<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic For me, I got the same in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601926#M10766</link>
    <description>&lt;P&gt;For me, I got the same message but the situation is not the same.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/nps-error1.png" class="migrated-markup-image" /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/nps-error2.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;I follow the below doc to setup NPS.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/115988-nps-wlc-config-000.html&lt;/P&gt;
&lt;P&gt;In the above step, it said certificate could not found. If you ignore it, you will also get the same message.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Reason-Code = 22&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Reason = &lt;/SPAN&gt;&lt;STRONG&gt;The client could not be authenticated&amp;nbsp; because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After I import a computer certificate to my NPS, it works.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jun 2016 02:00:10 GMT</pubDate>
    <dc:creator>Yuk Tun Fong</dc:creator>
    <dc:date>2016-06-21T02:00:10Z</dc:date>
    <item>
      <title>EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601905#M10743</link>
      <description>&lt;P&gt;We've been struggling with this problem for weeks without a solution yet. Maybe someone can help us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: some information below has been redacted and the IP addresses are not the original ones. They have been changed to fictional IP addresses but they have been adjusted to reflect an equivalent situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This situation is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;WLAN infrastructure&lt;/STRONG&gt; with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 x &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;SPAN lang="EN-US" style="font-size: 11pt; line-height: 110%; font-family: &amp;amp;quot;Garamond&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;&lt;STRONG&gt;AIR-WLC2112-K9 &lt;/STRONG&gt;(IP address = 10.10.10.10) &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;8 x &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin:0cm;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="font-size: 11pt; line-height: 110%; font-family: &amp;amp;quot;Garamond&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;AIR-LAP1142N-E-K9&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Data for the WLC:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Product Version.................................. 6.0.199.4&lt;/P&gt;&lt;P&gt;RTOS Version..................................... 6.0.199.4&lt;/P&gt;&lt;P&gt;Bootloader Version.............................. 4.0.191.0&lt;/P&gt;&lt;P&gt;Emergency Image Version................... 6.0.199.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The WLC is connected to a switch, &lt;STRONG&gt;Cisco Catalyst model WS-C3750X-24&lt;/STRONG&gt;, sw version 12.2(53)SE2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The idea is to have the clients/supplicants (Windows XP), who have a valid certificate, authenticate against a RADIUS server. The authentication is configured as &lt;STRONG&gt;802.1x&lt;/STRONG&gt; over &lt;STRONG&gt;EAP-TLS&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The RADIUS server is a &lt;STRONG&gt;Windows 2003 Server with IAS&lt;/STRONG&gt; (IP address = 15.15.15.15). This server is accessed via a WAN link. We don't manage this server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem: no wireless client (Windows XP) is able to go past the initial authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should add that the WLC and the APs were working perfectly and clients were connecting correctly to them. However this setup was moved to a new building and, since then, nothing has worked. I must add that the configuration on the WLC and APs has not changed, since the network configuration (IP subnets, etc) was migrated from the previous building to this new one. But something has changed: the WAN router (connected to the Internet and with a VPN established to the corporate network) and the LAN equipment (switches), which are all brand new.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the RADIUS side we find these error messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fully-Qualified-User-Name = XXXXXXXXXXXX/XXXX/XXXXX/XXXX/XXXXX (&lt;STRONG&gt;it shows the correct information&lt;/STRONG&gt;)&lt;BR /&gt; NAS-IP-Address = 10.10.10.10&lt;BR /&gt; NAS-Identifier = XX-002_WLAN&lt;BR /&gt; Called-Station-Identifier = f0-25-72-70-65-xx:WLAN-XX&lt;BR /&gt; Calling-Station-Identifier = 00-1c-bf-7b-08-xx&lt;BR /&gt; Client-Friendly-Name = xxxxxxx_10.10.10.10&lt;BR /&gt; Client-IP-Address = 10.10.10.10&lt;BR /&gt; NAS-Port-Type = Wireless - IEEE 802.11&lt;BR /&gt; NAS-Port = 2&lt;BR /&gt; Proxy-Policy-Name = Use Windows authentication for all users&lt;BR /&gt; Authentication-Provider = Windows &lt;BR /&gt; Authentication-Server = &amp;lt;undetermined&amp;gt; &lt;BR /&gt; Policy-Name = Wireless LAN Access&lt;BR /&gt; Authentication-Type = EAP&lt;BR /&gt; EAP-Type = &amp;lt;undetermined&amp;gt; &lt;BR /&gt; Reason-Code = 22&lt;BR /&gt; Reason = &lt;STRONG&gt;The client could not be authenticated&amp;nbsp; because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;On the WLC side, the error messages are&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;TRAP log&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;RADIUS server 15.15.15.15:1812 failed to respond to request (ID 42) for client 00:27:10:a3:1b:xx / user 'unknown'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;SYSLOG&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;Jan 06 10:16:35 10.10.10.10 XX-002_WLAN: *Jan 06 10:16:32.709: %DOT1X-3-MAX_EAP_RETRIES: 1x_auth_pae.c:2872 Max EAP identity request retries (3) exceeded for client 00:19:d2:02:76:xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 06 10:17:05 10.10.10.10 PT-002_WLAN: *Jan 06 10:17:02.960: %DOT1X-3-ABORT_AUTH: 1x_bauth_sm.c:447 Authentication aborted for client 00:19:d2:02:76:xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 06 10:17:05 10.10.10.10 PT-002_WLAN: *Jan 06 10:17:02.961: %DOT1X-3-MAX_EAP_RETRIES: 