict devices from the network that are violating access and policies.

Table 2 lists Cisco ISE endpoint scalability metrics for the Secure Network Servers.

Table 2.           Identity Services Engine deployment scalability (ISE 3.1 P6 and later)

Maximum Concurrent Sessions

Cisco Secure Network Server 3715

Cisco Secure Network Server 3755

Cisco Secure Network Server 3795

Concurrent active endpoints supported by a dedicated PSN

(Cisco ISE node only has PSN persona.)

50,000

100,000

100,000

Concurrent active endpoints supported by a shared PSN

(Cisco ISE node has multiple personas.)

25,000

50,000

50,000

Note:       Cisco SNS-3795 is equipped with better RAM, Disk R/W performance. It is best suited for dedicated PAN, dedicated MnT or dedicated PAN/MnT personas.

Ordering information

Table 3 lists ordering information for the Cisco Secure Network Servers.

Each Cisco SNS server can be ordered with HDD, SSD or SED as a configuration option.

Table 3.           Product ordering information

Server part numbers

Server description

SNS-3715-K9

Secure Network Server for ISE applications (small)

SNS-3755-K9

Secure Network Server for ISE applications (medium)

SNS-3795-K9

Secure Network Server for ISE applications (large)

SSD offers improved performance in disk read/write operations and other Cisco ISE operations like reboot, installation, upgrades, database intensive tasks like backup and restore, reports generation, and so on.

Performance improvements vary between an average of 15% in fresh installation, 40% in upgrades, and 80% in exporting extensive reports with tens of millions of records.

Table 4 lists the Cisco Secure Network Server component spares that can be used as Field Replaceable Units (FRUs).

Table 4.           Spare components for the Cisco Secure Network Server

Secure network server

Component part number

Component description

3715/3755/3795

UCS-HD600G10K12N=

600-GB 12-Gb SAS 10K RPM SFF hard disk; hot pluggable; drive sled mounted

3715/3755/3795

UCS-SD800GS3X-EP=

800GB 2.5 in Enterprise Performance 12G SAS SSD (3X endurance)

3715/3755/3795

UCS-SD960GM2NK9=

960GB Enterprise value SATA SSD (1X , SED)

UCSC-PSU1-1200W=

1200W power supply

3715/3755/3795

N20-BKVM=

KVM cable

3715/3755/3795

UCSC-RAIL-M6=

Rail kit

Network connective

Copper PID:

GLC-TE - 1000BASE-T SFP transceiver module for Category 5 copper wire

Fiber PIDs: UCS M6 10G NIC Interoperability with Cisco Cables/Optics

Supported Cisco ISE versions

The Cisco Secure Network Server 37xx supports Cisco ISE 3.1 P6 and later versions only. Upon receiving the SNS-37xx, it is recommended to install the latest patch of the Cisco ISE suggested release.

Connectors and LEDs

Connectors and LEDs

Figure 2.               

Connectors and LEDs

Table 5 lists Connectors and LEDs on the Cisco SNS-3715, SNS-3755, and SNS-3795.

Table 5.           Cisco SNS-3715, SNS-3755, and SNS-3795 Connectors and LEDs

 

LED Name

States

1

Power LED

Off - There is no AC power to the server.

Amber - The server is in standby power mode. Power is supplied only to the Cisco IMC and some motherboard functions.

Green - The server is in main power mode. Power is supplied to all server components.

2

Unit Identification

Off - The unit identification function is not in use.

Blue, blinking - The unit identification function is activated.

3

System Health

Green - The server is running in normal operating condition.

Green, blinking - The server is performing system initialization and memory check.

Amber, steady - The server is in a degraded operational state (minor fault). For example:

  Power supply redundancy is lost.
  CPUs are mismatched.
  At least one CPU is faulty.
  At least one DIMM is faulty.
  At least one drive in a RAID configuration failed.

Amber, 2 blinks - There is a major fault with the system board.

Amber, 3 blinks - There is a major fault with the memory DIMMs.

Amber, 4 blinks - There is a major fault with the CPUs.

4

Power Supply Status

Green - All power supplies are operating normally.

Amber, steady - One or more power supplies are in a degraded operational state.

Amber, blinking - One or more power supplies are in a critical fault state.

5

Fan Status

Green - All fan modules are operating properly.

Amber, blinking - One or more fan modules breached the nonrecoverable threshold.

6

Network Link Activity

Off - The Ethernet LOM port link is idle.

Green - One or more Ethernet LOM ports are link-active, but there is no activity.

Green, blinking - One or more Ethernet LOM ports are link-active, with activity.

7

Temperature Status

Green - The server is operating at normal temperature.

Amber, steady - One or more temperature sensors breached the critical threshold.

Amber, blinking - One or more temperature sensors breached the
nonrecoverable threshold.

Form factor

Physical dimensions (H x W x D) 1RU: 1.7 x 16.9 x 29.8 in. (4.32 x 43 x 75.6 cm).

Environmental

Table 6 lists environmental information for the Cisco Secure Network Servers.

Table 6.           Environmental Specifications

Description

Specification

Temperature, operating

50 to 95°F (10 to 35°C)

Extended environment 41 to 104°F (5 to 40°C)

Derate the maximum temperature by 1°F for every 547 feet (1°C
per every 300 meters) of altitude above 3117 feet (950 m).

Note: Although the ASHRAE guidelines define multiple classes
with different operating ranges, the recommended temperature
and humidity operating range is the same for each class.
The recommended temperature and humidity ranges are:

Operating Temperature: 64.4 to 80.6°F (18 to 27°C)

For general information, see the Cisco Unified Computing System Site Planning Guide: Data Center Power and Cooling.

Temperature, nonoperating
(when the server is stored or transported)

–40 to 149°F (–40 to 65°C)

Maximum rate of change (operating and nonoperating)

20°C per hour (36°C per hour)

Humidity (RH), operating

8% to 90% and 75°F (24°C) maximum dew point temperature, noncondensing environment

Humidity (RH), nonoperating
(when the server is stored or transported)

5 to 95% and 91°F (24°C) maximum dew point temperature, noncondensing environment

Altitude, operating

0 to 10,000 feet (0 to 3050 meters)

Altitude, nonoperating
(when the server is stored or transported)

0 to 40,000 feet (0 to 12,192 meters)

Sound power level

Measure A-weighted per ISO7779 LwAd (Bels)

Operation at 73° F (23° C)

5.5

Sound pressure level

Measure A-weighted per ISO7779 LpAm (dBA)

Operation at 73° F (23° C)

40

Compliance requirements

Table 7 lists compliance requirements information for the Cisco Secure Network Servers.

Table 7.           Compliance Specifications

Parameter

Description

Regulatory compliance

Products should comply with CE Markings per directives 2014/30/EU
and 2014/35/EU.

Safety

UL 60950-1/62368-1

CAN/CSA-C22.2 No. 60950-1/62368-1

IEC/EN 62368-1

AS/NZS 62368-1

GB4943.1-2022

EMC - Emissions

47CFR Part 15 (CFR 47) Class A

AS/NZS

CISPR32 Class A

CISPR32 Class A

EN55032 Class A

ICES003 Class A

VCCI Class A

EN61000-3-2

EN61000-3-3

KN32 Class A

CNS13438 Class A

EMC - Immunity

EN55024

CISPR24

EN30038

KN35

Cisco Capital

Flexible payment solutions to help you achieve your objectives

Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business transformation and help you stay competitive. We can help you reduce the total cost of ownership, conserve capital, and accelerate growth. In more than 100 countries, our flexible payment solutions can help you acquire hardware, software, services and complementary third-party equipment in easy, predictable payments. Learn more.

How to buy

To view buying options and speak with a Cisco sales representative, visit www.cisco.com/c/en/us/buy.html.

For more information

For more information, please visit the following resources:

     Cisco Identity Services Engine: www.cisco.com/go/ISE

     Cisco UCS Servers: www.cisco.com/go/unifiedcomputing

Document history

New or revised topic

Described in

Date

Add SED disk

Table 1

July, 2023

Updated performance

Table 2

July, 2023

Updated PIDs

Table 4

July, 2023

Updated content

Product overview

June, 2024

Cisco Secure Network Server

Page 5 Security Applications

May, 2024

 

 

 

Learn more