<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure Cloud deployment - fragmentation issues in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5265263#M595237</link>
    <description>&lt;P&gt;See&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/8021x/220576-eap-fragmentation-implementations-and-be.html" target="_blank" rel="noopener nofollow noreferrer"&gt;EAP Fragmentation Implementations and Behavior&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;There are multiple levels of fragmentation involved and one of the problems is that the Windows native supplicant uses large EAP messages (1470 bytes), which forces the IP fragmentation. This is a hardcoded setting which cannot be changed.&lt;BR /&gt;The result of the fragmentation is that the last packet is smaller, leading to a faster transmit, and therefore received out-of-sequence.&lt;/P&gt;
&lt;P&gt;Cisco has no control over how the Windows supplicant behaves.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Feb 2025 22:31:52 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2025-02-26T22:31:52Z</dc:date>
    <item>
      <title>Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250160#M594354</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have my ISE cluster deployed in Microsoft Azure and I have spent for over a week to troubleshoot a certain issue that I'm having. Unfortunately it seems that Azure is causing this and I'm wondering what everyone does to mitigate this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue:&lt;/P&gt;&lt;P&gt;Access for 802.1X supplicants is very unreliable, sometimes it works but other times it fails 802.1X and the supplicants do not want to authenticate anymore. The 802.1X method is PEAP with EAP-TLS as inner-method. Checking the logs on the PAN are showing the following in these scenarios:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Failure Reason: 5440 Endpoint abandoned EAP Session and started new&lt;/LI&gt;&lt;LI&gt;Failure Reason 5411 Supplicant stopped responding to ISE&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I can reproduce this behavior by simply cycling the switch port a few times, it just 'breaks' again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After taking several pcaps and analyzing them, it seems that the traffic is fragmenting sometimes, which might make sense since I'm trying to achieve certificate based authentication. I've read multiple sources and it seems that Microsoft Azure is dropping out of order UDP traffic and that this can cause the two failure messages that I listed above.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've decided to test this and deployed a PSN node outside of Microsoft Azure and joined this node to my cluster. All clients that I point towards PSN authenticate perfectly fine. The PAN's alert reports also only report that the dropped radius packets are from my Azure PSN and NOT from the locally deployed PSN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I have read about the following options;&lt;/P&gt;&lt;P&gt;- Get Microsoft to enable '&lt;SPAN&gt;allow out-of-order fragments' option&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-&amp;nbsp;Pin the subscription to ensure all instances within that subscription are deployed on hardware generation 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The thing is that Microsoft seem to require that the Azure subscription needs to be empty. I think this is quite a PITA, since almost no one has an empty subscription and creating a new one is not always an option.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'm wondering if something can be done outside of Azure to improve this situation. Would adjusting the MTU of the Cisco ISE PSN itself help for example?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 13:32:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250160#M594354</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-21T13:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250354#M594371</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/eap-tls-to-azure-ise-is-failing-but-not-with-an-ise-node-in-the/m-p/4783440#M580104" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/eap-tls-to-azure-ise-is-failing-but-not-with-an-ise-node-in-the/m-p/4783440#M580104&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 17:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250354#M594371</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-01-21T17:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250702#M594390</link>
      <description>&lt;P&gt;There are multiple layers of fragmentation at play here. The main culprit is the large EAP messages used by the Windows supplicant. Changing the MTU on the PSNs will not make a difference for that.&lt;/P&gt;
&lt;P&gt;See the discussion here for more details -&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/azure-packet-fragmentation/td-p/5205223" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/azure-packet-fragmentation/td-p/5205223&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 04:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250702#M594390</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-01-22T04:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250870#M594402</link>
      <description>&lt;P&gt;Thanks for your answer,&lt;/P&gt;&lt;P&gt;So, fragmentation using a Windows supplicant is unavoidable if I understand correctly?&amp;nbsp; I'm currently trying to get in touch with Microsoft support to see what they can do for me.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another idea that I had is to to use Radius over TLS (Radsec), unfortunately it seems that ISE only supports Radius over DTLS, which is probably not solving this since its also UDP.&amp;nbsp; I guess I can perform another test by deploying a PSN in one of the two regions that have the fix applied already and see if it works properly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do other public cloud providers also drop out of order UDP in your experience or is this just Azure?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 10:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250870#M594402</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-22T10:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250874#M594403</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems that I cannot do much without Microsoft enabling that flag.&amp;nbsp; Quite a bummer since its very inconvenient that the requirement is that the Azure subscription needs to be empty.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 10:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5250874#M594403</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-22T10:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5251237#M594420</link>
      <description>&lt;P&gt;I worked with a large global resources company to migrate their ISE cluster from on-prem to AWS, which does not have this issue. As far as I know, MS is the only supported cloud provider that has this issue.&lt;/P&gt;
&lt;P&gt;For customers I speak with that are planning the move to public cloud and have multi-cloud environments, I strongly recommend deploying ISE in AWS instead of Azure for this reason.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 23:07:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5251237#M594420</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2025-01-22T23:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5252073#M594452</link>
      <description>&lt;P&gt;We also have this problem... We read on this Microsoft&amp;nbsp; Q&amp;amp;A link below, that the paramater&amp;nbsp;&lt;STRONG&gt;enable-udp-fragment-reordering &lt;/STRONG&gt;&lt;SPAN&gt;is only possible to enable on a new subscription without any resources deployed on it:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/996062/azure-drops-my-udp-fragmentated-packets-when-they" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/answers/questions/996062/azure-drops-my-udp-fragmentated-packets-when-they&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Could you update this thread if you find a way to do this?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 09:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5252073#M594452</guid>
      <dc:creator>danielecappelletti</dc:creator>
      <dc:date>2025-01-24T09:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5252238#M594461</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1723246"&gt;@danielecappelletti&lt;/a&gt;&amp;nbsp;Microsoft can only do that only some limited number of SKUs and not all. They can't do it for ISE machines SKUs&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 14:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5252238#M594461</guid>
      <dc:creator>PSM</dc:creator>
      <dc:date>2025-01-24T14:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5252525#M594476</link>
      <description>&lt;P&gt;If you have a few NADs, then you could build a IPSEC tunnel all the way from a NAD to ISE as shown below:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/222720-configure-ipsec-tunnel-between-cisco-wlc.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/222720-configure-ipsec-tunnel-between-cisco-wlc.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;this is with WLC, but switches like 9300 also support ipsec tunnels.. When you use a ipsec tunnel, the fragmented packets are encapsulated in the tunnel , so Azure doesnt see it (altleast that is what i think ) as the tunnel terminates on ISE. But this may not be scalable for 100s of NADs...&lt;/P&gt;
&lt;P&gt;Also, you say it works sometimes and fails intermittenly.. i havent looked into the details of the problem of out of order. . Have you actually taken packet captures on the supplicant/NAD and also at Azure to see if they are truly out of order ?&amp;nbsp; How do you connect to Azure ? do you have multiple paths which is causing out of order or is it because of the fragmentation process which on a device, which may cause a smaller fragment (compared to a larger) getting send first (and thus causing out of order ? it would be good to understand where it is going out of order and see if we can mitigate that.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2025 08:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5252525#M594476</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2025-01-25T08:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253236#M594533</link>
      <description>&lt;P&gt;Thanks for your reply,&lt;/P&gt;&lt;P&gt;Today I have made some other captures but I'm starting to get a bit lost to be honest. I have made two pcaps; one on the office SD-WAN appliance (LAN interface), and one on the ISE PSN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;SD-WAN:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jagermeister_0-1737987199376.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238597i1CADE17FF58EFBEE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jagermeister_0-1737987199376.png" alt="Jagermeister_0-1737987199376.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PSN:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jagermeister_1-1737987248295.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238598i00F2C62BD1E351D4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jagermeister_1-1737987248295.png" alt="Jagermeister_1-1737987248295.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;taking radius session ID 153 ( identification frame 2e7a) for example&lt;/P&gt;&lt;P&gt;LAN SD-WAN:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jagermeister_2-1737987939854.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238599i6C9B53967F1D90DE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jagermeister_2-1737987939854.png" alt="Jagermeister_2-1737987939854.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;ISE:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jagermeister_3-1737987982117.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238600i18FE77FBF08D0C2F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jagermeister_3-1737987982117.png" alt="Jagermeister_3-1737987982117.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I think this suggests that the PSN in azure actually receives the UDP traffic and the Access-Challenge that is sent back seems also to be received on the LAN interface of the SD-WAN appliance.&amp;nbsp; So, on the ISE logging the clients keeps failing with the following reason codes:&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Failure Reason: 5440 Endpoint abandoned EAP Session and started new&lt;/LI&gt;&lt;LI&gt;Failure Reason 5411 Supplicant stopped responding to ISE&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;In the pcap's I do not see any access-accept message until many attempts have been made:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Jagermeister_4-1737988819552.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238601iA00169DF07711032/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Jagermeister_4-1737988819552.png" alt="Jagermeister_4-1737988819552.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;These attempts are all from the same supplicant, logs show over a 50 failed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 14:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253236#M594533</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-27T14:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253338#M594544</link>
      <description>&lt;P&gt;You need to open a ticket with Azure engineering to enable that flag. I worked at MS and when I moved ISE to Azure, I had to have Azure engineering enable udp fragmentation.&amp;nbsp; It's pretty quick and its not impacting, but they have to enable it on a virtual gateway.&amp;nbsp; I posted this a while back when I got things working.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-access-control/eap-tls-to-azure-ise-is-failing-but-not-with-an-ise-node-in-the/td-p/4739038" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/network-access-control/eap-tls-to-azure-ise-is-failing-but-not-with-an-ise-node-in-the/td-p/4739038&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;** Update **&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Would adjusting the MTU of the Cisco ISE PSN itself help for example? No... I tried that also:)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 18:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253338#M594544</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-27T18:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253356#M594545</link>
      <description>&lt;P&gt;Hi Scott,&lt;/P&gt;&lt;P&gt;Thanks, I'm still waiting for Microsoft to respond. So, in my case I'm having an express route to Azure. Are you saying that I need an empty subscription AND that they have to enable it per express route / VPN gateway?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also, when you were having&amp;nbsp; these issues,&amp;nbsp; did it fail every single time or just regularly?&amp;nbsp; In my case it does succeed sometimes but it fails a lot.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 18:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253356#M594545</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-27T18:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253361#M594546</link>
      <description>&lt;P&gt;Well this can only be done on a virtual gateway, in your case the VPN gateway.&amp;nbsp; So if your ISE cube is deployed over multiple virtual gateway's, then you need to have each on touched.&amp;nbsp; We didn't have an empty subscription, we had a few hundred items in that subscription which I was worried about, but once they enabled that flag, took a few seconds, there was no glitch, no tickets and things started to work.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The fragmentation was only on EAP-TLS, PEAP was working fine.&amp;nbsp; I tested this with a VM on-prem vs in Azure so I can at least have a baseline of what was working and packet captures to compare. EAP-TLS failed every time no matter what device we tested with.&amp;nbsp; We tested with PEAP just for this use case, but everything needed to be using EAP-TLS to pass auth in production.&amp;nbsp; We didn't allow PEAP at all. Keep in mind, once you get an engineer, they will need to escalate that to a tier 1 engineer to do the work.&lt;/P&gt;
&lt;P&gt;Just reference this to the engineer:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/answers/questions/996062/azure-drops-my-udp-fragmentated-packets-when-they" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/answers/questions/996062/azure-drops-my-udp-fragmentated-packets-when-they&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 18:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253361#M594546</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-27T18:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253363#M594547</link>
      <description>&lt;P&gt;The github link no longer works:) but here is something from their docs:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-tcpip-performance-tuning#azure-and-fragmentation" target="_blank"&gt;https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-tcpip-performance-tuning#azure-and-fragmentation&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 18:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253363#M594547</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-27T18:53:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253366#M594549</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1797167"&gt;@Jagermeister&lt;/a&gt;&amp;nbsp;You might even want to look at this.&amp;nbsp; I was also testing with the 9800-CL in Azure. This doc has info on ISE in Azure also with packet captures.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/troubleshooting/222339-troubleshoot-fragmentation-issues-affec.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/troubleshooting/222339-troubleshoot-fragmentation-issues-affec.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 18:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253366#M594549</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-27T18:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253833#M594586</link>
      <description>&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today I did a little test and configured my supplicant to use EAP-TLS instead of PEAP-EAP-TLS. Oddly enough it actually works fine with EAP-TLS but PEAP-EAP-TLS is constantly failing.&amp;nbsp; One thing I noticed in a pcap on the client is that the Meraki switch first seems to attempt EAP-TLS, then legacy NAK's are sent and after a requested EAP-PEAP is sent.&amp;nbsp; Probably not really a problem but it might delay the authentication a bit.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still struggling to find 'evidence' in my PCAPs that Azure is actually dropping it. I can confirm that some radius access-requests were transmitted from the client (eg id=18) but on the ISE PSN I see id 17 and 19 but 18 isn't present, meaning that it didn't arrive.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 15:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253833#M594586</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-28T15:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253841#M594587</link>
      <description>&lt;P&gt;They document that they will drop any UDP packets that come in out of order.&amp;nbsp; The reason I think EAP-TLS fialed for me was the size of the certificate we were using.&amp;nbsp; I still think you should have them enable the flag and go from there, the Azure engineer can also take a packet capture on their end to validate that they are dropping the packets, you will not have the ability to do that capture, but they can.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 16:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253841#M594587</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-28T16:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253862#M594592</link>
      <description>&lt;P&gt;Yes I guess so.&amp;nbsp; I actually just encountered the same behavior for EAP-TLS again so false alarm I guess :(.&amp;nbsp; &amp;nbsp;Hopefully Microsoft will reply soon to me&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 16:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253862#M594592</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-01-28T16:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253875#M594593</link>
      <description>&lt;P&gt;Keep us posted.&amp;nbsp; Have then take a capture while you test so you have that info.&amp;nbsp; They can verify that its being dropped.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2025 17:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5253875#M594593</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-28T17:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Cloud deployment - fragmentation issues</title>
      <link>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5258016#M594827</link>
      <description>&lt;P&gt;little update here -&amp;nbsp; I am in touch with Microsoft now but they claim that they can only enable this flag for traffic that is originating from the internet to a public IP.&amp;nbsp; We are using a Azure Express route so that is not the case and they claim that they CANNOT enable this for a express route.&amp;nbsp; What a nightmare!!&lt;/P&gt;&lt;P&gt;I'm not sure what I can do anymore, I simply do not understand how people are able to use Cisco ISE in combination with a ExpressRoute then. Trying to reduce the payload to avoid fragmentation seems impossible and sending radius traffic over the internet is also not an option for me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 13:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/azure-cloud-deployment-fragmentation-issues/m-p/5258016#M594827</guid>
      <dc:creator>Jagermeister</dc:creator>
      <dc:date>2025-02-07T13:58:08Z</dc:date>
    </item>
  </channel>
</rss>

