<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE load-balancing with multiple interfaces. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575849#M529388</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;/P&gt;&lt;P&gt;Thanks &lt;A href="https://community.cisco.com//u1/28477"&gt;chyps&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These PSNs won't be issuing COAs for the purpose they are serving, its basic RADIUS ACCEPT/REJECT responses so all good on that side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fact that the ISE node responds on the interface it was received on is good enough for. The &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;gateway for Gig0 is configured using 'ip default-gateway' and the gateway for Gig1 is configured using a static default route 'ip route 0.0.0.0 0.0.0.0....' command - is that correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Jun 2017 06:17:41 GMT</pubDate>
    <dc:creator>dazza_johnson</dc:creator>
    <dc:date>2017-06-01T06:17:41Z</dc:date>
    <item>
      <title>ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575847#M529386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys, need some feedback from 'the crew' on this..... I read the Cisco Live preso on load-balancing and just wanted to confirm the theory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some PSNs behind an F5 load-balancer. I want to load-balance only the RADIUS traffic to the PSNs, with all management traffic not going through the F5 LTM. I thought I could do this using the configuration below. Basically, Gig0 is the management IP and it uses a default gateway of 10.1.1.254 (does not go through the F5 LTM). The Gig1 IP address is behind a load-balancer and return traffic is sent to gateway 192.168.100.100 which is the F5 LTM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is it true that traffic (in ISE v2) always responds on the interface it was received on? i.e. RADIUS traffic received on interface Gig1 would respond on Gig1 using the Gig1 gateway 192.168.100.100&lt;/LI&gt;&lt;LI&gt;Is the config below correct? The gateway for Gig0 is configure using 'ip default-gateway' and the gateway for Gig1 is configured using a static default route 'ip route 0.0.0.0 0.0.0.0....' command?&lt;/LI&gt;&lt;LI&gt;Is this a valid/recommended design?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ise-ccie/admin#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;interface GigabitEthernet 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ip address 10.1.1.2 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;interface GigabitEthernet 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; ip address 192.168.100.2 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip default-gateway 10.1.1.254&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ip route 0.0.0.0 0.0.0.0 gateway 192.168.100.100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;! &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ise-ccie/admin# sh ip route&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Iface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;-----------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -----&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;192.168.100.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;10.1.1.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;default&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.254&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;ise-ccie/admin# &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 May 2017 03:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575847#M529386</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-05-31T03:57:36Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575848#M529387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is the behavior outlined in the reference version of BRKSEC-3699.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For outbound traffic initiated by PSN, the static route table will be referenced with the default-gateway serving as the true default in absence of more specific route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Design is valid, but cannot vouch as recommended design since that is based on your specific needs.&amp;nbsp; If it meets your networking and security requirements, then that is the key.&amp;nbsp; However, in any design involving multiple interfaces and goal is traffic separation, there is likely to be some undo complexity for certain use cases.&amp;nbsp; For example, although RADIUS AAA may follow desired path with the above configuration, you may be challenged with restricting RADIUS CoA to eth1.&amp;nbsp; Since the target for CoA is the NAD, you would need a way to consolidate all NAD IP addresses for static routing (possibly via a loopback pool unique to all NADs and set as RADIUS source interface). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This requirement may be difficult to achieve.&amp;nbsp; Therefore, it may be a smaller target list to identify all IP addresses/networks which are required for management and make eth1 the default-gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 May 2017 07:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575848#M529387</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-05-31T07:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575849#M529388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@&lt;/P&gt;&lt;P&gt;Thanks &lt;A href="https://community.cisco.com//u1/28477"&gt;chyps&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These PSNs won't be issuing COAs for the purpose they are serving, its basic RADIUS ACCEPT/REJECT responses so all good on that side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fact that the ISE node responds on the interface it was received on is good enough for. The &lt;SPAN style="color: #3d3d3d; font-family: arial; font-size: 12px;"&gt;gateway for Gig0 is configured using 'ip default-gateway' and the gateway for Gig1 is configured using a static default route 'ip route 0.0.0.0 0.0.0.0....' command - is that correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jun 2017 06:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575849#M529388</guid>
      <dc:creator>dazza_johnson</dc:creator>
      <dc:date>2017-06-01T06:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575850#M529389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could go as far as adding a static 0.0.0.0 route out GE0 in event that you change the global default gateway.&amp;nbsp; This way, any changes to global default will result in symmetric traffic for externally-initiated requests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that CoA tends to occur for many reasons, so don't discount its use.&amp;nbsp; Examples:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;All guest flows (Hotspot, CWA, ...)&lt;/LI&gt;&lt;LI&gt;Posture&lt;/LI&gt;&lt;LI&gt;BYOD&lt;/LI&gt;&lt;LI&gt;MDM&lt;/LI&gt;&lt;LI&gt;Profile changes&lt;/LI&gt;&lt;LI&gt;ANC/EPS/RTC triggered by external server via API/pxGrid&lt;/LI&gt;&lt;LI&gt;TC-NAC&lt;/LI&gt;&lt;LI&gt;Easy Connect&lt;/LI&gt;&lt;LI&gt;Endpoint Purge/Deletions&lt;/LI&gt;&lt;LI&gt;Admin triggered via UI/API&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jun 2017 15:00:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575850#M529389</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2017-06-01T15:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575851#M529390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a similiar Design, but when i upgraded from 2.3 to 2.4 i wasn't able to access ISE Management. &lt;/P&gt;&lt;P&gt;Version 2.3:&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;interface GigabitEthernet 0&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ip address &lt;SPAN class="s1"&gt;172.16.1.33 &lt;/SPAN&gt;255.255.255.0&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 address autoconfig&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 enable&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;interface GigabitEthernet 1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ip address &lt;SPAN class="s2"&gt;172.17.0.33&lt;/SPAN&gt; 255.255.255.0&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 address autoconfig&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 enable&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;ip name-server 172.16.1.12 172.16.1.13&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;ip default-gateway &lt;SPAN class="s1"&gt;172.16.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;ip route 0.0.0.0 0.0.0.0 gateway &lt;SPAN class="s2"&gt;172.17.0.254&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;I had to change Routing for Version 2.4 to:&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;interface GigabitEthernet 0&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ip address &lt;SPAN class="s1"&gt;172.16.1.33 &lt;/SPAN&gt;255.255.255.0&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 address autoconfig&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 enable&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;interface GigabitEthernet 1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ip address &lt;SPAN class="s2"&gt;172.17.0.33 &lt;/SPAN&gt;255.255.255.0&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 address autoconfig&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp; ipv6 enable&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;ip name-server 172.16.1.12 172.16.1.13&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;ip default-gateway &lt;SPAN class="s2"&gt;172.17.0.254&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;ip route 0.0.0.0 0.0.0.0 gateway &lt;SPAN class="s1"&gt;172.16.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p2"&gt;can somebody explain what happened?&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p2"&gt;thx Wladimir&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2018 11:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575851#M529390</guid>
      <dc:creator>wladimir.gruenemaier</dc:creator>
      <dc:date>2018-07-17T11:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575852#M529391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You changed your ip default gateway from GE0 to GE1 and management traffic must go in/out GE0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2018 15:54:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3575852#M529391</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2018-07-17T15:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3672888#M529392</link>
      <description>&lt;P&gt;Hi Craig,&lt;/P&gt;
&lt;P&gt;i had to change it that way, otherwise i was not able to reach the management anymore. The strange thing is i had another Customer, where i upgraded from 2.3 to 2.4 and there i had no issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Wladimir&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 09:58:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/3672888#M529392</guid>
      <dc:creator>wladimir.gruenemaier</dc:creator>
      <dc:date>2018-07-24T09:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: ISE load-balancing with multiple interfaces.</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/4475364#M569973</link>
      <description>&lt;P&gt;Hi Craig,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bit late, but stumbled upon your excellent explanation. However I couldn't find anything in the presentation you mentioned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally figured out it should be BRKSEC-3432:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/apjc/docs/2019/pdf/BRKSEC-3432.pdf" target="_blank"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/apjc/docs/2019/pdf/BRKSEC-3432.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 09:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-load-balancing-with-multiple-interfaces/m-p/4475364#M569973</guid>
      <dc:creator>bart.t</dc:creator>
      <dc:date>2021-09-28T09:17:52Z</dc:date>
    </item>
  </channel>
</rss>

