<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Load Balancing 802.1x RADIUS traffic to NAC. in ExtremeWireless (General)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30757#M592</link>
    <description>Not yet.  I will test it more tomorrow when I get back in.</description>
    <pubDate>Thu, 18 Feb 2016 04:13:00 GMT</pubDate>
    <dc:creator>Jeremy_Gibbs</dc:creator>
    <dc:date>2016-02-18T04:13:00Z</dc:date>
    <item>
      <title>Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30745#M580</link>
      <description>Hi there,&lt;BR /&gt;
&lt;BR /&gt;
I'm having some issues using LSNAT load balancing with 802.1x RADIUS requests on the S Series or N Series to some NAC appliances at the back end.&lt;BR /&gt;
&lt;I&gt;&lt;BR /&gt;
&lt;/I&gt;With my client switch configured to send RADIUS requests to the VIP address on the S Series, 802.1x auth fails, but MAC auth is fine. The LSNAT load balancing is configured with four NAC appliances as real servers, though only one is "in service" to aid troubleshooting at the moment.&lt;BR /&gt;
&lt;BR /&gt;
The VIP address of the load balancers are configured as load balancers in NAC manager.&lt;BR /&gt;
&lt;BR /&gt;
With my client switch configured to send RADIUS requests direct to real IP address of the single NAC appliance the load balancer was configured to use, 802.1x and MAC auth are successful.&lt;BR /&gt;
&lt;BR /&gt;
I've tried this using B series and D series as client switches, and tried the same LSNAT configuration on the S Series and N Series with identical results. When using the VIP address, 802.1x fails but MAC auth is fine.&lt;BR /&gt;
&lt;BR /&gt;
NAC Manager shows the following error message when 802.1x auth fails:&lt;BR /&gt;
“Authentication request became stale, challenge sent, no response received from client (switch 192.168.132.115/end-system).”&lt;BR /&gt;
&lt;BR /&gt;
Wireshark proves no packets are being dropped between NAC and switch. The final challenge (before the failure) that is sent out by NAC reaches the uplink port on the switch.&lt;BR /&gt;
&lt;BR /&gt;
It appears that the EAP-TLS communication between client PC and NAC  is breaking down some how.&lt;BR /&gt;
&lt;BR /&gt;
Has anyone has seen similar issues?&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Mark.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Sep 2014 00:46:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30745#M580</guid>
      <dc:creator>Mark_Lamond</dc:creator>
      <dc:date>2014-09-18T00:46:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30746#M581</link>
      <description>I see the same issue.  Anyone?</description>
      <pubDate>Wed, 17 Feb 2016 05:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30746#M581</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2016-02-17T05:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30747#M582</link>
      <description>What version of NAC are you running? Also, what version of OS is on the client?&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Feb 2016 21:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30747#M582</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2016-02-17T21:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30748#M583</link>
      <description>6.3.0.174 (NAC)... Client is latest version of Mac OS X.. &lt;BR /&gt;
&lt;BR /&gt;
When I move the switch back to the NAC group not using LSNAT, 802.1x auth works fine.</description>
      <pubDate>Wed, 17 Feb 2016 23:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30748#M583</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2016-02-17T23:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30749#M584</link>
      <description>Can you display your LSNAT config?&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Feb 2016 01:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30749#M584</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2016-02-18T01:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30750#M585</link>
      <description>!&lt;BR /&gt;
&lt;BR /&gt;
  configure terminal&lt;BR /&gt;
&lt;BR /&gt;
  !&lt;BR /&gt;
&lt;BR /&gt;
   ip slb real-server access unrestricted&lt;BR /&gt;
&lt;BR /&gt;
  !&lt;BR /&gt;
&lt;BR /&gt;
   ip slb serverfarm DNS&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.10 port 53&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one ping&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.11 port 53&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one ping&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
   ip slb serverfarm NAC_Pool&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.147 port 1812&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one check_nac&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.147 port 1813&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one check_nac&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.148 port 1812&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one check_nac&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.148 port 1813&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one check_nac&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
   ip slb serverfarm WindowsAuth&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.10 port 636&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one ping&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.11 port 636&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one ping&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    real 10.3.10.12 port 636&lt;BR /&gt;
&lt;BR /&gt;
     faildetect probe one ping&lt;BR /&gt;
&lt;BR /&gt;
     inservice &lt;BR /&gt;
&lt;BR /&gt;
     exit&lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
  !&lt;BR /&gt;
&lt;BR /&gt;
   ip slb vserver vDNS&lt;BR /&gt;
&lt;BR /&gt;
    virtual 192.168.20.20 udp 53&lt;BR /&gt;
&lt;BR /&gt;
    serverfarm DNS&lt;BR /&gt;
&lt;BR /&gt;
    udp-one-shot &lt;BR /&gt;
&lt;BR /&gt;
    inservice &lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
   ip slb vserver NAC_vIP&lt;BR /&gt;
&lt;BR /&gt;
    virtual 192.168.20.10 udp 1812&lt;BR /&gt;
&lt;BR /&gt;
    sticky timeout 30&lt;BR /&gt;
&lt;BR /&gt;
    serverfarm NAC_Pool&lt;BR /&gt;
&lt;BR /&gt;
    udp-one-shot &lt;BR /&gt;
&lt;BR /&gt;
    inservice &lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
   ip slb vserver WindowsAuthVIP&lt;BR /&gt;
&lt;BR /&gt;
    virtual 192.168.20.30 tcp 636&lt;BR /&gt;
&lt;BR /&gt;
    sticky type sip&lt;BR /&gt;
&lt;BR /&gt;
    serverfarm WindowsAuth&lt;BR /&gt;
&lt;BR /&gt;
    udp-one-shot &lt;BR /&gt;
&lt;BR /&gt;
    inservice &lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
   ip slb vserver WindowsAuthVPI&lt;BR /&gt;
&lt;BR /&gt;
    exit&lt;BR /&gt;
&lt;BR /&gt;
  !&lt;BR /&gt;
&lt;BR /&gt;
  exit&lt;BR /&gt;
&lt;BR /&gt;
  !&lt;BR /&gt;
&lt;BR /&gt;
  end&lt;BR /&gt;
&lt;BR /&gt;
You can ignore the WindowsAuth and DNS stuff.. &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Feb 2016 02:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30750#M585</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2016-02-18T02:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30751#M586</link>
      <description>Have you seen this? Not sure if it helps or not.... &lt;A href="https://gtacknowledge.extremenetworks.com/articles/Solution/RADIUS-Authentication-failing-using-LSNAT" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Solution/RADIUS-Authentication-failing-using-LSNA...&lt;/A&gt;</description>
      <pubDate>Thu, 18 Feb 2016 02:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30751#M586</guid>
      <dc:creator>Doug</dc:creator>
      <dc:date>2016-02-18T02:30:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30752#M587</link>
      <description>We ended up getting professional services involved to take a look at the issue.&lt;BR /&gt;
Looking back through my notes, the reason for the problem is because is because our client certificate could not fit in one packet so was being fragmented across multiple packets. This is something LSNAT couldn't deal with at the time, so fragments were being dropped causing the TLS conversation to fail.&lt;BR /&gt;
&lt;BR /&gt;
There was a bug fix in the S series firmware v8.31.01.005 which sounds like a similar issue:&lt;BR /&gt;
"Fragmented packets are not allowed to traverse across an LSNAT6/4 or LSNAT4/6 vserver, the packets will be dropped"&lt;BR /&gt;
&lt;BR /&gt;
In our case we were using straight LSNAT IPv4 to IPv4 with no IPv4/6 or IPv6/4 conversion.&lt;BR /&gt;
I've never tried it again since the fix, might give it a go if I have time.&lt;BR /&gt;
&lt;BR /&gt;
What hardware are you running and what firmware version are you on?&lt;BR /&gt;
&lt;BR /&gt;
We did try a few things to reduce the size of the EAP packets, but from what i remember our client certificate was just too big.&lt;BR /&gt;
&lt;BR /&gt;
Here are a few tips on that which were relevant when we had the issue with our NAC version - I would advise treading carefully, lots of potential to break stuff . Use wireshark/tcpdump on both client side and NAC side to monitor how the packets appear before and after LSNAT. &lt;BR /&gt;
&lt;BR /&gt;
                         &lt;BR /&gt;
&lt;BR /&gt;
                         &lt;B&gt;&lt;I&gt;I.                        To     reduce fragmentation on NAC:&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;     &lt;/I&gt;&lt;I&gt;Add the     following appliance or appliance group properties and then enforce the     appliance:&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;     &lt;/I&gt;&lt;I&gt;RADIUS_EAP_TLS_FRAGMENT_SIZE=1200&lt;/I&gt;&lt;BR /&gt;
&lt;I&gt;RADIUS_INNER_EAP_TLS_FRAGMENT_SIZE=1024&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;This will reconfigure the eap.conf and inner eap configuration files &lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;     &lt;/I&gt;&lt;B&gt;&lt;I&gt;II.                      To reduce packet     size from client:&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;     &lt;/I&gt;&lt;I&gt;Microsoft’s KB on the     subject (&lt;/I&gt;&lt;A href="http://support.microsoft.com/kb/883389" target="_blank" rel="nofollow noreferrer noopener"&gt;&lt;I&gt;http://support.microsoft.com/kb/883389&lt;/I&gt;&lt;/A&gt;&lt;I&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/I&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;     &lt;/I&gt;&lt;I&gt;The     Extensible Authentication Protocol (EAP) packets of the RADIUS server are     large when some firewall programs drop the UDP fragments to help protect     the network. Framed MTU is used with EAP authentication to notify the     RADIUS server about the Maximum Transmission Unit (MTU) negotiation with     the client. The RADIUS server communicates with the client, so that the     RADIUS server does not send EAP messages that cannot be delivered over the     network. The default attribute value of the framed MTU for the IAS server     is 1,500. &lt;/I&gt;&lt;B&gt;&lt;I&gt;You can set the attribute to a minimum of 64 and a maximum of     1,500. To avoid the fragment issues, you can     set the attribute value to 1,344.&lt;/I&gt;&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
               Thanks,&lt;BR /&gt;
Mark</description>
      <pubDate>Thu, 18 Feb 2016 02:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30752#M587</guid>
      <dc:creator>Mark_Lamond</dc:creator>
      <dc:date>2016-02-18T02:36:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30753#M588</link>
      <description>We are running 8.32.2.0008 on the S4.  Havn't looked into fragment size but I will take a look at that.  We use NAC as a RADIUS server.</description>
      <pubDate>Thu, 18 Feb 2016 02:48:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30753#M588</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2016-02-18T02:48:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30754#M589</link>
      <description>Yes, the config looks good. Im sorry I could not help on this. The GTAC gods have spoken, and I would follow the firmware path as they said. &lt;BR /&gt;
&lt;BR /&gt;
Hope it gets resolved for you&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:01:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30754#M589</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2016-02-18T03:01:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30755#M590</link>
      <description>Yeah, we are running the latest 8.32 firmware the S4 can take for our 180 cards.  Using LSNAT makes the response time a LOT slower as well.  I also notice when I authenticate, different parts of the communication will hit different NAC appliances.  When that happens, it doesn't work.  When all the auth stuff hits the one NAC, it works.  Tried sticky sip but that didn't help.</description>
      <pubDate>Thu, 18 Feb 2016 03:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30755#M590</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2016-02-18T03:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30756#M591</link>
      <description>have you tried the leastConnections command in the LSNAT?&lt;BR /&gt;
&lt;BR /&gt;
I think it should give a more one to one rather than a multiple hit or round robin&lt;BR /&gt;</description>
      <pubDate>Thu, 18 Feb 2016 04:02:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30756#M591</guid>
      <dc:creator>Joseph_Burnswor</dc:creator>
      <dc:date>2016-02-18T04:02:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30757#M592</link>
      <description>Not yet.  I will test it more tomorrow when I get back in.</description>
      <pubDate>Thu, 18 Feb 2016 04:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30757#M592</guid>
      <dc:creator>Jeremy_Gibbs</dc:creator>
      <dc:date>2016-02-18T04:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30758#M593</link>
      <description>Hello Jeremy,&lt;BR /&gt;
Why oneshot?  Can you test without this?&lt;BR /&gt;
&lt;BR /&gt;
I think you guys are on the right track regarding tying the reals to a specific client.  There is no distributed database - so while its udp, the real server initially auth'ing the client needs to stay with them. Auth has never been my sharpest skill but it seems like the auth process needs to hold at least some state for updates or challenges or other auth magic.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Mike</description>
      <pubDate>Thu, 18 Feb 2016 04:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30758#M593</guid>
      <dc:creator>Mike_D</dc:creator>
      <dc:date>2016-02-18T04:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Load Balancing 802.1x RADIUS traffic to NAC.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30759#M594</link>
      <description>&lt;BR /&gt;
After boning up a bit on the lsnat app:&lt;BR /&gt;
one shot deletes the binding after 1 second.  Perfect for access level DNS for example.  Normally tearing down a NAT binding would not be an issue to radius but in the radius  load balance application a client needs to stick with the real server used for initial radius auth - there is no sharing of info from one real to another.&lt;BR /&gt;
So one shot operation is the opposite of what is called for here.  &lt;BR /&gt;
&lt;BR /&gt;
Try sticky type sip with a timeout of 65k. &lt;BR /&gt;
(Not tested)&lt;BR /&gt;
&lt;BR /&gt;
Mike</description>
      <pubDate>Fri, 19 Feb 2016 01:37:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/load-balancing-802-1x-radius-traffic-to-nac/m-p/30759#M594</guid>
      <dc:creator>Mike_D</dc:creator>
      <dc:date>2016-02-19T01:37:00Z</dc:date>
    </item>
  </channel>
</rss>