1x_auth_pae.c:2872 Max EAP identity request retries (3) exceeded for client 00:19:d2:02:76:xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 06 10:17:36 10.10.10.10 PT-002_WLAN: *Jan 06 10:17:34.110: %DOT1X-3-ABORT_AUTH: 1x_bauth_sm.c:447 Authentication aborted for client 00:19:d2:02:76:xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 06 10:17:36 10.10.10.10 PT-002_WLAN: *Jan 06 10:17:34.110: %DOT1X-3-MAX_EAP_RETRIES: 1x_auth_pae.c:2872 Max EAP identity request retries (3) exceeded for client 00:19:d2:02:76:xx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;WLC Debug:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.708: 58:94:6b:15:f5:d0 Station 58:94:6b:15:f5:d0 setting dot1x reauth timeout = 1800&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.708: 58:94:6b:15:f5:d0 dot1x - moving mobile 58:94:6b:15:f5:d0 into Connecting state&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.708: 58:94:6b:15:f5:d0 Sending EAP-Request/Identity to mobile 58:94:6b:15:f5:d0 (EAP Id 1)&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.708: 58:94:6b:15:f5:d0 Received EAPOL START from mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.709: 58:94:6b:15:f5:d0 dot1x - moving mobile 58:94:6b:15:f5:d0 into Connecting state&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.709: 58:94:6b:15:f5:d0 Sending EAP-Request/Identity to mobile 58:94:6b:15:f5:d0 (EAP Id 2)&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.710: 58:94:6b:15:f5:d0 Received EAPOL EAPPKT from mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.710: 58:94:6b:15:f5:d0 Received EAP Response packet with mismatching id (currentid=2, eapid=1) from mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711: 58:94:6b:15:f5:d0 Received EAPOL EAPPKT from mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711: 58:94:6b:15:f5:d0 Received Identity Response (count=2) from mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711: 58:94:6b:15:f5:d0 EAP State update from Connecting to Authenticating for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711: 58:94:6b:15:f5:d0 dot1x - moving mobile 58:94:6b:15:f5:d0 into Authenticating state&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711: 58:94:6b:15:f5:d0 Entering Backend Auth Response state for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711: AuthenticationRequest: 0xd1bc104&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.711:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Callback.....................................0x87e1870&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.712:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocolType.................................0x00140001&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.712:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxyState...................................58:94:6B:15:F5:D0-9B:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.712:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet contains 12 AVPs (not shown)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.712: apfVapRadiusInfoGet: WLAN(1) dynamic int attributes srcAddr:0x0, gw:0x0, mask:0x0, vlan:0, dpPort:0, srcPort:0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.712: 58:94:6b:15:f5:d0 Successful transmission of Authentication Packet (id 231) to 15.15.15.15:1812, proxy state 58:94:6b:15:f5:d0-00:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788: 58:94:6b:15:f5:d0 Access-Challenge received from RADIUS server 15.15.15.15 for mobile 58:94:6b:15:f5:d0 receiveId = 155&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788: AuthorizationResponse: 0xa345700&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; structureSize................................145&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; resultCode...................................255&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocolUsed.................................0x00000001&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxyState...................................58:94:6B:15:F5:D0-9B:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet contains 4 AVPs (not shown)&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788: 58:94:6b:15:f5:d0 Processing Access-Challenge for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788: 58:94:6b:15:f5:d0 Entering Backend Auth Req state (id=3) for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.788: 58:94:6b:15:f5:d0 Sending EAP Request from AAA to mobile 58:94:6b:15:f5:d0 (EAP Id 3)&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.805: 58:94:6b:15:f5:d0 Received EAPOL EAPPKT from mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.805: 58:94:6b:15:f5:d0 Received EAP Response from mobile 58:94:6b:15:f5:d0 (EAP Id 3, EAP Type 13)&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.806: 58:94:6b:15:f5:d0 Entering Backend Auth Response state for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.806: AuthenticationRequest: 0xd1bc104&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.806:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Callback.....................................0x87e1870&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.806:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocolType.................................0x00140001&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.807:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxyState...................................58:94:6B:15:F5:D0-9B:01&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.807:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet contains 13 AVPs (not shown)&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.807: apfVapRadiusInfoGet: WLAN(1) dynamic int attributes srcAddr:0x0, gw:0x0, mask:0x0, vlan:0, dpPort:0, srcPort:0&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:42.807: 58:94:6b:15:f5:d0 Successful transmission of Authentication Packet (id 232) to 15.15.15.15:1812, proxy state 58:94:6b:15:f5:d0-00:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:52.531: 58:94:6b:15:f5:d0 Successful transmission of Authentication Packet (id 228) to 15.15.15.15:1812, proxy state 58:94:6b:15:f5:d0-00:00&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ..&lt;/P&gt;&lt;P&gt;*Jan 07 19:31:52.808: 58:94:6b:15:f5:d0 Successful transmission of Authentication Packet (id 232) to 15.15.15.15:1812, proxy state 58:94:6b:15:f5:d0-00:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:32:02.531: 58:94:6b:15:f5:d0 Successful transmission of Authentication Packet (id 228) to 15.15.15.15:1812, proxy state 58:94:6b:15:f5:d0-00:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:32:02.808: 58:94:6b:15:f5:d0 Successful transmission of Authentication Packet (id 232) to 15.15.15.15:1812, proxy state 58:94:6b:15:f5:d0-00:00&lt;/P&gt;&lt;P&gt;*Jan 07 19:32:12.532: 58:94:6b:15:f5:d0 Max retransmission of Access-Request (id 228) to 15.15.15.15 reached for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:32:12.532: 58:94:6b:15:f5:d0 [Error] Client requested no retries for mobile 58:94:6B:15:F5:D0&lt;/P&gt;&lt;P&gt;*Jan 07 19:32:12.533: 58:94:6b:15:f5:d0 Returning AAA Error 'Timeout' (-5) for mobile 58:94:6b:15:f5:d0&lt;/P&gt;&lt;P&gt;*Jan 07 19:32:12.533: AuthorizationResponse: 0xb99ff864&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Finally, we've also done some packet sniffing, using Wireshark and Commview. These appear to suggest that something is wrong with one of the packets and this leads to the authentication process to fail and restart again and again:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;******************** WIRESHARK CAPTURE ********************&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 0.000000&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15.15.15.15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS&amp;nbsp;&amp;nbsp; Access-Request(1) (id=125, l=280)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frame 1: 322 bytes on wire (2576 bits), 322 bytes captured (2576 bits)&lt;BR /&gt;Ethernet II, Src: Cisco_62:63:00 (f8:66:f2:62:63:00), Dst: Cisco_55:20:41 (1c:df:0f:55:20:41)&lt;BR /&gt;Internet Protocol, Src: 10.10.10.10 (10.10.10.10), Dst: 15.15.15.15 (15.15.15.15)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version: 4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header length: 20 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0000 00.. = Differentiated Services Codepoint: Default (0x00)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .... ..0. = ECN-Capable Transport (ECT): 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .... ...0 = ECN-CE: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Length: 308&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Identification: 0x501f (20511)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags: 0x02 (Don't Fragment)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragment offset: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time to live: 64&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: UDP (17)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header checksum: 0x4aee [correct]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source: 10.10.10.10 (10.10.10.10)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination: 15.15.15.15 (15.15.15.15)&lt;BR /&gt;User Datagram Protocol, Src Port: filenet-rpc (32769), Dst Port: radius (1812)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source port: filenet-rpc (32769)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination port: radius (1812)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 288&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Checksum: 0xe8e0 [validation disabled]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Good Checksum: False]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Bad Checksum: False]&lt;BR /&gt;Radius Protocol&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code: Access-Request (1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet identifier: 0x7d (125)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 280&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authenticator: 79b2f31c7e67d6fdaa7e15f362ecb025&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute Value Pairs&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=27&amp;nbsp; t=User-Name(1): XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX (&lt;STRONG&gt;username is correct!!!&lt;/STRONG&gt;)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=19&amp;nbsp; t=Calling-Station-Id(31): 00-21-6a-29-80-xx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=27&amp;nbsp; t=Called-Station-Id(30): f0-25-72-70-65-c0:WLAN-XX&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=6&amp;nbsp; t=NAS-Port(5): 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=6&amp;nbsp; t=NAS-IP-Address(4): 10.10.10.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=13&amp;nbsp; t=NAS-Identifier(32): XX-002_WLAN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=12&amp;nbsp; t=Vendor-Specific(26) v=Airespace(14179)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=6&amp;nbsp; t=Service-Type(6): Framed(2)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=6&amp;nbsp; t=Framed-MTU(12): 1300&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=6&amp;nbsp; t=NAS-Port-Type(61): Wireless-802.11(19)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=89&amp;nbsp; t=EAP-Message(79) Last Segment[1]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Extensible Authentication Protocol&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code: Response (2)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Id: 3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 87&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: EAP-TLS [RFC5216] [Aboba] (13)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags(0x80): Length &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 77&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Secure Socket Layer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=25&amp;nbsp; t=State(24): 1d68036a000001370001828b38990000000318a3088c00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=18&amp;nbsp; t=Message-Authenticator(80): 9fe1bfac02df3293ae2f8efc95de2d5d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 0.060373&amp;nbsp;&amp;nbsp;&amp;nbsp; 15.15.15.15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragmented IP protocol (proto=UDP 0x11, off=0, ID=2935) [Reassembled in #3]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frame 2: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)&lt;BR /&gt;Ethernet II, Src: Cisco_55:20:41 (1c:df:0f:55:20:41), Dst: Cisco_62:63:00 (f8:66:f2:62:63:00)&lt;BR /&gt;Internet Protocol, Src: 15.15.15.15 (15.15.15.15), Dst: 10.10.10.10 (10.10.10.10)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version: 4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header length: 20 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0000 00.. = Differentiated Services Codepoint: Default (0x00)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .... ..0. = ECN-Capable Transport (ECT): 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .... ...0 = ECN-CE: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Length: 44&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Identification: 0x2935 (10549)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags: 0x01 (More Fragments)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragment offset: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time to live: 122&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: UDP (17)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header checksum: 0x58e0 [correct]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source: 15.15.15.15 (15.15.15.15)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination: 10.10.10.10 (10.10.10.10)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Reassembled IP in frame: 3&lt;BR /&gt;Data (24 bytes)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0000&amp;nbsp; 07 14 80 01 05 69 e8 f5 0b 7d 05 61 6c 83 00 ae&amp;nbsp;&amp;nbsp; .....i...}.al...&lt;BR /&gt;0010&amp;nbsp; d0 75 05 c3 56 29 a7 b1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .u..V)..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol Info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3 0.060671&amp;nbsp;&amp;nbsp;&amp;nbsp; 15.15.15.15&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.10.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; RADIUS&amp;nbsp;&amp;nbsp; Access-challenge(11) (id=125, l=1377)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frame 3: 1395 bytes on wire (11160 bits), 1395 bytes captured (11160 bits)&lt;BR /&gt;Ethernet II, Src: Cisco_55:20:41 (1c:df:0f:55:20:41), Dst: Cisco_62:63:00 (f8:66:f2:62:63:00)&lt;BR /&gt;Internet Protocol, Src: 15.15.15.15 (15.15.15.15), Dst: 10.10.10.10 (10.10.10.10)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Version: 4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header length: 20 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0000 00.. = Differentiated Services Codepoint: Default (0x00)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .... ..0. = ECN-Capable Transport (ECT): 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .... ...0 = ECN-CE: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Length: 1381&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Identification: 0x2935 (10549)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags: 0x00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragment offset: 24&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time to live: 122&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: UDP (17)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header checksum: 0x73a4 [correct]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source: 15.15.15.15 (15.15.15.15)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination: 10.10.10.10 (10.10.10.10)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [IP Fragments (1385 bytes): #2(24), #3(1361)]&lt;BR /&gt;User Datagram Protocol, Src Port: radius (1812), Dst Port: filenet-rpc (32769)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source port: radius (1812)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination port: filenet-rpc (32769)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 1385&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Checksum: 0xe8f5 [validation disabled]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Good Checksum: False]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Bad Checksum: False]&lt;BR /&gt;Radius Protocol&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code: Access-challenge (11)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet identifier: 0x7d (125)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 1377&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authenticator: 6c8300aed07505c35629a7b14de483be&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute Value Pairs&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=6&amp;nbsp; t=Session-Timeout(27): 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session-Timeout: 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=255&amp;nbsp; t=EAP-Message(79) Segment[1]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=255&amp;nbsp; t=EAP-Message(79) Segment[2]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=255&amp;nbsp; t=EAP-Message(79) Segment[3]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=255&amp;nbsp; t=EAP-Message(79) Segment[4]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=255&amp;nbsp; t=EAP-Message(79) Segment[5]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AVP: l=33&amp;nbsp; t=EAP-Message(79) Last Segment[6]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Extensible Authentication Protocol&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code: Request (1)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Id: 4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 1296&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: EAP-TLS [RFC5216] [Aboba] (13)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags(0xC0): Length More &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 8184&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Secure Socket Layer&lt;BR /&gt;[Malformed Packet: SSL]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Expert Info (Error/Malformed): Malformed Packet (Exception occurred)]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Message: Malformed Packet (Exception occurred)]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Severity level: Error]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [Group: Malformed]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;******************** COMMVIEW CAPTURE ******************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet #6, Direction: Pass-through, Time:11:27:35,251292, Size: 323&lt;BR /&gt;Ethernet II&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination MAC: 1C:DF:0F:55:20:xx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source MAC: F8:66:F2:62:63:xx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ethertype: 0x0800 (2048) - IP&lt;BR /&gt;IP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP version: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header length: 0x05 (5) - 20 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Field: 0x00 (0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Code Point: 000000 - Default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECN-ECT: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECN-CE: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total length: 0x0135 (309)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ID: 0x2B26 (11046)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Don't fragment bit: 1 - Don't fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; More fragments bit: 0 - Last fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragment offset: 0x0000 (0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time to live: 0x40 (64)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: 0x11 (17) - UDP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Checksum: 0x6FE6 (28646) - correct&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source IP: 161.86.66.49&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination IP: 15.15.15.15&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Options: None&lt;BR /&gt;UDP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source port: 32769&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination port: 1812&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x0121 (289)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Checksum: 0x5824 (22564) - correct&lt;BR /&gt;Radius&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Code: 0x01 (1) - Access-Request&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Identifier: 0x8D (141)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packet Length: 0x0119 (281)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authenticator: 60 4E A6 58 A8 88 A2 33 4E 56 D0 E9 3B E0 62 18&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attributes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x01 (1) - User-Name&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x1A (26)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username: XXXXXXXXXXXXXXXXXXXXXXX (&lt;STRONG&gt;username is correct!!!&lt;/STRONG&gt;)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x1F (31) - Calling-Station-Id&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x11 (17)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Calling id: 58-94-6b-15-5f-xx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x1E (30) - Called-Station-Id&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x19 (25)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Called id: f0-25-72-70-65-c0:WLAN-XX&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x05 (5) - NAS-Port&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Port: 0x00000002 (2)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x04 (4) - NAS-IP-Address&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Address: 10.10.10.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x20 (32) - NAS-Identifier&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x0B (11)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAS identifier: XX-002_WLAN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x1A (26) - Vendor-Specific&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x0A (10)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vendor id: 0x00003763 (14179)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vendor specific:&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x06 (6) - Service-Type&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service type: 0x00000002 (2) - Framed&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x0C (12) - Framed-MTU&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Framed MTU: 0x00000514 (1300)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x3D (61) - NAS-Port-Type&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAS port type: 0x00000013 (19) - Wireless - IEEE 802.11&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x4F (79) - EAP-Message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x57 (87)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; EAP-Message&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x18 (24) - State&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x17 (23)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State: 1F 38 04 12 00 00 01 37 00 01 82 8B 38 99 00 00 00 03 18 A6 82 B7 00&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attribute&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type: 0x50 (80) - Message-Authenticator&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x10 (16)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Message-Authenticator: 4F 13 92 9C 10 29 C5 3A B9 AE 92 CA 74 11 6C B5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet #28, Direction: Pass-through, Time:11:27:36,523743, Size: 62&lt;BR /&gt;Ethernet II&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination MAC: F8:66:F2:62:63:xx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source MAC: 1C:DF:0F:55:20:xx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ethertype: 0x0800 (2048) - IP&lt;BR /&gt;IP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP version: 0x04 (4)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Header length: 0x05 (5) - 20 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Field: 0x00 (0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Differentiated Services Code Point: 000000 - Default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECN-ECT: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ECN-CE: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total length: 0x002C (44)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ID: 0x4896 (18582)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Don't fragment bit: 0 - May fragment&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; More fragments bit: 1 - More fragments&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fragment offset: 0x0000 (0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Time to live: 0x7A (122)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: 0x11 (17) - UDP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Checksum: 0x397F (14719) - correct&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source IP: 15.15.15.15&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination IP: 10.10.10.10&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Options: None&lt;BR /&gt;UDP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source port: 1812&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination port: 32769&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Length: 0x0569 (1385)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Checksum: 0x2FE4 (12260) - incorrect&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 02:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601905#M10743</guid>
      <dc:creator>joao.c.carvalho</dc:creator>
      <dc:date>2021-07-04T02:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601906#M10746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The important piece of this is:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The client could not be authenticated&amp;nbsp; because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This error message on the IAS/NPS server could indicate that the servers certificate has expired, that is coming from:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.tech-archive.net/Archive/Internet/microsoft.public.internet.radius/2006-10/msg00014.html"&gt;http://www.tech-archive.net/Archive/Internet/microsoft.public.internet.radius/2006-10/msg00014.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd ask the group that manages the server to check the validity period of the certificate on the server, as well as check the certs on the clients, just to be sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;Please remember to rate helpufl posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 13:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601906#M10746</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2011-01-12T13:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601907#M10747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, that is not the solution. This Radius server is used in a big enterprise, servicing WLANs from many locations. If that kind of thing (expired certificate) had ocurred, it would have been solved by now as a ton of people would have started complaining.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've also been in contact with the Radius admins and they say that things are running fine for other locations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:15:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601907#M10747</guid>
      <dc:creator>joao.c.carvalho</dc:creator>
      <dc:date>2011-01-12T14:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601908#M10748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have the server people check the client entry for this WLC.&amp;nbsp; There is a check box for message authenticator, that should be unchecked.&amp;nbsp; If that's doesn't work, you may need to get Microsoft involved, as the error appears to be on the IAS, from the information seen in this post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;Please remember to rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 15:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601908#M10748</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2011-01-12T15:59:40Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601909#M10749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will ask the Radius admins to check that. However, I doubt that is the problem. This WLAN setup, with the exact same WLC and APs (and client PCs) worked perfectly at another location. A few days later, the same WLC and APs (and clients APs) were moved to another location. All the configurations, at the Radius server and at the WLC and APs side, are the same. However, at this other location the problem started and remains.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only things that changed are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- new router (and different type of WAN access)&lt;/P&gt;&lt;P&gt;- new switches (previously HP, now Cisco)&lt;/P&gt;&lt;P&gt;- on the previous building there were no VLANs defined; on this building there are VLANs defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the rest (IP subnets, etc.) is the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible that, maybe due to some bug, the switch is mangling this packet, thus causing the packet invalid information we see on the packet sniffers? Looking at the packets, it clear that there's a proper exchange of information between WLC and Radius until, always at the same point, the Radius sends a fragmented packet that is identified, by both packet sniffers, as invalid and that stops the correct flow of message exchange between WLC and Radius.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 16:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601909#M10749</guid>
      <dc:creator>joao.c.carvalho</dc:creator>
      <dc:date>2011-01-12T16:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601910#M10750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hii ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try increasing the EAP timeout values as EAP-TLS is used over WAN connection and from WLC debugs it is clear that responce is not coming from RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good to give it a try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Vinay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 18:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601910#M10750</guid>
      <dc:creator>Vinay Saini</dc:creator>
      <dc:date>2011-01-12T18:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601911#M10751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As posted above I think this is an issue with the Windows IAS RADIUS settings. Could you have the remote admins remove and add the WLC back to the IAS configuration? Also, if you have a local Windows server it may be wroth it to config IAS/NPS on it just to test RADIUS on the local LAN. I have seen that same IAS error in many environments and it is almost always an issue with the IAS configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 22:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601911#M10751</guid>
      <dc:creator>b.garczynski</dc:creator>
      <dc:date>2011-01-12T22:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601912#M10752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joao,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This looks like an issue on the client side configuration or on the AAA server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 - EAP type not supported/configured on the client side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 - The client wants to use an EAP method that the AAA server does not support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;BR /&gt;Tiago&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;If&amp;nbsp; this helps you and/or answers your question please mark the question as&amp;nbsp; "answered" and/or rate it, so other users can easily find it.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 12:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601912#M10752</guid>
      <dc:creator>Tiago Antunes</dc:creator>
      <dc:date>2011-01-14T12:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601913#M10753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all the replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please take into consideration that this exact same Radius server + WLC + APs + clients + configuration was working perfectly. Then the WLC + APs + clients were moved to another place, where the only changes were a) new router and new WAN connection type b) new switches. Now it doesn't work at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our latest developments tend to point to a problem on the WAN side, a fragmented packet is not being handled correctly during travel between Radius to WLC/AP. Thus the checksum invalid and packet invalid errors we see when we sniff the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the issue is solved I will post here the solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Jan 2011 13:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601913#M10753</guid>
      <dc:creator>joao.c.carvalho</dc:creator>
      <dc:date>2011-01-15T13:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601914#M10754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SOLVED.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution was to change the MTU value on the RADIUS server. As soon as this was changed, everything started working perfectly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 11:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601914#M10754</guid>
      <dc:creator>joao.c.carvalho</dc:creator>
      <dc:date>2011-02-10T11:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601915#M10755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Joao,&lt;/P&gt;&lt;P&gt;I have the more or less the same problem. Where do you change the MTU value on the radius server?&lt;/P&gt;&lt;P&gt;regards, wim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 13:45:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601915#M10755</guid>
      <dc:creator>wleppens82</dc:creator>
      <dc:date>2011-07-27T13:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601916#M10756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure, because I was not envolved on that particular change. Anyway, if we're dealing with a Windows server, I suppose it must be something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://support.microsoft.com/kb/826159"&gt;http://support.microsoft.com/kb/826159&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 13:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601916#M10756</guid>
      <dc:creator>joao.c.carvalho</dc:creator>
      <dc:date>2011-07-28T13:55:05Z</dc:date>
    </item>
    <item>
      <title>EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601917#M10757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same problem and using this post I also find the solution and the explanation...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation:&lt;/P&gt;&lt;P&gt;Configure the EAP Payload Size&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/library/cc755205(WS.10).aspx"&gt;http://technet.microsoft.com/en-us/library/cc755205(WS.10).aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;P&gt;Configure the Framed-MTU Attribute&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/library/cc771164(WS.10).aspx"&gt;http://technet.microsoft.com/en-us/library/cc771164(WS.10).aspx&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jan 2012 16:15:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601917#M10757</guid>
      <dc:creator>mauricio.parra</dc:creator>
      <dc:date>2012-01-06T16:15:52Z</dc:date>
    </item>
    <item>
      <title>EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601918#M10758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Mauricio Parra wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the same problem and using this post I also find the solution and the explanation...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Explanation:&lt;/P&gt;&lt;P&gt;Configure the EAP Payload Size&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/cc755205(WS.10).aspx" rel="nofollow"&gt;http://technet.microsoft.com/en-us/library/cc755205(WS.10).aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;P&gt;Configure the Framed-MTU Attribute&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/cc771164(WS.10).aspx" rel="nofollow"&gt;http://technet.microsoft.com/en-us/library/cc771164(WS.10).aspx&lt;/A&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for this, saved me a world of hurt, almost rebuilt my NPS and CA.&lt;/P&gt;&lt;P&gt;Chaning the Framed-MTU to 1344 is the answer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jul 2013 00:09:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601918#M10758</guid>
      <dc:creator>Junior Taitt</dc:creator>
      <dc:date>2013-07-01T00:09:15Z</dc:date>
    </item>
    <item>
