<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE witt F5 CoA SNAT configuration problem in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679325#M508721</link>
    <description>&lt;P&gt;Again, try setting "translate-address disabled" in CoA SNAT config.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Aug 2018 16:31:59 GMT</pubDate>
    <dc:creator>Craig Hyps</dc:creator>
    <dc:date>2018-08-01T16:31:59Z</dc:date>
    <item>
      <title>ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3677209#M508582</link>
      <description>&lt;P&gt;My customer is having problem to configure CoA SNAT when deploying F5 for load balancing. Without CoA SNAT option it can work fine, before they were using ISE for very long time without F5, now they are trying to reconfigure their solution. They tried to use deployment guide in attachment from 2014 but seems that part of configuration needed o F5 is not complete (at least according to F5 support). Can you advise where I can find configuration guide which can help my customer to deploy ISE with F5 CoA SNAT?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 07:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3677209#M508582</guid>
      <dc:creator>sekregie</dc:creator>
      <dc:date>2018-07-30T07:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3677920#M508583</link>
      <description>&lt;P&gt;There are some snippets of best practice in the BRKSEC-3699&lt;/P&gt;
&lt;P&gt;I doubt Cisco will have a recipe that can be applied to all customers - in some cases you made need iRules and that's when your mileage may vary.&amp;nbsp; I have seen very complex iRules and it's a topic that deserves special skill sets.&amp;nbsp; Cisco documentation goes a long way to explain the requirements and theory - but the actual customer implementation could be tricky.&amp;nbsp; You might want to share more details about your topology and F5 config so far.&amp;nbsp; The community can glance over it.&amp;nbsp;&amp;nbsp;Craig Hyps has done a lot of work in that area and might be lurking here.&amp;nbsp; You never know ... I tried to add him into the conversation with &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/571864"&gt;@...&lt;/a&gt; but it didn't work for me.&amp;nbsp; It used to work on the old ISE Community Forum.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jul 2018 23:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3677920#M508583</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2018-07-30T23:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3678544#M508584</link>
      <description>&lt;P&gt;It looks to me like the information you need is in the guide. I would make sure that they are not getting F5 SNAT address and source NAT confused.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 18:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3678544#M508584</guid>
      <dc:creator>Alex Pfeil</dc:creator>
      <dc:date>2018-07-31T18:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3678890#M508585</link>
      <description>&lt;P&gt;Thanks, I have already provided this guide to customer. They will check and feedback to me.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 07:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3678890#M508585</guid>
      <dc:creator>sekregie</dc:creator>
      <dc:date>2018-08-01T07:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679001#M508586</link>
      <description>On the landing page of the guide, there is a healthy discussion and comments from field and customers on some items from guide which may or may not work as originally documented based on F5 LTM version or special deployment setup.  The CoA SNAT config was complete as per the versions and environment tested at the time, but in later releases customers found that they needed to change the virtual server type from 'Standard' to 'Forwarding (IP)'.</description>
      <pubDate>Wed, 01 Aug 2018 09:58:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679001#M508586</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-08-01T09:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679067#M508704</link>
      <description>&lt;P&gt;Hello;&lt;/P&gt;
&lt;P&gt;I am a client mentioned by the Sebastian (sekregie).The problem concerns communication for radius CoA initiated by one of the PSNs. Communication enters the F5 from the PSN side and I do not know what's happening with it. I can only see that there is no assignment to any of the Virtual Servers. The topology in the lab is very simple: NAD (switch)&amp;gt; F5&amp;gt; PSN1 / PSN2&lt;/P&gt;
&lt;P&gt;I will mention that my knowledge of F5 is not high, I rely entirely on a document written by Craig Hyps.&lt;/P&gt;
&lt;P&gt;My addressing table:&lt;/P&gt;
&lt;P&gt;&lt;FONT face="Courier New" size="3"&gt;10.16.36.21&lt;/FONT&gt;&lt;FONT face="Courier New" size="3"&gt;&lt;SPAN&gt;1 &amp;amp; 212&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="Courier New" size="3"&gt;&lt;SPAN&gt; - PSN&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="Courier New" size="3"&gt;&lt;SPAN&gt;1/&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="Courier New" size="3"&gt;&lt;SPAN&gt;2 adddress&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;10.16.36.210 -ISE_INTERNAL interface&lt;/P&gt;
&lt;P&gt;10.16.36.186 - ISE_EXTERNAL interface&lt;/P&gt;
&lt;P&gt;10.16.36.187 - VIP F5&lt;/P&gt;
