<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Deployment in Azure - Nightmare experience! in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216907#M592788</link>
    <description>&lt;P&gt;I understand that and have seen that article numerous times but Microsoft are saying they can only enable out of order fragments for VMs with a public IP attached to the NIC, this isn't applicable to us because its internal traffic it doesn't go over the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 Oct 2024 15:30:06 GMT</pubDate>
    <dc:creator>InfraISE2020</dc:creator>
    <dc:date>2024-10-29T15:30:06Z</dc:date>
    <item>
      <title>Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216248#M592723</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Has anyone been able to successfully deploy ISE in Azure using expressroute from on-premise to the cloud.&lt;/P&gt;&lt;P&gt;We have had ISE running in Azure for about 3-4 months now and have noticed a large amount of fragmentation using EAP-TLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Cisco guide suggests a fix has been applied in East Asia and West Central US however it's not been applied to UK South where our VMs are located. We have also raised this with Microsoft support however they cannot tell us what fix this is or when it will be rolled out to our region.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We enquired about the "enable allow out-of-order-fragments" option however they said this could only be applied if the traffic is coming from the internet, not via expressroute or VPN which is obviously not going to work as we wouldn't send radius traffic straight over the internet! Other requirements include deploying VMs in a brand-new empty subscription and deploying to a Dv4 VM, again this is not possible as the VMs are already in use within an existing subscription.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's incredibly frustrating as Cisco can't seem to provide much info on the workaround and Microsoft are just fobbing us off by saying that the information is from Cisco and not from them!&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd be grateful if other members on this forum have successfully deployed ISE in Azure with connectivity via ER or VPN and not seen the fragmentation issues when using EAP-TLS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 15:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216248#M592723</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2024-10-28T15:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216277#M592732</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Welcome to the jungle, it is a well-known challenge. Look here, work with Microsoft and move your VM's on Gen7 HW:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.ciscolive.com/on-demand/on-demand-library.html?zid=pp&amp;amp;search.event=1716482947962001yag9&amp;amp;search=BRKSEC-2039#/session/1717269125663001tXab" target="_blank"&gt;https://www.ciscolive.com/on-demand/on-demand-library.html?zid=pp&amp;amp;search.event=1716482947962001yag9&amp;amp;search=BRKSEC-2039#/session/1717269125663001tXab&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 16:38:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216277#M592732</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-28T16:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216673#M592763</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/295226"&gt;@Cristian Matei&lt;/a&gt;&amp;nbsp;- the errors on that webinar are exactly what we are seeing in Azure. Microsoft just keep fobbing us off with the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Customer is receiving out-of-order fragments via an instance level public IP from the internet. ExpressRoute and VPN first party gateways are not supported. IP fragments do not work in load balancing scenarios, so ensure this is a public IP attached directly to a VM.&lt;/LI&gt;&lt;LI&gt;Customer requires an empty subscription.&lt;/LI&gt;&lt;LI&gt;Customer wishes to deploy a VM SKU that is compatible with hardware that supports out-of-order fragments. Typically, this is Dv4 and earlier (the newest SKUs such as Dv5 do NOT support this).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Are you aware of anyone who has successfully got Microsoft to fix this issue? It would be good to know who the people are in the Cisco engineering team who have worked on Microsoft with this are so maybe they could shed some light on whats required.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 10:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216673#M592763</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2024-10-29T10:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216785#M592776</link>
      <description>&lt;P&gt;Documented at &lt;A href="https://cs.co/ise-berg#azure" target="_blank"&gt;https://cs.co/ise-berg#azure&lt;/A&gt; and&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 0;"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonCloudOverview.html" target="_blank" rel="noopener nofollow noreferrer"&gt;Deploy Cisco ISE Natively on Cloud Platforms&lt;/A&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 0;"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonAzureServices.html" target="_self" rel="nofollow noopener noreferrer"&gt;Cisco ISE on Azure Cloud Services&lt;/A&gt;
&lt;UL&gt;
&lt;LI style="margin-bottom: 0;"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonAzureServices.html#concept_gd4_rzr_tsb" target="_self" rel="nofollow noopener noreferrer"&gt;Known Limitations of Cisco ISE in Microsoft Azure Cloud Services&lt;/A&gt; - includes details about the need for allow out-of-order fragments for UDP&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 29 Oct 2024 13:25:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216785#M592776</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-10-29T13:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216819#M592778</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;i have also logged a support ticket with Cisco to see if they can provide any information. My account manager at Microsoft has asked me to find out exactly what fix has been applied in East Asia and West Central US as it specifically highlights this in the deployment guide, do you know what this fix is?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Due to this known issue, do one of the following:&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;EM&gt;Select regions where Azure Cloud has already implemented the fixes: East Asia (eastasia) and West Central US (westcentralus).”&lt;/EM&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 29 Oct 2024 14:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216819#M592778</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2024-10-29T14:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216886#M592782</link>
      <description>&lt;P&gt;This is 100% a Microsoft Azure issue. You will need to ask them. This problem does not exist in other cloud providers.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 15:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216886#M592782</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-10-29T15:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216892#M592783</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;I absolutely agree however the documentation from Cisco says it's been resolved in 2 regions but nobody can tell me what the resolution was so I can ask Microsoft to make the same fix in UK South. I have asked senior engineers at Microsoft but they cannot seem to find out what this supposed fix is so I am hoping someone at Cisco can point me in the right direction!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 15:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216892#M592783</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2024-10-29T15:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216902#M592786</link>
      <description>&lt;P&gt;From &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/ISE_on_Cloud/b_ISEonCloud/m_ISEonAzureServices.html#concept_gd4_rzr_tsb" target="_self" rel="nofollow noopener noreferrer"&gt;Known Limitations of Cisco ISE in Microsoft Azure Cloud Services&lt;/A&gt; :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;In Azure, a networking virtual network stack drops out-of-order fragments without forwarding them to the end virtual machine host. This design aims to address the network security vulnerability FragmentSmack, as documented in &lt;A class="xref" href="https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-tcpip-performance-tuning#azure-and-fragmentation" target="_blank" rel="noopener"&gt;Azure and fragmentation&lt;/A&gt;.&lt;/P&gt;
&lt;P class="p"&gt;Cisco ISE deployments on Azure typically leverage VPN solutions like Dynamic Multipoint Virtual Private Networks (DMVPN) and Software-Defined Wide Area Networks (SD-WAN), where the IPsec tunnel overheads can cause MTU and fragmentation issues. In such scenarios, Cisco ISE may not receive complete RADIUS packets and an authentication failure occurs without triggering a failure error log.&lt;/P&gt;
&lt;P class="p"&gt;Due to this known issue, do one of the following:&lt;/P&gt;
&lt;OL class="ol"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Select regions where Azure Cloud has already implemented the fixes: East Asia (eastasia) and West Central US (westcentralus).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Cisco ISE customers should raise an Azure support ticket. &lt;STRONG&gt;Microsoft has agreed to take the following actions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL class="ol" type="a"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG&gt;Pin the subscription to ensure all instances within that subscription are deployed on hardware generation 7.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG&gt;Enable the "allow out-of-order fragments" option, which allows fragments to pass through to the destination instead of being dropped.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 15:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216902#M592786</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-10-29T15:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216907#M592788</link>
      <description>&lt;P&gt;I understand that and have seen that article numerous times but Microsoft are saying they can only enable out of order fragments for VMs with a public IP attached to the NIC, this isn't applicable to us because its internal traffic it doesn't go over the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 15:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216907#M592788</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2024-10-29T15:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216930#M592791</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Mate, as an engineer I feel your pain; my scenarios were done via Internet, being aware of the challenge. I suggest open a TAC case to get the info you're looking for from Cisco, someone has to know; otherwise, if you're stuck and can't move VM's to a region with the fix, try deployment over Internet and use IPsec tunnels for RADIUS packets or RADIUS over DTLS.&lt;/P&gt;
&lt;P&gt;Good luck,&lt;/P&gt;
&lt;P&gt;Cristian.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 16:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5216930#M592791</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2024-10-29T16:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5269376#M595402</link>
      <description>&lt;P&gt;I found most cisco devices fragment incorrectly, but I managed to work around the fragmentation issue in azure by implementing the following&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-33/220568-configure-ise-3-3-native-ipsec-to-secure.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-33/220568-configure-ise-3-3-native-ipsec-to-secure.html&lt;/A&gt;&lt;BR /&gt;Essentially this hides the out of order fragments within IPSEC so Azure is none the wiser.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 08:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5269376#M595402</guid>
      <dc:creator>Damon Kalajzich</dc:creator>
      <dc:date>2025-03-10T08:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5271221#M595480</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/87076"&gt;@Damon Kalajzich&lt;/a&gt;&amp;nbsp;, thanks for your feedback, how would you achieve this if you're using Cisco Meraki for Wireless 802.1x?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Mar 2025 08:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5271221#M595480</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2025-03-14T08:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5271829#M595502</link>
      <description>&lt;P&gt;Sorry I don't have any experience with Meraki,&amp;nbsp; to work it would require the device (NAD) sending the radius request to have the ability to configure a ipsec tunnel to ISE.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Mar 2025 23:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5271829#M595502</guid>
      <dc:creator>Damon Kalajzich</dc:creator>
      <dc:date>2025-03-16T23:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273424#M595557</link>
      <description>&lt;P&gt;Is anyone else dealing with this problem still? We're currently in the testing phase of an ISE deployment in Azure and I believe we're encountering this exact situation.&lt;/P&gt;&lt;P&gt;However, the Microsoft agreement no longer seems to be in place because our consistent entreaties to their support engineers seem to be in vain. Something may have changed on their side, but they're saying the 'enable udp out of order fragments' solution is no longer supported (this is the response even after account rep involvement).&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't have to remind anyone here, but it throws a major wrench in your plans when core tenet networking laws, such as udp packet reassembly, are no longer something you can reliably account for when implementing a solution.&lt;/P&gt;&lt;P&gt;A lot of the threads on this topic seem to just end or they're older so I'm wondering if anyone has recently experienced this and has successfully developed a creative workaround?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I think the ipsec tunnel is an interesting idea but it doesn't seem to scale well if you have a lot of NADs and the maintenance, difficulty in troubleshooting, etc. seems to be a major consideration.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;We've also been down the radius-dtls path, which seemed promising. However some of our equipment, like Meraki, only implemented Radsec - so that's out the window (at least for our specific situation).&lt;/LI&gt;&lt;LI&gt;Also, I'm wondering if anyone approached this from the MTU perspective? For example, restricting the MTU at the OS level of client PCs to something like 1200 to avoid fragmentation from the start?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Just trying to come up with some ideas and explore all the contingency plans. I'm interested to see if anyone else is still fighting this and if you're having any success.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 11:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273424#M595557</guid>
      <dc:creator>CitizenGenet</dc:creator>
      <dc:date>2025-03-20T11:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273696#M595566</link>
      <description>&lt;P&gt;I have been dealing with it the last few months, and yes it is difficult to get MS to acknowledge this.&amp;nbsp; I got to the point where I was advised that MS could enable this feature for me, but...&lt;BR /&gt;It can only been enabled on a empty subscription, They pin any new resources added to the subscription to a specific hardware cluster with the feature enabled.&amp;nbsp; There are other caveats which would mean a complete re-architect of our azure deployment, like you can't use a Azure VPN gateway or Azure Firewall in the path of the traffic to ISE, as these can't be pinned to the specif hardware with the feature enabled.&lt;BR /&gt;&lt;BR /&gt;This is why I have gone down the path of using IPSEC from the NAD to ISE to hide the out of order fragments that cisco devices send from the azure network stack.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 22:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273696#M595566</guid>
