<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Max EAPOL-key M5 retransmissions exceeded for client in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879992#M100159</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just actually looked at your debug and I show only a single deauthentication message which was due to non-response for an M1 key from AP to client, not an M5 broadcast key rotation.&amp;nbsp; I would suspect a client/supplicant issue in this case (well M1 or M5 really) but anyhow.&amp;nbsp; Are all these devices up to date?&amp;nbsp; It sounded like it's not "all" of the smartphone uses.&amp;nbsp; Here is the example in the debug you provided.&amp;nbsp; Looks like this happens when the client roamed to another AP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*apfMsConnTask_6: Feb 23 14:13:00.451: 3c:d0:f8:a1:98:29 Reassociation received from mobile on AP b8:62:1f:b4:07:80&lt;/P&gt;&lt;P&gt;&lt;SNIPPED&gt;&lt;/SNIPPED&gt;&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:01.933: 3c:d0:f8:a1:98:29 Starting key exchange to mobile 3c:d0:f8:a1:98:29, data packets will be dropped&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:01.933: 3c:d0:f8:a1:98:29 Sending EAPOL-Key Message to mobile 3c:d0:f8:a1:98:29 state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Feb 23 14:13:02.995: 3c:d0:f8:a1:98:29 802.1x 'timeoutEvt' Timer expired for station 3c:d0:f8:a1:98:29 and for message = M2&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:02.995: 3c:d0:f8:a1:98:29 Retransmit 1 of EAPOL-Key M1 (length 121) for mobile 3c:d0:f8:a1:98:29&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Feb 23 14:13:03.994: 3c:d0:f8:a1:98:29 802.1x 'timeoutEvt' Timer expired for station 3c:d0:f8:a1:98:29 and for message = M2&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:03.994: 3c:d0:f8:a1:98:29 Retransmit 2 of EAPOL-Key M1 (length 121) for mobile 3c:d0:f8:a1:98:29&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Feb 23 14:13:04.994: 3c:d0:f8:a1:98:29 802.1x 'timeoutEvt' Timer expired for station 3c:d0:f8:a1:98:29 and for message = M2&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:04.994: 3c:d0:f8:a1:98:29 Retransmit failure for EAPOL-Key M1 to mobile 3c:d0:f8:a1:98:29, retransmit count 3, mscb deauth count 0&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:04.996: 3c:d0:f8:a1:98:29 Sent Deauthenticate to mobile on BSSID b8:62:1f:b4:07:80 slot 0(caller 1x_ptsm.c:534)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the client re-associates within about 5 seconds and hits the RUN state properly.&amp;nbsp; Does this issue seem situated in a particular area, ie particular APs; or is it happening anywhere this WLAN is serviced?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Feb 2012 20:50:54 GMT</pubDate>
    <dc:creator>daviwatk</dc:creator>
    <dc:date>2012-02-23T20:50:54Z</dc:date>
    <item>
      <title>Max EAPOL-key M5 retransmissions exceeded for client</title>
      <link>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879988#M100155</link>
      <description>&lt;P&gt;I have had several complaints from around the firm where by mobile devices are being bumped off the PSK secured network (All other SSID networks are operating A-OK). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both Android and iPhone devices are being affected, the device will just loop until it reconnects, sometimes up to 20 minutes of trying to establish a connection. It will eventually connect so the key is not the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've attached a debug of a device which fails to connect and then shortly after is successful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Controller 5508 v7.0.116.0&lt;/P&gt;&lt;P&gt;AP 3502i IOS 12.4(23c)JA2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas would be appreciated!&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 04:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879988#M100155</guid>
      <dc:creator>Brendan Marmont</dc:creator>
      <dc:date>2021-07-04T04:38:31Z</dc:date>
    </item>
    <item>
      <title>Max EAPOL-key M5 retransmissions exceeded for client</title>
      <link>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879989#M100156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post your show wlan &lt;WLAN id=""&gt;.&amp;nbsp; If you noticed that these devices are being affected everywhere, then it might be something in your wireless configuration.&lt;/WLAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 12:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879989#M100156</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2012-02-23T12:44:33Z</dc:date>
    </item>
    <item>
      <title>Max EAPOL-key M5 retransmissions exceeded for client</title>
