<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you want send me a in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835263#M213380</link>
    <description>&lt;P&gt;If you want send me a screnshoot of the F5 config for ISE and i can compare it to our.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;laszlo&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Jun 2017 05:10:45 GMT</pubDate>
    <dc:creator>laposilaszlo</dc:creator>
    <dc:date>2017-06-22T05:10:45Z</dc:date>
    <item>
      <title>ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835245#M213346</link>
      <description>&lt;P&gt;I have a question regarding ISE profiling servers that are placed behind a load balancer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a ISE environment where both computers and users are being authenticated, and Machine Access Restriction (MAR) is enabled (so users can only authenticate on a previously authenticated machine), are the ISE servers aware of all succesfull computer authentications handled by the other ISE servers? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are 2 ISE appliances (ISE01 and ISE02) behind a load balancer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A user starts up his computer, and computer authentication is handled by ISE01 (and the authentication is successful). At the moment the user logs in on that computer, the load balancer chooses ISE02 to authenticate the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will ISE02 be aware that the corresponding computer was already succesfully authenticated on ISE01, so that the user is able to log in? Or will it deny the user authentication because it thinks the computer is not (yet) authenticated and Machine Access Restrictions is enabled?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bert&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835245#M213346</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2019-03-11T01:37:10Z</dc:date>
    </item>
    <item>
      <title>ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835246#M213347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are the ISE servers aware of all succesfull computer authentications handled by the other ISE servers? &lt;/P&gt;&lt;P&gt;=&amp;gt; No&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;they are independant servers that just replicate their configuration.&lt;/P&gt;&lt;P&gt;So a user should authenticate always with the same ISE.&lt;/P&gt;&lt;P&gt;Moreover a load balancer kills profiling since profiling requires you to span some traffic to an ISE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 17:05:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835246#M213347</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-12-08T17:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835247#M213348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nicolas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot for this explanation. Now I'm at least warned that we shouldn't place them behind a load balancer (although load balancing ISE policy servers is mentioned in the Cisco ISE user guide under section 9 "Setting up Cisco ISE in a distributed Environment").&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I don't understand why Cisco didn't implement synchronization of the machine cache for MAR (which is in fact just a cache of the mac-addresses of the authenticated computers) between ISE servers that are in the same node group. Synchronizing a table of mac-adresses isn't a big challenge I assume? Or is there another reason this wasn't implemented?&lt;/P&gt;&lt;P&gt;Implementing this synchronization would be a big improvement if you ask me, as this adds extra redundancy in case one ISE server fails and users try to log on to machines that were already authenticated on that failed ISE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2011 08:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835247#M213348</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2011-12-09T08:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835248#M213349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would guess it's probably a bit more complex than a mac table synchronization. Especially the real time synchronization could take a lot of bandwitdh/cpu I can guess but yes it would make sense as a feature request. I think the feature request list has to be 1km long now for ISE &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'll check with the developers if it's already on their roadmap or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2011 08:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835248#M213349</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-12-09T08:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835249#M213350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After checking, the MAR cache synchronization will be present in ACS 5.4&lt;/P&gt;&lt;P&gt;Logically it should also be included in a future ISE release but no further details. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Dec 2011 15:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835249#M213350</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-12-13T15:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835250#M213353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Nicolas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm glad to hear that the MAR cache sync is already in development for ACS and I hope it will be soon implemented in ISE also. I'll keep an eye on new release notes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 10:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835250#M213353</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2011-12-14T10:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835251#M213357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Nicolas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm glad to hear that the MAR cache sync is already in development for ACS and I hope it will be soon implemented in ISE also. I'll keep an eye on new release notes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 10:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835251#M213357</guid>
