07-22-2024 01:46 AM
Hello,
My ISE system is experiencing High Authentication Latency, upwards of 11,000MS. Specifically for VPN users. The users in question are remote workers, utilising AnyConnect, proxied through Meraki Security Appliances, with Duo acting as the MFA platform. Users hit the correct proxy, then the tunnel-client-endpoint seemingly reaches out to a range of different public IP addresses, which look to be a mix of the home users Internet Service Providers, RIPE, and or unknown addresses.
Staff successfully login, can someone tell me why is the tunnel-client-endpoint is responding in other attributes to these public IP addresses through radius-proxy (as these are not directly associated), and why would the latency / response be so high given the inital request falls with acceptable relams of input time.
Solved! Go to Solution.
07-22-2024 09:29 AM
The IP Address listed is the public IP of the client as its connecting to the MX. What is the purpose of ISE in this scenario? Why not just use Duo SAML? The latency is most likely related to the user delaying to respond to MFA push.
07-22-2024 09:29 AM
The IP Address listed is the public IP of the client as its connecting to the MX. What is the purpose of ISE in this scenario? Why not just use Duo SAML? The latency is most likely related to the user delaying to respond to MFA push.
07-23-2024 03:20 AM
Super, thanks ahollifield.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide