10-28-2024 08:51 AM
Hi,
Has anyone been able to successfully deploy ISE in Azure using expressroute from on-premise to the cloud.
We have had ISE running in Azure for about 3-4 months now and have noticed a large amount of fragmentation using EAP-TLS.
The Cisco guide suggests a fix has been applied in East Asia and West Central US however it's not been applied to UK South where our VMs are located. We have also raised this with Microsoft support however they cannot tell us what fix this is or when it will be rolled out to our region.
We enquired about the "enable allow out-of-order-fragments" option however they said this could only be applied if the traffic is coming from the internet, not via expressroute or VPN which is obviously not going to work as we wouldn't send radius traffic straight over the internet! Other requirements include deploying VMs in a brand-new empty subscription and deploying to a Dv4 VM, again this is not possible as the VMs are already in use within an existing subscription.
It's incredibly frustrating as Cisco can't seem to provide much info on the workaround and Microsoft are just fobbing us off by saying that the information is from Cisco and not from them!
I'd be grateful if other members on this forum have successfully deployed ISE in Azure with connectivity via ER or VPN and not seen the fragmentation issues when using EAP-TLS.
TIA.
10-28-2024 09:38 AM
Hi,
Welcome to the jungle, it is a well-known challenge. Look here, work with Microsoft and move your VM's on Gen7 HW:
Best,
Cristian.
10-29-2024 03:18 AM
Thanks @Cristian Matei - the errors on that webinar are exactly what we are seeing in Azure. Microsoft just keep fobbing us off with the following:
Are you aware of anyone who has successfully got Microsoft to fix this issue? It would be good to know who the people are in the Cisco engineering team who have worked on Microsoft with this are so maybe they could shed some light on whats required.
10-29-2024 09:24 AM
Hi,
Mate, as an engineer I feel your pain; my scenarios were done via Internet, being aware of the challenge. I suggest open a TAC case to get the info you're looking for from Cisco, someone has to know; otherwise, if you're stuck and can't move VM's to a region with the fix, try deployment over Internet and use IPsec tunnels for RADIUS packets or RADIUS over DTLS.
Good luck,
Cristian.
10-29-2024 06:25 AM
Documented at https://cs.co/ise-berg#azure and
10-29-2024 07:04 AM
thanks @thomas i have also logged a support ticket with Cisco to see if they can provide any information. My account manager at Microsoft has asked me to find out exactly what fix has been applied in East Asia and West Central US as it specifically highlights this in the deployment guide, do you know what this fix is?
Due to this known issue, do one of the following:
10-29-2024 08:07 AM
This is 100% a Microsoft Azure issue. You will need to ask them. This problem does not exist in other cloud providers.
10-29-2024 08:12 AM - edited 10-29-2024 08:12 AM
@thomas I absolutely agree however the documentation from Cisco says it's been resolved in 2 regions but nobody can tell me what the resolution was so I can ask Microsoft to make the same fix in UK South. I have asked senior engineers at Microsoft but they cannot seem to find out what this supposed fix is so I am hoping someone at Cisco can point me in the right direction!
10-29-2024 08:22 AM
From Known Limitations of Cisco ISE in Microsoft Azure Cloud Services :
In Azure, a networking virtual network stack drops out-of-order fragments without forwarding them to the end virtual machine host. This design aims to address the network security vulnerability FragmentSmack, as documented in Azure and fragmentation.
Cisco ISE deployments on Azure typically leverage VPN solutions like Dynamic Multipoint Virtual Private Networks (DMVPN) and Software-Defined Wide Area Networks (SD-WAN), where the IPsec tunnel overheads can cause MTU and fragmentation issues. In such scenarios, Cisco ISE may not receive complete RADIUS packets and an authentication failure occurs without triggering a failure error log.
Due to this known issue, do one of the following:
Select regions where Azure Cloud has already implemented the fixes: East Asia (eastasia) and West Central US (westcentralus).
Cisco ISE customers should raise an Azure support ticket. Microsoft has agreed to take the following actions:
Pin the subscription to ensure all instances within that subscription are deployed on hardware generation 7.
Enable the "allow out-of-order fragments" option, which allows fragments to pass through to the destination instead of being dropped.
10-29-2024 08:30 AM
I understand that and have seen that article numerous times but Microsoft are saying they can only enable out of order fragments for VMs with a public IP attached to the NIC, this isn't applicable to us because its internal traffic it doesn't go over the internet.
03-10-2025 01:14 AM
I found most cisco devices fragment incorrectly, but I managed to work around the fragmentation issue in azure by implementing the following
https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-33/220568-configure-ise-3-3-native-ipsec-to-secure.html
Essentially this hides the out of order fragments within IPSEC so Azure is none the wiser.
03-14-2025 01:38 AM
Hi @Damon Kalajzich , thanks for your feedback, how would you achieve this if you're using Cisco Meraki for Wireless 802.1x?
03-16-2025 04:21 PM
Sorry I don't have any experience with Meraki, to work it would require the device (NAD) sending the radius request to have the ability to configure a ipsec tunnel to ISE.
03-20-2025 04:25 AM
Is anyone else dealing with this problem still? We're currently in the testing phase of an ISE deployment in Azure and I believe we're encountering this exact situation.
However, the Microsoft agreement no longer seems to be in place because our consistent entreaties to their support engineers seem to be in vain. Something may have changed on their side, but they're saying the 'enable udp out of order fragments' solution is no longer supported (this is the response even after account rep involvement).
I don't have to remind anyone here, but it throws a major wrench in your plans when core tenet networking laws, such as udp packet reassembly, are no longer something you can reliably account for when implementing a solution.
A lot of the threads on this topic seem to just end or they're older so I'm wondering if anyone has recently experienced this and has successfully developed a creative workaround?
Just trying to come up with some ideas and explore all the contingency plans. I'm interested to see if anyone else is still fighting this and if you're having any success.
Thanks,
03-20-2025 03:39 PM
I have been dealing with it the last few months, and yes it is difficult to get MS to acknowledge this. I got to the point where I was advised that MS could enable this feature for me, but...
It can only been enabled on a empty subscription, They pin any new resources added to the subscription to a specific hardware cluster with the feature enabled. There are other caveats which would mean a complete re-architect of our azure deployment, like you can't use a Azure VPN gateway or Azure Firewall in the path of the traffic to ISE, as these can't be pinned to the specif hardware with the feature enabled.
This is why I have gone down the path of using IPSEC from the NAD to ISE to hide the out of order fragments that cisco devices send from the azure network stack.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide