- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-14-2022 12:40 PM - edited 12-14-2022 01:08 PM
I have a four node ISE 3.2 cluster in Azure, two PAN+MNT and two separate PSN's. My plan was to migrate off our old ISE 2.2 in our DC eventually. Currently I have migrated all our TACACS+ to our Azure ISE cluster with no issues. I started to test EAP-PEAP and EAP-TLS and pointing a test controller to the Azure PSN's. EAP-PEAP is working, but EAP-TLS is not. I do have a TAC case opened and they are still looking at data.
I spun up an ISE 3.2 VM in our lab and joined that to the Azure cluster. When I point the controller WLAN to this node, EAP-TLS works fine. I also have standalone ISE 3.1 and a ISE 3.2 in the lab and EAP-TLS works fine, eliminating certificates and configuration as all the nodes have the same policies (did a restore to keep things consistent).
What we have, is all our sites even our lab is connected to our DC via DMVPN. Our connection to Azure VNET is via an IPSec tunnel from our DC router to our Azure Virtual Gateway. Our MTU on that tunnel is set for 1438, but Azure support mentioned that default on their VPN is 1400. Would this cause any issues? My next step would be after the holidays is to setup a new Virtual Gateway and tunnel with MTU of 1400 or lower and stand up a new ISE node joined to that cluster to test with.
Errors we see are the following:
5400,5411,5440
*** Please rate helpful posts ***
Solved! Go to Solution.
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2023 10:18 AM
Just wanted to post my solution, at least part. I had to open a ticket with Azure VPN team to enable-udp-fragment-reordering.
https://learn.microsoft.com/en-us/answers/questions/996062/azure-drops-my-udp-fragmentated-packets-when-they
The is done on a subscription level and you choose which virtual gateway this flag needs to be enabled on. Keep in mind that any new virtual gateways will not have this flag and you must open another ticket to get this enabled.
Once the engineer enabled this flag, EAP-TLS started working. Our packet captures showed that EAP-TLS was getting fragmented, but Azure drops these since they are out of order. We still had a mismatch on the tunnel mtu, ours is at 1500 and Azure is at 1400, but that is something that needs to be cleaned up.
So hopefully this helps if you run into this issue in Azure.
*** Please rate helpful posts ***
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-14-2022 11:12 PM
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-15-2022 07:32 AM - edited 12-15-2022 07:44 AM
Thanks @marce1000. I did follow a few guides I found and then thing is that EAP-TLS is working with a PSN joined to the cluster in Azure but is located in the lab. My issue is when I point the controller WLAN to the PSN in Azure, auth fails. We are also not looking up in Azure AD. We are using copies of Preloaded_Certificate_Profile that will reference the CN or the SAN in the policies.
My Deployment is like the foollowing:
PANMNT01 (Azure)
PANMNT02 (Azure)
PSN01 (Azure) - Failing on EAP-TLS
PSN02 (Azure)- Failing on EAP-TLS
PSN03 (Lab but joined to the cluster)- Working on EAP-TLS
*** Please rate helpful posts ***

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-16-2022 10:47 AM
You stated the error codes but did not provide any of the actual details that tell you Why it failed which is in the FailureReason field.
5411 and 5440 errors are usually associated with certificate trust issues - your supplicant does not trust the ISE PSN certificate(s). Check you supplicant configuration and ISE certificates on those PSNs.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-16-2022 07:57 PM
@thomas Here are some screen shots of the various errors we see when the controller wlan is pointing to the Azure PSN's. The thing is, I have another PSN that is not in Azure that is joined to the same cluster and that works fine. I have the full chain imported in ISE and also making sure that the team that owns the device has the full chain of ISE in the trusted cert store. Initially for the Windows 11, they only had the root CA as that has been working fine on all the old and test ISE cluster that I have. We do have an mtu mismatch from our DC router tunnel to Azure VPN which we will have to address in January.
Majority of the Failure reasons are:
5440 Endpoint abandoned EAP session and started new
|
12935 Supplicant stopped responding to ISE during EAP-TLS certificate exchange
|
*** Please rate helpful posts ***