      <link>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879990#M100157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I am the only one making configuration changes I am a tad miffed as why it's all gone to custard last week with no MACs being made...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WLAN Identifier.................................. 3&lt;BR /&gt;Profile Name..................................... K_P&lt;BR /&gt;Network Name (SSID).............................. K_P&lt;BR /&gt;Status........................................... Enabled&lt;BR /&gt;MAC Filtering.................................... Disabled&lt;BR /&gt;Broadcast SSID................................... Enabled&lt;BR /&gt;AAA Policy Override.............................. Disabled&lt;BR /&gt;Network Admission Control&lt;/P&gt;&lt;P&gt;&amp;nbsp; Radius-NAC State............................... Disabled&lt;BR /&gt;&amp;nbsp; SNMP-NAC State................................. Disabled&lt;BR /&gt;&amp;nbsp; Quarantine VLAN................................ 0&lt;BR /&gt;Maximum number of Associated Clients............. 0&lt;BR /&gt;Number of Active Clients......................... 49&lt;BR /&gt;Exclusionlist.................................... Disabled&lt;BR /&gt;Session Timeout.................................. 1800 seconds&lt;BR /&gt;CHD per WLAN..................................... Enabled&lt;BR /&gt;Webauth DHCP exclusion........................... Disabled&lt;BR /&gt;Interface........................................ pda&lt;BR /&gt;Multicast Interface.............................. Not Configured&lt;BR /&gt;WLAN ACL......................................... unconfigured&lt;BR /&gt;DHCP Server...................................... Default&lt;BR /&gt;DHCP Address Assignment Required................. Enabled&lt;BR /&gt;Static IP client tunneling....................... Disabled&lt;BR /&gt;Quality of Service............................... Bronze (background)&lt;BR /&gt;Scan Defer Priority.............................. 5,6&lt;BR /&gt;Scan Defer Time.................................. 100 milliseconds&lt;BR /&gt;WMM.............................................. Allowed&lt;BR /&gt;WMM UAPSD Compliant Client Support............... Disabled&lt;BR /&gt;Media Stream Multicast-direct.................... Disabled&lt;BR /&gt;CCX - AironetIe Support.......................... Enabled&lt;BR /&gt;CCX - Gratuitous ProbeResponse (GPR)............. Disabled&lt;BR /&gt;CCX - Diagnostics Channel Capability............. Disabled&lt;BR /&gt;Dot11-Phone Mode (7920).......................... Disabled&lt;BR /&gt;Wired Protocol................................... None&lt;BR /&gt;IPv6 Support..................................... Disabled&lt;BR /&gt;Passive Client Feature........................... Disabled&lt;BR /&gt;Peer-to-Peer Blocking Action..................... Drop&lt;BR /&gt;Radio Policy..................................... 802.11g only&lt;BR /&gt;DTIM period for 802.11a radio.................... 1&lt;BR /&gt;DTIM period for 802.11b radio.................... 1&lt;BR /&gt;Radius Servers&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Authentication................................ 10.150.4.200 1812&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Accounting.................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Dynamic Interface............................. Disabled&lt;BR /&gt;Local EAP Authentication......................... Disabled&lt;BR /&gt;Security&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 802.11 Authentication:........................ Open System&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Static WEP Keys............................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 802.1X........................................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Wi-Fi Protected Access (WPA/WPA2)............. Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WPA (SSN IE)............................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WPA2 (RSN IE).............................. Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TKIP Cipher............................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AES Cipher.............................. Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auth Key Management&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 802.1x.................................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PSK..................................... Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CCKM.................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FT(802.11r)............................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FT-PSK(802.11r)......................... Disabled&lt;BR /&gt;FT Reassociation Timeout......................... 20&lt;BR /&gt;FT Over-The-Air mode............................. Enabled&lt;BR /&gt;FT Over-The-Ds mode.............................. Enabled&lt;BR /&gt;CCKM tsf Tolerance............................... 1000&lt;BR /&gt;&amp;nbsp;&amp;nbsp; CKIP ......................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Web Based Authentication...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Web-Passthrough............................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Conditional Web Redirect...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Splash-Page Web Redirect...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Auto Anchor................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; H-REAP Local Switching........................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; H-REAP Local Authentication................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; H-REAP Learn IP Address....................... Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client MFP.................................... Optional&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Tkip MIC Countermeasure Hold-down Timer....... 60&lt;BR /&gt;Call Snooping.................................... Disabled&lt;BR /&gt;Roamed Call Re-Anchor Policy..................... Disabled&lt;BR /&gt;SIP CAC Fail Send-486-Busy Policy................ Enabled&lt;BR /&gt;SIP CAC Fail Send Dis-Association Policy......... Disabled&lt;BR /&gt;Band Select...................................... Disabled&lt;BR /&gt;Load Balancing................................... Enabled&lt;/P&gt;&lt;P&gt; Mobility Anchor List&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 20:11:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879990#M100157</guid>
      <dc:creator>Brendan Marmont</dc:creator>
      <dc:date>2012-02-23T20:11:37Z</dc:date>
    </item>
    <item>
      <title>Max EAPOL-key M5 retransmissions exceeded for client</title>
      <link>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879991#M100158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure Fast SSID Change is enabled on your WLC (in the GUI at CONTROLLER &amp;gt; General)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are finding this is mostly smartphone devices (Droid, iOS, Blackberry) and they are being de-authenticated due to not acking the M5 broadcast key rotation; then the client was "most likely" sleeping.&amp;nbsp; Generally this is not a problem as when the device awakens it will simply re-association/authenticate with little realized impact to the end user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've seen the FastSSID Change help smartphone devices overcome moving between WLANs or even conncting at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 20:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879991#M100158</guid>
      <dc:creator>daviwatk</dc:creator>
      <dc:date>2012-02-23T20:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: Max EAPOL-key M5 retransmissions exceeded for client</title>
      <link>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879992#M100159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just actually looked at your debug and I show only a single deauthentication message which was due to non-response for an M1 key from AP to client, not an M5 broadcast key rotation.&amp;nbsp; I would suspect a client/supplicant issue in this case (well M1 or M5 really) but anyhow.&amp;nbsp; Are all these devices up to date?&amp;nbsp; It sounded like it's not "all" of the smartphone uses.&amp;nbsp; Here is the example in the debug you provided.&amp;nbsp; Looks like this happens when the client roamed to another AP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*apfMsConnTask_6: Feb 23 14:13:00.451: 3c:d0:f8:a1:98:29 Reassociation received from mobile on AP b8:62:1f:b4:07:80&lt;/P&gt;&lt;P&gt;&lt;SNIPPED&gt;&lt;/SNIPPED&gt;&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:01.933: 3c:d0:f8:a1:98:29 Starting key exchange to mobile 3c:d0:f8:a1:98:29, data packets will be dropped&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:01.933: 3c:d0:f8:a1:98:29 Sending EAPOL-Key Message to mobile 3c:d0:f8:a1:98:29 state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Feb 23 14:13:02.995: 3c:d0:f8:a1:98:29 802.1x 'timeoutEvt' Timer expired for station 3c:d0:f8:a1:98:29 and for message = M2&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:02.995: 3c:d0:f8:a1:98:29 Retransmit 1 of EAPOL-Key M1 (length 121) for mobile 3c:d0:f8:a1:98:29&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Feb 23 14:13:03.994: 3c:d0:f8:a1:98:29 802.1x 'timeoutEvt' Timer expired for station 3c:d0:f8:a1:98:29 and for message = M2&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:03.994: 3c:d0:f8:a1:98:29 Retransmit 2 of EAPOL-Key M1 (length 121) for mobile 3c:d0:f8:a1:98:29&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Feb 23 14:13:04.994: 3c:d0:f8:a1:98:29 802.1x 'timeoutEvt' Timer expired for station 3c:d0:f8:a1:98:29 and for message = M2&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:04.994: 3c:d0:f8:a1:98:29 Retransmit failure for EAPOL-Key M1 to mobile 3c:d0:f8:a1:98:29, retransmit count 3, mscb deauth count 0&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Feb 23 14:13:04.996: 3c:d0:f8:a1:98:29 Sent Deauthenticate to mobile on BSSID b8:62:1f:b4:07:80 slot 0(caller 1x_ptsm.c:534)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like the client re-associates within about 5 seconds and hits the RUN state properly.&amp;nbsp; Does this issue seem situated in a particular area, ie particular APs; or is it happening anywhere this WLAN is serviced?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 20:50:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/max-eapol-key-m5-retransmissions-exceeded-for-client/m-p/1879992#M100159</guid>
      <dc:creator>daviwatk</dc:creator>
      <dc:date>2012-02-23T20:50:54Z</dc:date>
    </item>
  </channel>
</rss>