      <dc:creator>bert.lefevre</dc:creator>
      <dc:date>2011-12-14T10:13:41Z</dc:date>
    </item>
    <item>
      <title>ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835252#M213361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; &amp;gt;&amp;gt; they are independant servers that just replicate their configuration.&lt;/P&gt;&lt;P&gt;So a user should authenticate always with the same ISE.&lt;/P&gt;&lt;P&gt;Moreover a load balancer kills profiling since profiling requires you to span some traffic to an ISE &amp;lt;&amp;lt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not entirely correct.&amp;nbsp; Policy Service nodes are most certainly supported behind a load balancer which is the intention of a node group. This is often the preferred method for high availability and scaling.&amp;nbsp; In addition to supporting load distribution of RADIUS and other requests, members of a node group maintain a heartbeat to determine if a peer member should fail.&amp;nbsp; If so, the Monitoring node is queried to determine if there are any transient sessions which may require clean-up via RADIUS COA to help ensure that an endpoint is left in a defunt auth state.&amp;nbsp; LB functionality will depend on load balancer used.&amp;nbsp; Cisco ACE for example supports stickiness of RADIUS transactions based on source IP, Calling-Station-ID, or Framed-IP-Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The impact of LB on profiling or other Policy Service node functions depends on the service/probe in question.&amp;nbsp; For services like client provisioning, posture, and central web auth, https redirection always occurs back to the node which terminated the RADIUS session, so LB is transparent provided direct access is permitted to the real IP for redirected https trnasactions (RADIUS tranasactions would be sent to virtual IP). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specific to profiling, SNMP Queries can be triggered and will be sent by Policy Service node that received the RADIUS Accounting Start packet (assumes RADIUS probe enabled) or SNMP Trap (assumes SNMP Trap probe enabled).&amp;nbsp; SPAN is only one data collection method used primarily for HTTP or DHCP capture.&amp;nbsp; Methods other than SPAN/RSPAN are available to capture this data, but if used, then it is correct that there is no specific mechansim to move SPANs from one interface to another in case of NIC or node failure.&amp;nbsp; I believe intelligent taps are available that can accomplish this, or else traffic can be mirrored to multiple nodes at the cost of duplicating profile data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As noted, replication of MAR cache will be added to ACS 5.4, and no, this feature is not altogether trivial due to the number of transactions and updates that must be replicated and kept in sync across each node performing RADIUS services.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/CH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2012 20:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835252#M213361</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2012-01-18T20:25:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE behind load balancer</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835253#M213365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, this is useful information.&lt;/P&gt;&lt;P&gt;In the documentation, it mentions that when using a node group the NAS should have all of the ISE's configured under AAA to allow CoA.&amp;nbsp; Would it be possible to use the VIP address and NAT the ISE's when they instigate a outbound connection from behind the ACE for CoA, or is Radius a bit deeper than that.&lt;/P&gt;&lt;P&gt;Would you configure a node group for a pair of policy nodes on a remote site that were not load balanced, what makes this specific to policy server nodes behind a LB. Assume both policy server nodes where configured in all NAS's on that particular site.&lt;/P&gt;&lt;P&gt;I assume when profiling is carried out all data is replicated to the admin node anyway, this is using DHCP helper, DNS, SNMP.&amp;nbsp; When you start to look at a distributed ISE architechure and using profiling it starts to get messy, potentially a lot of helper, SNMP addresses have to be configured in NAS's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 09:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835253#M213365</guid>
      <dc:creator>g-hopkinson</dc:creator>
      <dc:date>2012-01-27T09:56:47Z</dc:date>
    </item>
    <item>
      <title>Hi  Craig, We are in the</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835254#M213367</link>
      <description>&lt;P&gt;Hi&amp;nbsp; Craig,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are in the process of migrating our ISE infrastructure from ACE to F5.&lt;/P&gt;&lt;P&gt;We followed your document for the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All looks ok except EAP-TLS authentication. (PEAP user/computer works fine)&lt;/P&gt;&lt;P&gt;In the document there is nothing special mentioned that needs to be done for TLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think it may be related to fragmentation but not sure.&lt;/P&gt;&lt;P&gt;I can also add here that if we point the NAD's to the PSN directly it works.&lt;/P&gt;&lt;P&gt;The problem is only when we use the VIP.&lt;/P&gt;&lt;P&gt;(PEAP work with the VIP also)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know&amp;nbsp;&amp;nbsp;if something special needs to be done for TLS to work.&lt;/P&gt;&lt;P&gt;Any information or hint is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Laszlo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2015 07:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835254#M213367</guid>
      <dc:creator>laposilaszlo</dc:creator>
      <dc:date>2015-06-29T07:08:59Z</dc:date>
    </item>
    <item>
      <title>It is not uncommon to see</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835255#M213368</link>