      <dc:creator>Damon Kalajzich</dc:creator>
      <dc:date>2025-03-20T22:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273697#M595567</link>
      <description>&lt;P&gt;My MS case number is&amp;nbsp;2501270030001062 if you want to pass that on to your MS engineer so they can see it is still a option on their side, but I do note that my MS engineer did say he believed that the option is going to be phased out over time.&amp;nbsp; As all their new VM SKU's with advanced networking don't support the option.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 22:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273697#M595567</guid>
      <dc:creator>Damon Kalajzich</dc:creator>
      <dc:date>2025-03-20T22:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273783#M595568</link>
      <description>&lt;P&gt;I am in the same position as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1467189"&gt;@CitizenGenet&lt;/a&gt;&amp;nbsp;as we use Cisco Meraki for wireless and&amp;nbsp;&lt;SPAN&gt;radius-dtls is not supported on Meraki and EAP-DTLS is not supported on Cisco ISE so were are pretty stuck at the moment. I think Cisco and Microsoft are aware of the issue and trying to resolve it but nothing seems close. One of the suggestions was to use FastPath over expressroute (additional cost) but that doesn't work with virtual WANs so thats not an option either.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 07:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273783#M595568</guid>
      <dc:creator>InfraISE2020</dc:creator>
      <dc:date>2025-03-21T07:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273862#M595577</link>
      <description>&lt;P&gt;Thanks for providing that case number, Damon – that’s very helpful but it’s not inspiring reading some of the caveats involved in the answer you received from Microsoft.&lt;/P&gt;&lt;P&gt;Are you having success with your IPSEC idea? Is it working as expected and you’re getting consistent authentications?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 12:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5273862#M595577</guid>
      <dc:creator>CitizenGenet</dc:creator>
      <dc:date>2025-03-21T12:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5274378#M595595</link>
      <description>&lt;P&gt;we have the IPSEC solution working on 5 of our 7 9800 WLC's for some reason we have 2 9800 WLC where the IKE service is not starting, TAC investigating.&lt;BR /&gt;There are also some caveats with the ISE solution to be aware of.&amp;nbsp; It requires a new Interface and IP on the ISE node to service the IPSEC and radius connection.&amp;nbsp; G0 can't be used.&amp;nbsp; The traffic selection on what to send via the IPSEC tunnel is done via a static route, so all communication from the ISE node to the NAD will be sent via the tunnel, even if you are hitting ISE via the original interface IP (non ipsec tunnel IP) so it all communication not just radius traffic.&amp;nbsp; so if migrating radius also migrate tacacs and COA etc,&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 00:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5274378#M595595</guid>
      <dc:creator>Damon Kalajzich</dc:creator>
      <dc:date>2025-03-24T00:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Deployment in Azure - Nightmare experience!</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5315574#M597539</link>
      <description>&lt;P&gt;I've been working on this for a few months and just wanted to provide an update on the experience, in case it helps someone else in this position.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Everyone's topology or connection into Azure will be different. In my scenario, there are NVAs deployed in Azure that terminate SDWAN tunnels or from our on-premises environment. Based on other posts related to this topic, this seems to be an uncommon configuration but it creates an opportunity to fix this without Microsoft enabling the allow out-of-order udp fragments flag.&lt;/P&gt;&lt;P&gt;At these NVAs (e.g. routers, firewalls) you can configure packet reassembly that will take the out-of-order udp RADIUS packets (after traversing the internet) and put them back in order before they leave the outgoing interface and traverse the rest of your Azure environment. For Cisco, the command ip virtual-reassembly in/out will accomplish this goal. For other vendors, like Palo Alto, they seem to automatically reassemble fragments.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In regard to Microsoft's enable out-of-order udp fragments flag, that was a longer process. Ultimately, this flag was enabled for one Vnet. We didn't have to empty our subscription or rebuild our servers or anything like that. However, we were told this flag is not supported if you have other Microsoft based objects in your Azure traffic path, like a standard load balancer, firewall, or vHUB connection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Jul 2025 08:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-deployment-in-azure-nightmare-experience/m-p/5315574#M597539</guid>
      <dc:creator>CitizenGenet</dc:creator>
      <dc:date>2025-07-31T08:54:38Z</dc:date>
    </item>
  </channel>
</rss>