      <title>EAP-TLS authentication failure</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601919#M10759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We spent many hours trying to solve this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco wireless setup, using windows NPS for 802.1x authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Certificate base auth, with an internal PKI sending out client machine certs, and also the server cert. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Auth was failing with "reason code 22, The client could not be authenticated&amp;nbsp; because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It turned out to be a GPO setting on the server, that was enforcing key protection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is this note on the below technet article:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Requiring the use of strong private key protection and user prompting on all new and imported keys will disable some applications, such as Encrypting File System (EFS) and wireless (802.1X) authentication that cannot display UI. For more information, see article 320828 in the Microsoft Knowledge Base (&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://go.microsoft.com/fwlink/?LinkId=115037"&gt;http://go.microsoft.com/fwlink/?LinkId=115037&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://technet.microsoft.com/en-us/library/cc725621(v=WS.10).aspx"&gt;http://technet.microsoft.com/en-us/library/cc725621(v=WS.10).aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this helps someone out, if you have the same annoying error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Dec 2013 00:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601919#M10759</guid>
      <dc:creator>wilson.dale</dc:creator>
      <dc:date>2013-12-13T00:01:34Z</dc:date>
    </item>
    <item>
      <title>I realize this is a little</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601920#M10760</link>
      <description>&lt;P&gt;I realize this is a little dated, but I wanted to let everyone know that I had these same errors/issues and we were able to correct it by updating the server certificate on the NPS server.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 16:32:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601920#M10760</guid>
      <dc:creator>Carl Duvall</dc:creator>
      <dc:date>2015-02-25T16:32:18Z</dc:date>
    </item>
    <item>
      <title>We recently saw something</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601921#M10761</link>
      <description>&lt;P&gt;We recently saw something similar to this.&amp;nbsp; Our Cisco WLC showed a message like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="1" width="800"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;Thu Sep 24 15:16:54 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;&lt;P&gt;RADIUS server 1.1.1.1:1812 failed to respond to request (ID 217) for client f8:95:c7:a6:34:7c / user 'f8-95-c7-a6-34-7c'&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We found the LG Phones were sending an illegal EAP code of 53 which was being silently ignored by our authentication server.&amp;nbsp; According to RFC3748 the WLC should also drop this and not pass it to the authenticator in the first place.&lt;/P&gt;&lt;P&gt;Because the Auth server was silently ignoring the request, the WLC thought the auth server was dead and tried to switch to another one.&amp;nbsp; The the WLC keeps flipping between auth servers, which also cuts off other client authentications that are in progress.&amp;nbsp; This actually causes queuing issues on the auth server as well because it is waiting on the requests that got cut off by the WLC switching to another auth server.&lt;/P&gt;&lt;P&gt;Right now we are Blacklisting the MAC's of these phones as a workaround.&amp;nbsp; We need a more permanent solution of course.&amp;nbsp; It may be a while before the WLC follows the RFC and discards EAP frames with illegal codes.&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2015 13:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601921#M10761</guid>
      <dc:creator>brian.holmes</dc:creator>
      <dc:date>2015-09-25T13:25:38Z</dc:date>
    </item>
    <item>
      <title>The WLC is only forwarding</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601922#M10762</link>
      <description>&lt;P&gt;The WLC is only forwarding the packet and not inspecting it prior to sending it to the radius server. It unfortunately has no way to tell if the packet contains an invalid EAP type. Depending on your radius server, if you can posture you can possibly make a rule that has the radius server reply to the WLC with a "deny" even though this does not follow the RFC. You can then create a rule to automatically blacklist a device after X amount of unsuccessful login authentication attempts. Not the best solution but depending on your radius server it will automate the process of blacklisting those devices and end the issue with the DoS you have occurring with the timeouts.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 15:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601922#M10762</guid>
      <dc:creator>zdesignstudio</dc:creator>
      <dc:date>2015-10-14T15:26:24Z</dc:date>
    </item>
    <item>
      <title>Hi Guys,I know this quite old</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601923#M10763</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I know this quite old but is it possible to change the framed mtu on Cisco ISE?&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2015 11:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601923#M10763</guid>
      <dc:creator>ele203026</dc:creator>
      <dc:date>2015-10-24T11:24:02Z</dc:date>
    </item>
    <item>
      <title>ISE always tries to send EAP</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601924#M10764</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ISE always tries to send EAP-TLS fragments (usually Server Hello with Certificate) that are 1,002 bytes long (although the last fragment is usually smaller). It does not honor the RADIUS Framed-MTU. It is not possible to reconfigure it to send bigger EAP-TLS fragments.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2015 14:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure/m-p/1601924#M10764</guid>
      <dc:creator>zdesignstudio</dc:creator>
      <dc:date>2015-11-03T14:03:59Z</dc:date>
    </item>
  </channel>
</rss>