      <description>&lt;P&gt;It is not uncommon to see RADIUS load balancing issues with EAP-TLS related to fragmentation.&amp;nbsp; The typical cases are either 1) failure of load balancer to reassemble large RADIUS packets, for example, TLS with larger key sizes, or 2) dropping of fragments by load balancer that are deemed too small.&amp;nbsp; For first case, both Cisco ACE and F5 LTM should accommodate automatic reassembly if using the standard LB mechanism for RADIUS.&amp;nbsp; LTM does not reassemble FastL4 by default, but that protocol is normally not used and guide does not use that profile for RADIUS. If fragments too small, for both ACE and LTM you would need to change the default minimum fragment size to accept the exceptionally small fragment for reassembly.&amp;nbsp; This can serve as a workaround, but recommend find and eliminate the device causing RADIUS packets to be fragmented below reasonable size.&lt;/P&gt;&lt;P&gt;Another common issue in load balancing is failure to understand exact path taken for the entire flow to/from real servers. Often there is a case where ingress packets take one path but responses take another path.&amp;nbsp; This asymmetry often results in packet drops by load balancer or other device in the path.&lt;/P&gt;&lt;P&gt;/CH&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jun 2015 14:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835255#M213368</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2015-06-29T14:34:29Z</dc:date>
    </item>
    <item>
      <title>Hi laposilaszlo,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835256#M213369</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/laposilaszlo" title="View user profile." class="username" lang="" about="/users/laposilaszlo" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;laposilaszlo&lt;/A&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Did you end up resolving the issue with EAP-TLS?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt; I am using a F5 to load balance RADIUS &amp;amp; having the same issue. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;I am not sure if I want to alter the fragment size as a work around.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Regards,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Raj&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 04:10:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835256#M213369</guid>
      <dc:creator>pvzcisco07</dc:creator>
      <dc:date>2017-06-21T04:10:31Z</dc:date>
    </item>
    <item>
      <title>Hi Raj,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835257#M213370</link>
      <description>&lt;P&gt;Hi Raj,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes we solved it.&lt;/P&gt;
&lt;P&gt;In our case it was the Nexus switch. It has a security feature that discards small UDP packets.&lt;/P&gt;
&lt;P&gt;And the last part of the certificate was a small UDP packet that got discarded.&lt;/P&gt;
&lt;P&gt;So we disabled this one and all is ok now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After this we had some problem on the F5 regarding UDP fragments that was solved with an F5 upgrade.&lt;/P&gt;
&lt;P&gt;This was a long time ago so this fix sould be in the current releses.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;laszlo&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 05:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835257#M213370</guid>
      <dc:creator>laposilaszlo</dc:creator>
      <dc:date>2017-06-21T05:10:29Z</dc:date>
    </item>
    <item>
      <title>Hi Laszlo,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835258#M213371</link>
      <description>&lt;P&gt;Hi Laszlo,&lt;/P&gt;
&lt;P&gt;Thanks for the quick reply!&lt;/P&gt;
&lt;P&gt;We run a Nexus core as well. Could you please tell me how to check/disable the feature?&lt;/P&gt;
&lt;P&gt;We are running ISE 2.2 &amp;amp; the issue still seems to persists.&lt;/P&gt;
&lt;P&gt;We are running version 11.5.3 on the F5.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Raj&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 05:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835258#M213371</guid>
      <dc:creator>pvzcisco07</dc:creator>
      <dc:date>2017-06-21T05:19:50Z</dc:date>
    </item>
    <item>
      <title>MTN-GDC-AGG-N7018A-1# show</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835259#M213374</link>
      <description>&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;MTN-GDC-AGG-N7018A-1# show hardware forwarding ip verify module 3&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; min-height: 22px;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;IPv4 and v6 IDS Checks &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Status &amp;nbsp; &amp;nbsp; Packets Failed&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;-----------------------------+---------+------------------&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;address source broadcast &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;address source multicast &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;address destination zero &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;address identical&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 134 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;address reserved &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 2334940 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;address class-e&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Disabled &amp;nbsp; --&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;checksum &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;protocol &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: red;"&gt;fragment &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 34254 &lt;/SPAN&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length minimum &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length consistent&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length maximum max-frag&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length maximum udp &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Disabled &amp;nbsp; --&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length maximum max-tcp &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;tcp flags&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Disabled &amp;nbsp; --&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;tcp tiny-frag&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 176552&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;version&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;-----------------------------+---------+------------------&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;IPv6 IDS Checks&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Status &amp;nbsp; &amp;nbsp; Packets Failed&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;-----------------------------+---------+------------------&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length consistent&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length maximum max-frag&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length maximum udp &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Disabled &amp;nbsp; --&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;length maximum max-tcp &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;tcp tiny-frag&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;version&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Enabled&amp;nbsp; &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;Workaround:&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;Disable packet length check using command&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;Config t&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 13.5pt; font-family: 'Calibri',sans-serif; color: #0c6ca5;"&gt;no hardware ip verify length&lt;/SPAN&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="color: #0c6ca5;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2017 09:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835259#M213374</guid>
      <dc:creator>laposilaszlo</dc:creator>
      <dc:date>2017-06-21T09:57:30Z</dc:date>
    </item>
    <item>
      <title>Thanks Laszlo,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835260#M213376</link>
      <description>&lt;P&gt;Thanks Laszlo,&lt;/P&gt;
&lt;P&gt;The fragment feature was disabled on my switch, so I enabled it &amp;amp; disabled the minimum length as suggested by you. But the issue still persists&lt;/P&gt;
&lt;P&gt;7010-CS01(config)# show hardware forwarding ip verify module 3 | i fra&lt;/P&gt;
&lt;P&gt;fragment Enabled 0&lt;/P&gt;
&lt;P&gt;7010-CS01# show hardware forwarding ip verify module 3 | i leng&lt;BR /&gt;length minimum Disabled --&lt;/P&gt;
&lt;P&gt;The failure logs on ISE shows the failure reason as below&lt;/P&gt;
&lt;TABLE class="content_table" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="69%"&gt;5411 Supplicant stopped responding to ISE&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="31%"&gt;Failure Reason&lt;/TD&gt;
&lt;TD width="69%"&gt;12931 Supplicant stopped responding to ISE after sending it the first EAP-TLS message&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As soon as I point it to the PSN instead of the VIP it works straight away.&lt;/P&gt;
&lt;P&gt;I have logged a TAC case for the issue.&lt;/P&gt;
&lt;P&gt;On a side note, did you have TACACS traffic load balanced through the F5?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 02:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835260#M213376</guid>
      <dc:creator>pvzcisco07</dc:creator>
      <dc:date>2017-06-22T02:40:13Z</dc:date>
    </item>
    <item>
      <title>I also forgot to mention, our</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835261#M213378</link>
      <description>&lt;P&gt;I also forgot to mention, our deployment is not inline. The PSNs &amp;amp; the F5 are on different networks.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 04:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835261#M213378</guid>
      <dc:creator>pvzcisco07</dc:creator>
      <dc:date>2017-06-22T04:47:50Z</dc:date>
    </item>
    <item>
      <title>We only balance Radius for</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835262#M213379</link>
      <description>&lt;P&gt;We only balance Radius for now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The best thing you can do is capture traffic, that is what TAC is going to ask you also.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Capture on the client, then on F5 and ISE.(F5 has this functionality from CLI, you can capture incomming and outgoing traffic at the same time)&lt;/P&gt;
&lt;P&gt;Then you will see where the packets are missing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is what we did and found the problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In our deployment the ISE PSN's have their gateway in the F5.&lt;/P&gt;
&lt;P&gt;If PEAP is working then 100% that it is a fragmentation problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Laszlo&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 04:59:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835262#M213379</guid>
      <dc:creator>laposilaszlo</dc:creator>
      <dc:date>2017-06-22T04:59:28Z</dc:date>
    </item>
    <item>
      <title>If you want send me a</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835263#M213380</link>
      <description>&lt;P&gt;If you want send me a screnshoot of the F5 config for ISE and i can compare it to our.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;laszlo&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2017 05:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835263#M213380</guid>
      <dc:creator>laposilaszlo</dc:creator>
      <dc:date>2017-06-22T05:10:45Z</dc:date>
    </item>
    <item>
      <title>Hi Laszlo,</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835264#M213381</link>
      <description>&lt;P&gt;Hi Laszlo,&lt;/P&gt;
&lt;P&gt;In my case the servers are on different L3 domains to the F5. So basically, the f5 is not inline with the servers which is recommended design on the guide. So, is this going to work in my setup? I would have thought it would work at least with SNAT but it doesn't. I have attached the screenshots&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2017 07:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-behind-load-balancer/m-p/1835264#M213381</guid>
      <dc:creator>pvzcisco07</dc:creator>
      <dc:date>2017-06-23T07:56:41Z</dc:date>
    </item>
  </channel>
</rss>

