06-24-2022 12:33 AM
Hi,
I have two nodes Cisco ISE 3.1 patch3 deployment.
I am seeing lot of communication from both ISE nodes towards IP 169.254.169.254, that is eventually getting blocked on the firewall interface.
I cannot find any information related to this IP and Cisco ISE.
Is this some kind of normal inter-nodes communication?
Regards,
Milos
Solved! Go to Solution.
04-01-2023 11:04 PM
There is a defect already filed for this issue:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc45154
Check the Known Limitations for Using Cisco ISE on AWS section of Cisco ISE Installation Guide 3.1.
"In Cisco ISE Release 3.1 Patch 3, Cisco ISE sends traffic to AWS Cloud through IP address 169.254.169.254 to obtain the instance details. This is to check if it is a cloud instance and can be ignored in on-prem deployments"
HTH
06-24-2022 04:13 AM
06-24-2022 04:48 AM
Hi,
It's quite often, every few minutes there is communication from both ISE nodes towards 169.254.169.254.
06-24-2022 05:05 AM
Could be the docker processes within ISE, see here: https://community.cisco.com/t5/network-access-control/cni-podman1-amp-cni-podman2-on-ise-version-3-1-patch-3/m-p/4628250#M575340
06-24-2022 06:45 AM
Hi,
I see, most probably you are right and it's related to docker IPs.
Let's see if someone else has some other explanation :-).
Regards,
Milos
06-28-2022 12:31 PM
As Adam mentioned and linked to in Greg's post, 169.254.x.x are addresses used by the docker containers internal to the ISE node. You'll see many in use if you run a "tech netstat" on the CLI for many of the functions we know and love, COA, RADIUS, Portals etc.
What's odd to me is that you're saying you are seeing this traffic at a firewall, the internal docker traffic should stay that way.
So what might be happening is ISE is resolving something via DNS to the 169.254.169.254 address, then sending requests. I did a google of "169.254.169.254" because it's an odd APIPA address, I found that AWS, Azure, GCP, and others use this specific IP for certain metadata lookups. Where are your nodes hosted?
06-29-2022 12:50 AM
Hi Damien,
Thanks a lot for your reply!
Yes, I am seeing this traffic on the firewall interface, which serves as a default gateway for ISE.
My nodes are deployed locally on in our infra on vmware.
I checked tech netstat and I can see 169.254.2.1 and 169.254.4.1, no sign of 169.254.169.254 or any other APIPA address.
Just to point again, traffic log is showing that source is real IP addresses of ISE servers (not APIPA) and destination is 169.254.169.254 on TCP port 80.
You know what, now that I noticed that communication is HTTP (TCP/80), and sourced from ISE servers, this could be CRL check from some certificate.
03-23-2023 08:08 AM
I was modifying an ACL and started seeing blocks to this address from my ISE admin node. Since this is HTTP traffic I decided to spin up a little web server to see the payload. I have attached a snippet from Wireshark. ISE seems to be looking for the instance identity information.
03-23-2023 08:37 AM
169.254.169.254 is the IP address associated with AWS/Azure Instance metadata services when you install a VM on those environments.
03-31-2023 01:03 PM
Hello, I see the same IP (169.254.169.254) blocked in our FWs.
From ISE nodes http to 169.254.169.254
ISE 3.1 patch 5
did you have your answer?
03-31-2023 01:20 PM
It has to do with the instance identity information used for cloud deployments.
04-01-2023 11:04 PM
There is a defect already filed for this issue:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwc45154
Check the Known Limitations for Using Cisco ISE on AWS section of Cisco ISE Installation Guide 3.1.
"In Cisco ISE Release 3.1 Patch 3, Cisco ISE sends traffic to AWS Cloud through IP address 169.254.169.254 to obtain the instance details. This is to check if it is a cloud instance and can be ignored in on-prem deployments"
HTH
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide