05-09-2025 10:17 AM
Working on PEAP Authentication with PSNs behind the F5 Load Balancer
Current Setup:
Issue:
When the Meraki SSID sends RADIUS traffic to the F5 VIP, PEAP authentication fails with:
However, if I configure Meraki to point directly to either PSN1 or PSN2, PEAP works flawlessly — the full EAP exchange stays on the same PSN.
Looking for Guidance:
Has anyone successfully configured F5 load balancing for PEAP RADIUS traffic from Meraki and managed to maintain EAP session persistence?
Any insights or tips are much appreciated! I'm happy to share the final working config with the community once resolved.
05-09-2025 10:13 PM
have you checked if the problem is " ... the next EAP step doesn’t come back ... " or if the 1st EAP Response from ISE did not reach Meraki ?
Regards
05-12-2025 06:55 AM
I did a packet capture using Wireshark the RADIUS request from the Meraki switch is definitely reaching the F5 VIP. I also confirmed that the same request is visible between the Meraki switch and ISE directly
However, when going through F5, the traffic doesn’t reach the PSNs (ISE nodes). I only see F5 sending health check probe pings to the PSNs, but no actual RADIUS traffic.
Appreciate any further insights.
Please go through this images
05-12-2025 07:01 AM
05-12-2025 07:32 AM
Hi
Have you tried changing your persistence from rule based to simple "source IP" as a test?
hth
Andy
05-12-2025 11:23 AM
Yes, I did try changing the persistence to use the NAS IP address, but unfortunately, it still didn’t work. The issue with PEAP session continuity remained.
05-12-2025 09:17 AM
you said " ... the traffic doesn’t reach the PSNs (ISE nodes) ... ", if F5 was sending the packet to the wrong PSN, then the "Persistence Rule" would be the next step to investigate (already mentioned by @andrewswanson ), but it seems that F5 is not sending the packet to any PSN ... could you please check where F5 is sending the packet ?
Hope this helps !!!
05-12-2025 11:26 AM
Yes, I ran a packet capture using Wireshark to trace the flow.
From what I observed:
The Meraki switch (10.1.1.293) is sending the RADIUS Access-Request to the F5 VIP (10.1.1.220).
Separately, I also see the Meraki switch directly hitting PSN1 (10.2.2.41)
05-12-2025 02:44 PM
OK about 1. and 2., but what about the F5 VIP sending the RADIUS Access-Request to ISE ?
05-12-2025 09:40 PM
The F5 VIP is not sending the RADIUS Access-Request to ISE at all. In my setup, the F5 internal interface (10.2.2.30) is added as a NAD in ISE , so any traffic from F5 to the PSNs would appear as coming from that IP.
However, on the ISE side, I’m only seeing the health check probe traffic with the default username f5-probe. There are no actual RADIUS Access-Requests coming from the VIP to the PSNs.
05-13-2025 05:39 AM
got it !!!
What happens if you only add one PSN to your F5 setup (instead of two PSNs) ? Still the same issue ?
05-13-2025 05:50 AM
Yes, I tested that as well.
I disabled one PSN in the F5 pool and even powered off the same PSN to ensure all traffic goes to a single PSN, but the issue still persists. F5 still doesn't forward the RADIUS request to the active PSN.
05-22-2025 03:29 AM
This is what i got when i check the F5 console
This what i got in ISE
05-10-2025 02:48 AM
Use either wildcard Cert. Or add SAN to cert. Of PSN1.
Issue is client dont accpet cert. Of PSN.
MHM
05-10-2025 07:30 PM - edited 05-10-2025 07:40 PM
I'm facing similar issue....same scenario. Can you please expatiate how to do this. My setup is done as in the picture below. when I add the PSNs to the PAN, the certificates were imported to PAN. Since the PSNs are managed via the PAN, is your solution applicable in this case. Am i changing the PSNs certificate or the PAN?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide