03-11-2019 04:05 AM
This is regarding ISE PSN’s being load balanced behind a F5 in a distributed environment for Device administration
Customer has some constraints regrading using F5 as the gateways and is planning to use SNAT which would NAT the source IP of the NAD to F5 internal IP address
From what I understand the authentications will be successful however it would lead to visibility issues as the F5 would see all requests coming from a single ip address.
03-11-2019 03:00 PM
This is perfectly acceptable and it's how we have been doing it for years, even back in the ACS days. And it makes perfect sense to SNAT thousands of routers and switches into one IP address inside of your TACACS server. If you need to do something funky with an individual device for some reason, then perhaps there is a TACACS attribute (like NAS-IP-Address ... I don't know what the TACACS equivalent it) that you can use in your Policy Sets. But the reality is that you treat all your thousands of devices like cattle (same policy) by giving them one entry in the ISE Client List - that entry is the VIP of the load balancer because the load balancer performs the SNAT.
Craig Hyps coined the phrase "SNAT for NAD is bad" - but what he meant by that is that it's bad for Radius flows where CoA might be required. If you don't need CoA then SNAT is not an issue. And TACACS doesn't have a concept of CoA so you're good to go.
As far as I know, with SNAT, you will not lose visibility in ISE and you can still see individual TACACS requests from devices.
See BRKSEC-3699 and Craig Hyps extensive work on ISE and F5 integration (search this Community for it)
03-11-2019 03:26 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide