Traffic Forwarding Strategies for Cisco ISE
1. Authentication Traffic Characteristics
2. Good Pattern – Local Authentication
2.1 Characteristics
3. Bad Pattern
3.1 Observed Issues
4. SD-WAN Policy Design (Conceptual)
4.1 Match
4.2 Actions
5. Multi-Region Example (BR ↔ US)
Flow
Valid
6.1 Real-World Scenario
6.1 Topology
6.2 Measured RTT
6.3 Symptoms
Key Takeaway
Last updated