&lt;P&gt;10.31.69.90 - NAD IP Address&lt;/P&gt;
&lt;P&gt;　&lt;/P&gt;
&lt;P&gt;A fragment of the CoA communication log that appears on F5 from the PSN side (ISE_INTERNAL):&lt;/P&gt;
&lt;P&gt;[rajczmic@localhost:Active:Disconnected] ~ # tcpdump -i any port 1700&lt;/P&gt;
&lt;P&gt;listening on any, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;/P&gt;
&lt;P&gt;12:38:03.477327 IP 10.16.36.212.44370 &amp;gt; 10.31.69.90.mps-raft: RADIUS, CoA-Request (43), id: 0x03 length: 180 in slot1/tmm0 lis=&lt;/P&gt;
&lt;P&gt;12:38:08.480682 IP 10.16.36.212.44370 &amp;gt; 10.31.69.90.mps-raft: RADIUS, CoA-Request (43), id: 0x03 length: 180 in slot1/tmm0 lis=&lt;/P&gt;
&lt;P&gt;　&lt;/P&gt;
&lt;P&gt;　&lt;/P&gt;
&lt;P&gt;Normal Radius communication looks looks like below. I do not know why, but it is not always assigned to Virtual servers for Radius:&lt;/P&gt;
&lt;P&gt;ON ISE_INTERNAL side :&lt;/P&gt;
&lt;P&gt;rajczmic@localhost:Active:Disconnected] ~ # &lt;STRONG&gt;tcpdump -i ISE_INTERNAL port 1812&lt;BR /&gt; &lt;/STRONG&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt; listening on ISE_INTERNAL, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;BR /&gt; 13:42:11.764129 IP 10.16.36.210.58949 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x93 length: 65 out slot1/tmm1 lis=&lt;BR /&gt; 13:42:11.782857 IP 10.16.36.212.radius &amp;gt; 10.16.36.210.58949: RADIUS, Access-Accept (2), id: 0x93 length: 184 in slot1/tmm1 lis=&lt;BR /&gt; 13:42:16.358655 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x7c length: 107 out slot1/tmm1 lis=/Common/PSN-IP-Forwarding-Inbound&lt;BR /&gt; 13:42:16.375898 IP 10.16.36.212.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Accept (2), id: 0x7c length: 187 in slot1/tmm1 lis=/Common/PSN-IP-Forwarding-Inbound&lt;BR /&gt; 13:42:19.295035 IP 10.16.36.210.35142 &amp;gt; 10.16.36.211.radius: RADIUS, Access-Request (1), id: 0x9b length: 65 out slot1/tmm0 lis=&lt;BR /&gt; 13:42:19.320966 IP 10.16.36.211.radius &amp;gt; 10.16.36.210.35142: RADIUS, Access-Accept (2), id: 0x9b length: 184 in slot1/tmm0 lis=&lt;BR /&gt; 13:42:26.722811 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.211.radius: RADIUS, Access-Request (1), id: 0x7e length: 107 out slot1/tmm1 lis=/Common/PSN-IP-Forwarding-Inbound&lt;BR /&gt; 13:42:26.726770 IP 10.16.36.210.57065 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0xa2 length: 65 out slot1/tmm1 lis=&lt;BR /&gt; 13:42:26.744838 IP 10.16.36.212.radius &amp;gt; 10.16.36.210.57065: RADIUS, Access-Accept (2), id: 0xa2 length: 184 in slot1/tmm1 lis=&lt;BR /&gt; 13:42:26.754586 IP 10.16.36.211.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Accept (2), id: 0x7e length: 187 in slot1/tmm1 lis=/Common/PSN-IP-Forwarding-Inbound&lt;BR /&gt; 13:42:32.054175 IP 10.31.69.90.swismgr1 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x7f length: 261 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.187424 IP 10.16.36.212.radius &amp;gt; 10.31.69.90.swismgr1: RADIUS, Access-Challenge (11), id: 0x7f length: 149 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.216883 IP 10.31.69.90.swismgr1 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x80 length: 631 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.245599 IP 10.16.36.212.radius &amp;gt; 10.31.69.90.swismgr1: RADIUS, Access-Challenge (11), id: 0x80 length: 277 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.265723 IP 10.31.69.90.swismgr1 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x81 length: 818 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.284533 IP 10.16.36.212.radius &amp;gt; 10.31.69.90.swismgr1: RADIUS, Access-Challenge (11), id: 0x81 length: 182 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.315764 IP 10.31.69.90.swismgr1 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x82 length: 437 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.318861 IP 10.16.36.212.radius &amp;gt; 10.31.69.90.swismgr1: RADIUS, Access-Challenge (11), id: 0x82 length: 198 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:32.349578 IP 10.31.69.90.swismgr1 &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0x83 length: 485 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:42:34.289417 IP 10.16.36.210.44778 &amp;gt; 10.16.36.211.radius: RADIUS, Access-Request (1), id: 0xaa length: 65 out slot1/tmm0 lis=&lt;BR /&gt; 13:42:34.306242 IP 10.16.36.211.radius &amp;gt; 10.16.36.210.44778: RADIUS, Access-Accept (2), id: 0xaa length: 184 in slot1/tmm0 lis=&lt;/P&gt;
&lt;P&gt;　&lt;/P&gt;
&lt;P&gt;ON ISE_EXTERNAL side:&lt;/P&gt;
&lt;P&gt;rajczmic@localhost:Active:Disconnected] ~ # &lt;STRONG&gt;tcpdump -i ISE_EXTERNAL port 1812&lt;/STRONG&gt;&lt;BR /&gt; tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt; listening on ISE_EXTERNAL, link-type EN10MB (Ethernet), capture size 65535 bytes&lt;BR /&gt; 13:46:06.692039 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.212.radius: RADIUS, Access-Request (1), id: 0xae length: 107 in slot1/tmm1 lis=/Common/PSN-IP-Forwarding-Inbound&lt;BR /&gt; 13:46:06.708915 IP 10.16.36.212.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Accept (2), id: 0xae length: 187 out slot1/tmm1 lis=/Common/PSN-IP-Forwarding-Inbound&lt;BR /&gt; 13:46:12.470534 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xaf length: 261 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.478698 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Challenge (11), id: 0xaf length: 149 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.499967 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xb0 length: 631 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.504167 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Challenge (11), id: 0xb0 length: 277 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.523369 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xb1 length: 818 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.543380 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Challenge (11), id: 0xb1 length: 182 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.565159 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xb2 length: 437 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.971219 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Challenge (11), id: 0xb2 length: 182 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.995314 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xb3 length: 437 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:12.997937 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Challenge (11), id: 0xb3 length: 182 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:13.006733 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xb4 length: 405 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:13.844545 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Challenge (11), id: 0xb4 length: 166 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:13.854983 IP 10.31.69.90.datametrics &amp;gt; 10.16.36.187.radius: RADIUS, Access-Request (1), id: 0xb5 length: 405 in slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;BR /&gt; 13:46:13.859229 IP 10.16.36.187.radius &amp;gt; 10.31.69.90.datametrics: RADIUS, Access-Accept (2), id: 0xb5 length: 348 out slot1/tmm1 lis=/Common/ISE-RADIUS-AUTH&lt;/P&gt;
&lt;P&gt;　&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;　&lt;/P&gt;
&lt;P&gt;Configuration of individual Virtual Servers in the attachment&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679067#M508704</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-01T12:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679070#M508705</link>
      <description />
      <pubDate>Wed, 01 Aug 2018 12:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679070#M508705</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-01T12:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679092#M508706</link>
      <description>&lt;P&gt;Hi Craig;&lt;/P&gt;
&lt;P&gt;I just did a quick test after switching from Standard type to Forwarding type. Unfortunately, no changes &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679092#M508706</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-01T12:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679107#M508708</link>
      <description>&lt;P&gt;To be clear, the only change would be to the CoA SNAT config, not the RADIUS Auth and Accounting portion.&amp;nbsp; The RADIUS request from NAD to VIP should use Standard LB config.&amp;nbsp; Source NAT is not supported in this flow as detailed in guide and in BRKSEC-3699 (latest reference deck posted to ciscolive.com for Orlando 2018).&amp;nbsp; RADIUS auth and accounting work but CoA will fail since ISE sends CoA to LB IP address, not NAD IP address.&amp;nbsp; There is an outstanding enhancement for ISE to use NAS-IP-Address in RADIUS payload for CoA instead of the source address learned in IP header.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Recommendation to set VS to Forwarding(IP) is only for the CoA traffic initiated by PSN.&amp;nbsp; Check traffic on both sides of LTM and verify packets are being forwarded with only change being the source IP (from PSN IP to VIP IP).&amp;nbsp;&amp;nbsp; The NADs must have CoA trust set for the LB VIP address (dynamic authorization config).&amp;nbsp; Also try setting "translate-address disabled" in CoA SNAT config.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 15:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679107#M508708</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-08-01T15:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679257#M508711</link>
      <description>&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt;I use SNAT only for COA initiated by PSN.&lt;/SPAN&gt; &lt;SPAN&gt;On the INTERNAL side, I see this communication (according to the logs attached above).&lt;/SPAN&gt; &lt;SPAN&gt;Unfortunately, this communication does not reach NAD - you can not see it at all on the EXTERNAL interface&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 15:26:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679257#M508711</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-01T15:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679268#M508715</link>
      <description>Have you created this virtual server?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Aug 2018 15:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679268#M508715</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2018-08-01T15:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679306#M508718</link>
      <description>&lt;P&gt;Yes, of course&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ltm virtual ISE-RADIUS-COA-SNAT {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination 0.0.0.0:mps-raft&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip-protocol udp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; mask any&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; profiles {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp { }&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source 10.16.36.208/28&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-address-translation {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pool Radius_COA_SnatPool&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type snat&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate-address enabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate-port enabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; vlans {&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISE_INTERNAL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlans-enabled&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vs-index 17&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 16:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679306#M508718</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-01T16:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679325#M508721</link>
      <description>&lt;P&gt;Again, try setting "translate-address disabled" in CoA SNAT config.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 16:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679325#M508721</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-08-01T16:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679345#M508723</link>
      <description>You might have better success on an F5 forum. If you do, please let us know what the solution was :-).  These configurations are fairly straightforward and common, maybe you are hitting a defect?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Aug 2018 16:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679345#M508723</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2018-08-01T16:48:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679852#M508725</link>
      <description>&lt;P&gt;"translate-address disabled" does not help. Now&amp;nbsp; we are testing&amp;nbsp; with another iRule. I'll let You know&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 09:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679852#M508725</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-02T09:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679904#M508726</link>
      <description>&lt;P&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt;It looks like it works correctly when adding iRule to CoA SNAT Virtual server....&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt;ltm rule &lt;STRONG&gt;CoA-SNAT-iRule&lt;/STRONG&gt; {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; when CLIENT_DATA {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log local0. "Sending CoA to [RADIUS::avp 4 ip4] "&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; node [RADIUS::avp 4 ip4] 1700&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="tlid-translation translation"&gt;&lt;SPAN&gt;ltm virtual ISE-RADIUS-COA-SNAT {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address-status no&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination 10.31.0.0:mps-raft&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip-protocol udp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; mask 255.255.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; profiles {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ise_radius_udp { }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; rules {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;CoA-SNAT-iRule&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source 10.16.36.0/24&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-address-translation {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pool Radius_COA_SnatPool&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type snat&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate-address disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate-port disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlans {&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ISE_INTERNAL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlans-enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vs-index 17&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 10:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679904#M508726</guid>
      <dc:creator>rajczmic</dc:creator>
      <dc:date>2018-08-02T10:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: ISE witt F5 CoA SNAT configuration problem</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679936#M508727</link>
      <description>&lt;P&gt;I am glad it is working for you but still not clear yet why it is not working without using a simpler config to simply translate source IP for packets sent to udp/1700.&amp;nbsp; In addition to the translation statement, I also noticed that in your original config that VS type was &lt;EM&gt;not&lt;/EM&gt; set to &lt;STRONG&gt;ip-forward&lt;/STRONG&gt; which is the primary change from original guide which made all the difference for other customers.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 12:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-witt-f5-coa-snat-configuration-problem/m-p/3679936#M508727</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-08-02T12:06:38Z</dc:date>
    </item>
  </channel>
</rss>