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-18-2022 04:09 PM
If there is an MTU mismatch, that is likely the culprit. EAP-TLS is very sensitive to fragmentation and the generic errors you are seeing are common when the supplicant drops the handshake due to fragmentation of the certificate chain. I would suggest doing a packet capture on the client to see what the EAP communication looks like to determine if you are getting part of the chain and then the session drops.
If you have the ability, you could also try dropping the MTU on the access switch temporarily to prevent the MTU mismatch along the path and see if that resolves the issue.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-18-2022 05:50 PM
*** Please rate helpful posts ***
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-20-2022 10:42 AM
Tested today and set the mtu on the access switch interface vlan to 1300 and then 1000 and EAP-TLS was still failing. I will test more after the holidays.
*** Please rate helpful posts ***
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-27-2023 10:18 AM
Just wanted to post my solution, at least part. I had to open a ticket with Azure VPN team to enable-udp-fragment-reordering.
https://learn.microsoft.com/en-us/answers/questions/996062/azure-drops-my-udp-fragmentated-packets-when-they
The is done on a subscription level and you choose which virtual gateway this flag needs to be enabled on. Keep in mind that any new virtual gateways will not have this flag and you must open another ticket to get this enabled.
Once the engineer enabled this flag, EAP-TLS started working. Our packet captures showed that EAP-TLS was getting fragmented, but Azure drops these since they are out of order. We still had a mismatch on the tunnel mtu, ours is at 1500 and Azure is at 1400, but that is something that needs to be cleaned up.
So hopefully this helps if you run into this issue in Azure.
*** Please rate helpful posts ***
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-26-2025 09:58 AM
@Scott FellaIn my opinion, this is not really a solved solution. If Cisco provided a way to control the size of the RADIUS packet sent to ISE, we wouldn't have to worry about fragmentation in the first place. Cisco did provide this for RADIUS access-responses sent from ISE (using the framed MTU on the WLC) but not for packets in the other direction. They still don’t take the cloud seriously, and it is very disappointing.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-24-2025 11:47 AM
@wifievangelist I think this would not be an issue if MS didn't drop udp fragmentation. The issue is that radius is not getting to ISE, and would be an issue with other vendors also. It is what it is and that was a fix from MS.
*** Please rate helpful posts ***
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2025 02:28 PM
My answer is that this is a cisco forum not a microsoft one. I am here to see what cisco can do not Microsoft. And I suggested what cisco could have done, what is your thought on that?

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-27-2025 05:31 PM
@wifievangelist , also see a related discussion here:
https://community.cisco.com/t5/network-access-control/azure-packet-fragmentation/td-p/5205223
There are multiple levels of fragmentation involved and one of the problems is that the Windows native supplicant uses large EAP messages (1470 bytes), which forces the IP fragmentation. This is a hardcoded setting which cannot be changed.
The result of the fragmentation is that the last packet is smaller, leading to a faster transmit, and therefore received out-of-sequence.
See EAP Fragmentation Implementations and Behavior
Cisco has no control over the behaviour of the Windows native supplicant.
This issue is not present in other public cloud environments like AWS.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-30-2025 02:35 PM
it doesnt make sense to me. Radius work based on access request and response. Lets say if the last rdius packet was smaller but, I wont send that until I get radius access reponse for a previous one anyways. So, that is not the case. It might be the case that the larget packets itself got fragmented along the path and due to platform limitations azure started dropping the out of order.
Other thing is even if the native supplicant sends this 1470 byte eap frame (when I was checking it was bigger than that), radius as a protocol can still engineer and fragment the eap frames from client machines while putting adding it as an AVP so that one radius packet will not exceed the certain number.
It is a simple question, if ISE when sends its certificate not resulting in fragmantation then why WLC sending will result? Because WLC cannot make it a smaller byte size when engineer the radius packet and cisco has to just say that it is a platform limitation just like MS acked their limitation.
