Forum Discussion
Load balancing the ISE services Radius and HTTPS
I am also running into this issue. Something has to have changed since that article was written. Additionally, the direct copy and paste of that iRule is as follows:
# adding persistence based on Calling-Station-ID
when LB_SELECTED {
log local0. "session table entry added: <persist:[RADIUS::avp 31] node [LB::server addr]>"
session add uie "persist:[RADIUS::avp 31]" [LB::server addr]
}
# lookup and adding persistence based on Framed-IP-Addr
when CLIENT_ACCEPTED {
log local0. "session table lookup result for calling station ID of [RADIUS::avp 31]: [session lookup uie "persist:[RADIUS::avp 31]"]"
if {[session lookup uie "persist:[RADIUS::avp 31]"] ne ""} {
log local0. "lookup match: [session lookup uie "persist:[RADIUS::avp 31]"]"
node [session lookup uie "persist:[RADIUS::avp 31]"]
log local0. "session table entry added: <persist:[RADIUS::avp 8] [session lookup uie "persist:[RADIUS::avp 31]"]>"
session add uie "persist:[RADIUS::avp 8]" [session lookup uie "persist:[RADIUS::avp 31]"]
}
}
I believe the RADIUS commands are no longer allowed in the CLIENT_ACCEPTED events.
We solved the issue by doing priority groups to ensure that everything went to the same server.
- Hai_NguyenDec 17, 2019Nimbostratus
Can you share with us the TMSH output that fixed this Andrew Husking?
- Andrew_HuskingDec 17, 2019Cirrus
ltm pool iseportal { load-balancing-mode least-connections-node members { node1:8443 { address 1.1.1.1 } node2:8443 { address 2.2.2.2 priority-group 10 } } min-active-members 1 }
Here you go.
- Anonymous25Dec 17, 2019Nimbostratus
How does this solve the issue of carrying persistence from Radius auth/acct via MAC to the HTTPS redirect using IP?
Another way the phrase this is how did using priority groups solve the issue of persistence to make sure the client gets to the correct node to continue the session?
- Andrew_HuskingDec 17, 2019Cirrus
Because the nodes are in an active/standby configuration all traffic hit's the same PSN (unless during a failover scenario).
May not be ideal for all implementations but for us this hasn't caused any issues
- Anonymous25Dec 17, 2019Nimbostratus
Ah, that make more sense. We have a 5 node deployment (1 PAN, 1 MNT, 3 PSNs). We need to be able to load balance across the three PSNs on a static FQDN and keep persistence for those sessions. That is what this iRule is supposed to assist with (on LTM version 11.6).
As far as using Radius in Client_Accepted, this does still work. I have tested other iRules that use this format and they generate persistence records. Obviously, they have not been able to carry the persistence record from RADIUS client MAC address to HTTPS Client IP address to persist the sessions.
Thanks for providing your solution to the problem though!
- CA_ValliSep 11, 2020MVP
Hi, I'm about to try to activate a similar configuration as well.
We're passing from Citrix Netscaler to F5 LTM and I'm using radius profile with persistence attribute 31, just like I had configured in netscaler.
Has anyone tested this before? Does it work as expected?
I have to mention we tried to go-live once already but VS seemed to receive no traffic from switches. The switches passed from seeing radius server from "DEAD" to "ACTIVE", but still all I could see on the loadbalancer with a tcpdump instance listening on udp port 1812 was F5 monitor traffic.
I've suspected the firewall *might* not have updated ARP entry for VS IP (we used the same addresses) so ethernet packets were crafted with bad destination mac, and this will be the first thing I'll check next time we try, but I was also wondering if anything on BIGIP configuration might be misfunctioning.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com