<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5083616#M589133</link>
    <description>&lt;P&gt;I hate messing around with MTU sizes ... mostly because I don't know the best way to solve this (i.e. if, and what value to set the MTU, and in which places in the network). Is the Fortigate configured to drop UDP fragments? I don't see how else ISE (whose GigE interface has MTU=1500) is supposed to handle a large certificate exchange greater than1500 bytes without fragmentation.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2024 06:30:14 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-04-30T06:30:14Z</dc:date>
    <item>
      <title>[CISCO ISE][12935 ] Supplicant stopped responding to ISE during EAP-TL</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5078558#M589025</link>
      <description>&lt;P&gt;Hello Everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am contacting you all because i don't seem to find the needed information to resolve my issues, even though there are many similar topic as mine with the same error.&lt;/P&gt;&lt;P&gt;We have an infrastructure using FTD ASA5506 with switch CISCO&amp;nbsp;WS-C2960S-48TS-L, everything was working fine.&lt;/P&gt;&lt;P&gt;We have recently replace our firewall (since it's not upgradable anymore) with a FortiGate 60F.&lt;/P&gt;&lt;P&gt;Everything is working fine except for the user's devices that can't authenticate on the switch and receive the correct VLAN ID.&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;For some reason we get the following error on the CISCO ISE :&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PiotrWnekowicz_0-1714053629611.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216823iC3CBC00AEDAC0945/image-size/medium?v=v2&amp;amp;px=400" role="button" title="PiotrWnekowicz_0-1714053629611.png" alt="PiotrWnekowicz_0-1714053629611.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I hope you can help us on this matter&lt;/P&gt;&lt;P&gt;Let me know what information i can give you to help us resolve this problem.&lt;/P&gt;&lt;P&gt;Thank you all for your time and help.&lt;/P&gt;&lt;P&gt;Best regard&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5078558#M589025</guid>
      <dc:creator>Shabin ASOKAN</dc:creator>
      <dc:date>2024-04-25T14:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5078915#M589043</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/373134"&gt;@Shabin ASOKAN&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a suspicion that this is related to incorrect MTU size, since the EAP failure mentions there is a breakdown during cert exchange. In a typical EAP cert exchange (client or server) the total size of all certs (Root, Intermediate) tends to be larger than 1500 bytes.&lt;/P&gt;
&lt;P&gt;If the FW was acting as a default gateway for the VLAN that ISE is using for its Gig0 interface, then I am pretty sure that the MTU on that Fortigate interface is greater than 1500 bytes.&amp;nbsp; There is a requirement to ensure that the L3 on the ISE Management VLAN is using an MTU of 1500. Anything bigger than that and the cert exchange will fail, because ISE does not support jumbo frames for its management.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 23:47:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5078915#M589043</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-04-25T23:47:24Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5079240#M589049</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp; you for your reply.&lt;/P&gt;&lt;P&gt;I had read about that and checked the switch MTU which was fine, but did not think of checking the MTU on the firewall.&lt;/P&gt;&lt;P&gt;In our infrastructure context, the ISE is behind an IPsec tunnel, therefore, should it be the WAN interface's MTU that could be the problem ?&lt;/P&gt;&lt;P&gt;So far, here is what i found, WAN has an MTU of 1500 and VPN tunnel has an MTU of 1420 (see SC attached) :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PiotrWnekowicz_0-1714124821828.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/216893iD93A434CEBC96119/image-size/medium?v=v2&amp;amp;px=400" role="button" title="PiotrWnekowicz_0-1714124821828.png" alt="PiotrWnekowicz_0-1714124821828.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;If the MTU is smaller than 1500, could it also be a problem ?&lt;/P&gt;&lt;P&gt;Have a nice day.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 09:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5079240#M589049</guid>
      <dc:creator>Shabin ASOKAN</dc:creator>
      <dc:date>2024-04-26T09:48:14Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5079497#M589059</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Turns out i have found another article in which you explained a few things in the link below :&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/ise-802-1x-auth-error-5440-and-12935/td-p/4891218" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-access-control/ise-802-1x-auth-error-5440-and-12935/td-p/4891218&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What was interesting is the way to figure out the maximum MTU size accepted by the CISCO ISE, you propose to ping the cisco ISE, specifying the MTU size, in my case, the higher i can go is 1470, though my ipsec tunnel interface's MTU is 1420.&lt;/P&gt;&lt;P&gt;Just in case, i brought the MTU size down to 1300 for now, will test it next week since in can't access the remote device at the moment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should i maybe change the WAN interface MTU ?&lt;/P&gt;&lt;P&gt;I will keep you updated on the results next Monday, if this works, it will be a nice win for this end of week after a lot of research.&lt;/P&gt;&lt;P&gt;Thank you for your time and help&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 13:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5079497#M589059</guid>
      <dc:creator>Shabin ASOKAN</dc:creator>
      <dc:date>2024-04-26T13:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5081824#M589103</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;It would seem the change we've done last week hasn't resolved our issue.&lt;/P&gt;&lt;P&gt;I will investigate some more, i only changed the MTU on the IPsec tunnel interface, should I maybe do it as well on the ISP interface ?&lt;/P&gt;&lt;P&gt;I thank you for your help.&lt;/P&gt;&lt;P&gt;Have a nice day.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Apr 2024 09:17:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5081824#M589103</guid>
      <dc:creator>Shabin ASOKAN</dc:creator>
      <dc:date>2024-04-29T09:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5083616#M589133</link>
      <description>&lt;P&gt;I hate messing around with MTU sizes ... mostly because I don't know the best way to solve this (i.e. if, and what value to set the MTU, and in which places in the network). Is the Fortigate configured to drop UDP fragments? I don't see how else ISE (whose GigE interface has MTU=1500) is supposed to handle a large certificate exchange greater than1500 bytes without fragmentation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 06:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5083616#M589133</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-04-30T06:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5087477#M589208</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;for your help and time on this.&lt;/P&gt;&lt;P&gt;I have engaged a discussion with FortiGate, i hope they will help us resolve this issue.&lt;BR /&gt;I'll let you know our find in case it can help someone else.&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 10:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5087477#M589208</guid>
      <dc:creator>Shabin ASOKAN</dc:creator>
      <dc:date>2024-05-02T10:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: [CISCO ISE][12935 ] Supplicant stopped responding to ISE during EA</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5268637#M595369</link>
      <description>&lt;P&gt;Just checking if you got a solution as i am facing the same issue.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 11:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-12935-supplicant-stopped-responding-to-ise-during-eap/m-p/5268637#M595369</guid>
      <dc:creator>durga-prasad</dc:creator>
      <dc:date>2025-03-07T11:12:26Z</dc:date>
    </item>
  </channel>
</rss>

