<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: F5 RADIUS Device Admin using ISE RADIUS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539649#M537111</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Hsing-Tsu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'm specifically after is an F5 persistence setup when using ISE for both network access and device administration purposes (RADIUS only).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the F5 &amp;amp; ISE Deployment guide which covers network access (not device admin), Calling Station ID is a recommended persistence method with a fall back in place (Eg. Source IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I've found is that with Cisco WLCs, device admin RADIUS requests don't contain the Calling Station ID, causing the fall back method to be hit, which then causes all new requests from the WLC (including network access requests) to stick to one ISE PSN.&amp;nbsp; With enough load from the WLC, this has the potential to overload the PSN rather than spread the load amongst the PSN pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any Cisco recommended and/or tested persistence method for device admin in a Load Balanced setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Nov 2016 06:29:18 GMT</pubDate>
    <dc:creator>dvan</dc:creator>
    <dc:date>2016-11-03T06:29:18Z</dc:date>
    <item>
      <title>F5 loadbalance on RADIUS + T+</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539647#M537107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any published best practices documents or guides for performing Cisco Device Administration against ISE via RADIUS in an F5 LB setup? Have searched around with no luck so far...&amp;nbsp; The current F5 &amp;amp; ISE deployment guide covers network access only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Denis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2016 15:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539647#M537107</guid>
      <dc:creator>dvan</dc:creator>
      <dc:date>2016-11-02T15:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: F5 RADIUS Device Admin using ISE RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539648#M537109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nothing from our product team. Each vendor and products have varied implementations to accept AAA authentications for device administration purposes so please refer to vendor docs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These two F5 links might help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Helvetica;"&gt;&lt;A href="https://devcentral.f5.com/questions/f5-radius-authentication-for-admins"&gt;F5 Radius Authentication for admins&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Helvetica;"&gt;&lt;A href="https://support.f5.com/kb/en-us/solutions/public/14000/300/sol14324.html"&gt;SOL14324 - Using F5 vendor-specific attributes with RADIUS authentication (11.x -12.x)&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Helvetica;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Helvetica;"&gt;You may use &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-70352"&gt;dictionary.f5&lt;/A&gt; to import the F5 VSAs to ISE.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2016 18:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539648#M537109</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-11-02T18:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: F5 RADIUS Device Admin using ISE RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539649#M537111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Hsing-Tsu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I'm specifically after is an F5 persistence setup when using ISE for both network access and device administration purposes (RADIUS only).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the F5 &amp;amp; ISE Deployment guide which covers network access (not device admin), Calling Station ID is a recommended persistence method with a fall back in place (Eg. Source IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I've found is that with Cisco WLCs, device admin RADIUS requests don't contain the Calling Station ID, causing the fall back method to be hit, which then causes all new requests from the WLC (including network access requests) to stick to one ISE PSN.&amp;nbsp; With enough load from the WLC, this has the potential to overload the PSN rather than spread the load amongst the PSN pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any Cisco recommended and/or tested persistence method for device admin in a Load Balanced setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2016 06:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539649#M537111</guid>
      <dc:creator>dvan</dc:creator>
      <dc:date>2016-11-03T06:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: F5 RADIUS Device Admin using ISE RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539650#M537113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct that T+ not relying calling-station-Id. I believe it would work to load balance based on the field "remote address". &lt;A href="https://community.cisco.com//u1/28477"&gt;chyps&lt;/A&gt; may comment on this further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, are you not separating PSNs for RADIUS and T+?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2016 13:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539650#M537113</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-11-03T13:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: F5 RADIUS Device Admin using ISE RADIUS</title>
      <link>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539651#M537115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand the issue correctly, no TACACS+ involved, just user and device admin--both using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The F5 should be matching on more specific record, so LTM should not be reverting all sessions based on source IP only.&amp;nbsp; If seeing issue for any new connections then we may need to work with F5 to see best way to prevent this from occurring, and only leverage existing IP-based persist entry when Calling-Station-ID is not present.&amp;nbsp;&amp;nbsp; For some NADs it is possible to populate the Calling-Station-Id with the client IP so that should allow persist on client IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another option may be to fallback to RADIUS username, NAS Port ID, NAS Port Type, etc, such that you are able to distinguish and persist device admin auth requests from network access requests.&amp;nbsp; For example, on my switch, a RADIUS auth via SSH to switch yields: &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Calling-Station-ID: Admin client IP address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Nas-Port-Id: tty2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Nas-Port-Type: Virtual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2016 17:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/f5-loadbalance-on-radius-t/m-p/3539651#M537115</guid>
      <dc:creator>Craig Hyps</dc:creator>
      <dc:date>2016-11-03T17:22:02Z</dc:date>
    </item>
  </channel>
</rss>

