<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: F5 breaking EAP-TLS :-  Fragmentation/Reassembly Issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/f5-breaking-eap-tls-fragmentation-reassembly-issue/m-p/3481584#M535999</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see following link:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/11363426/ise-behind-load-balancer" title="https://supportforums.cisco.com/discussion/11363426/ise-behind-load-balancer"&gt;https://supportforums.cisco.com/discussion/11363426/ise-behind-load-balancer&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #333333; font-family: Arial, sans-serif; font-size: 14.399999618530273px;"&gt;It is not uncommon to see RADIUS load balancing issues with EAP-TLS related to fragmentation.&amp;nbsp; The typical cases are either 1) failure of load balancer to reassemble large RADIUS packets, for example, TLS with larger key sizes, or 2) dropping of fragments by load balancer that are deemed too small.&amp;nbsp; For first case, both Cisco ACE and F5 LTM should accommodate automatic reassembly if using the standard LB mechanism for RADIUS.&amp;nbsp; LTM does not reassemble FastL4 by default, but that protocol is normally not used and guide does not use that profile for RADIUS. If fragments too small, for both ACE and LTM you would need to change the default minimum fragment size to accept the exceptionally small fragment for reassembly.&amp;nbsp; This can serve as a workaround, but recommend find and eliminate the device causing RADIUS packets to be fragmented below reasonable size.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1.4em; color: #333333; font-family: Arial, sans-serif; font-size: 14.399999618530273px;"&gt;Another common issue in load balancing is failure to understand exact path taken for the entire flow to/from real servers. Often there is a case where ingress packets take one path but responses take another path.&amp;nbsp; This asymmetry often results in packet drops by load balancer or other device in the path."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Feb 2017 19:03:55 GMT</pubDate>
    <dc:creator>howon</dc:creator>
    <dc:date>2017-02-24T19:03:55Z</dc:date>
    <item>
      <title>F5 breaking EAP-TLS :-  Fragmentation/Reassembly Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-breaking-eap-tls-fragmentation-reassembly-issue/m-p/3481583#M535998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an issue where F5 is breaking EAP-TLS and ISE throwing an error "Endpoint Abandoned EAP session"&lt;/P&gt;&lt;P&gt;From the packet capture and troubleshooting we found that packets with a higher payload containing contents of the actual certificate is being fragmented and it seems this fragmented packet is hitting the iRule before being reassembled.&lt;/P&gt;&lt;P&gt;There is a lot of reference made in the past to account for this reassembly but we still cannot find a way around this in F5 running a newer code of 12.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anybody encountered this issue recently and found a way to resolve it ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2017 17:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-breaking-eap-tls-fragmentation-reassembly-issue/m-p/3481583#M535998</guid>
      <dc:creator>umahar</dc:creator>
      <dc:date>2017-02-24T17:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: F5 breaking EAP-TLS :-  Fragmentation/Reassembly Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-breaking-eap-tls-fragmentation-reassembly-issue/m-p/3481584#M535999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see following link:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/11363426/ise-behind-load-balancer" title="https://supportforums.cisco.com/discussion/11363426/ise-behind-load-balancer"&gt;https://supportforums.cisco.com/discussion/11363426/ise-behind-load-balancer&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="color: #333333; font-family: Arial, sans-serif; font-size: 14.399999618530273px;"&gt;It is not uncommon to see RADIUS load balancing issues with EAP-TLS related to fragmentation.&amp;nbsp; The typical cases are either 1) failure of load balancer to reassemble large RADIUS packets, for example, TLS with larger key sizes, or 2) dropping of fragments by load balancer that are deemed too small.&amp;nbsp; For first case, both Cisco ACE and F5 LTM should accommodate automatic reassembly if using the standard LB mechanism for RADIUS.&amp;nbsp; LTM does not reassemble FastL4 by default, but that protocol is normally not used and guide does not use that profile for RADIUS. If fragments too small, for both ACE and LTM you would need to change the default minimum fragment size to accept the exceptionally small fragment for reassembly.&amp;nbsp; This can serve as a workaround, but recommend find and eliminate the device causing RADIUS packets to be fragmented below reasonable size.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1.4em; color: #333333; font-family: Arial, sans-serif; font-size: 14.399999618530273px;"&gt;Another common issue in load balancing is failure to understand exact path taken for the entire flow to/from real servers. Often there is a case where ingress packets take one path but responses take another path.&amp;nbsp; This asymmetry often results in packet drops by load balancer or other device in the path."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2017 19:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-breaking-eap-tls-fragmentation-reassembly-issue/m-p/3481584#M535999</guid>
      <dc:creator>howon</dc:creator>
      <dc:date>2017-02-24T19:03:55Z</dc:date>
    </item>
  </channel>
</rss>

