Hello,
We are using Cisco ISE in our environment, branch offices try to authenticate using RADIUS, and the packets are 1800 byte large, this leads router to fragment the packets. Since the fragmented UDP packet do not have header, it disturbs the qos policies and puts the fragmented packet into a wrong class-map.
Is there a way to change this on Cisco ISE to not send such big authentication packets? or is there a way to add anything in the qos policies to determine these fragmentated udp packets and put them in the same class-maps?
From the pcaps I found that inbound packet arrives with length 1514 and 562 both with DSCP value of CS0, but on the outbound interface towards the hub router, packet gets fragmented as:
Lenght 1410 (af11), 138 (af11) and 562 (af41).
We checked qos policies but these all packets should be hitting our default class which is af11 and the last packet 562 should not convert into af41 at all.
I am posting this in ISE forum to know if there is anyway ISE could lesser the packet length?
UDP packets are without headers, so its difficult for us to classify and mark these fragmented packets on our policy map.
Looking forward for the answers and suggestions.
Thanks!!!