<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You can adjust the number of in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717585#M217103</link>
    <description>&lt;P&gt;You can adjust the number of attempts a client makes before it gets excluded...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0111010.html" target="_blank"&gt;Excluded Clients&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Steve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 May 2015 15:24:47 GMT</pubDate>
    <dc:creator>Stephen Rodriguez</dc:creator>
    <dc:date>2015-05-28T15:24:47Z</dc:date>
    <item>
      <title>Failed Radius requests increase possible?</title>
      <link>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717584#M217102</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;We have a Cisco WLC 7.0.240.0 based infrastructure with Radius servers and a Windows domain. Some clients are joined, some are BYOD. Our SSID is protected with WPA2-Enterprise PEAP-MSCHAPv2 username/password authentication. No certificate and no machine authentication.&lt;/P&gt;&lt;P&gt;Now Windows default behavior, for devices joined to some domain, is to send the machine name as username when connecting the first few tries and only later the logged in username/password.&lt;/P&gt;&lt;P&gt;My WLC will block the client because of excessive, wrong authentication tries for a few seconds. This makes it impossible to join the client automatically, without manually creating the wifi-profile and disabling the "automatic machine or user authentication" option.&lt;/P&gt;&lt;P&gt;It looks like the WLC will block the client after 3 unsuccessful authentication tries.&lt;/P&gt;&lt;P&gt;Is there a way to increase those 3 to maybe 5 or 10? I have the hope that this is enough for Windows to change to the username/password combo instead of machine name.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 10:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717584#M217102</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2021-07-05T10:18:51Z</dc:date>
    </item>
    <item>
      <title>You can adjust the number of</title>
      <link>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717585#M217103</link>
      <description>&lt;P&gt;You can adjust the number of attempts a client makes before it gets excluded...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_0111010.html" target="_blank"&gt;Excluded Clients&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Steve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2015 15:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717585#M217103</guid>
      <dc:creator>Stephen Rodriguez</dc:creator>
      <dc:date>2015-05-28T15:24:47Z</dc:date>
    </item>
    <item>
      <title>Hmm based on your link:Step 4</title>
      <link>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717586#M217104</link>
      <description>&lt;P&gt;Hmm based on your link:&lt;/P&gt;&lt;TABLE border="0" cellpadding="3" cellspacing="0" class="stepTable" width="90%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD align="left" valign="top"&gt;&lt;B&gt;Step&amp;nbsp;4&lt;/B&gt;&amp;nbsp;&amp;nbsp;&lt;/TD&gt;&lt;TD class="stepexpand" valign="top"&gt;&lt;A name="ID3418__step_95E050C0F1A64903BE0E6D959973B13E"&gt;&lt;!-- --&gt;&lt;/A&gt;&lt;SPAN&gt;Configure the controller to exclude clients that reaches the maximum failure 802.1X authentication attempt with the RADIUS server by entering this command: &lt;/SPAN&gt; &lt;SPAN class="synph"&gt;&lt;SPAN class="kwd"&gt;config wps client-exclusion 802.1x-auth&lt;/SPAN&gt; &lt;SPAN class="kwd"&gt;max-1x-aaa-fail-attempts&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;P&gt;You can configure the maximum failure 802.1X authentication attempt from 1 to 3 and the default value is 3.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;So the maximum seems to be only&amp;nbsp;3 &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oh and that command is not available for 7.0.&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2015 05:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717586#M217104</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2015-05-29T05:40:27Z</dc:date>
    </item>
    <item>
      <title>Hi,Yes config wps client</title>
      <link>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717587#M217105</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;Yes &lt;STRONG&gt;config wps client-exclusion 802.1x-auth max-1x-aaa-fail-attempts&lt;/STRONG&gt; is not available in 7.0 code.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3 class="p_H_Head2"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;Using the GUI to Configure Client Exclusion Policies&lt;/SPAN&gt;&lt;/H3&gt;&lt;P class="pB1_Body1"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;To configure client exclusion policies using the controller GUI, follow these steps:&lt;/SPAN&gt;&lt;/P&gt;&lt;HR noshade="noshade" /&gt;&lt;P class="pSF_StepFirst"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;B&gt;Step&amp;nbsp;1 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;Choose &lt;B class="cBold"&gt;Security&lt;/B&gt; &amp;gt; &lt;B class="cBold"&gt;Wireless Protection Policies&lt;/B&gt; &amp;gt; &lt;B class="cBold"&gt;Client Exclusion Policies&lt;/B&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV align="left"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;IMG border="0" hspace="0" id="wp1719653" src="http://www.cisco.com/c/dam/en/us/td/i/200001-300000/270001-280000/274001-275000/274689.tif/_jcr_content/renditions/274689.jpg" vspace="0" /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV align="left"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P class="pSN_StepNext"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;B&gt;Step&amp;nbsp;2 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;Select any of these check boxes if you want the controller to exclude clients for the condition specified. The default value for each exclusion policy is enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;&lt;B class="cBold"&gt;Excessive 802.11 Association Failures&lt;/B&gt;—Clients are excluded on the sixth 802.11 association attempt, after five consecutive failures.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;&lt;B class="cBold"&gt;Excessive 802.11 Authentication Failures&lt;/B&gt;—Clients are excluded on the sixth 802.11 authentication attempt, after five consecutive failures.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;&lt;B class="cBold"&gt;Excessive 802.1X Authentication Failures&lt;/B&gt;—Clients are excluded on the fourth 802.1X authentication attempt, after three consecutive failures.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;&lt;B class="cBold"&gt;IP Theft or IP Reuse&lt;/B&gt;—Clients are excluded if the IP address is already assigned to another device.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;&lt;B class="cBold"&gt;Excessive Web Authentication Failures&lt;/B&gt;—Clients are excluded on the fourth web authentication attempt, after three consecutive failures.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;B&gt;Step&amp;nbsp;3 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;Click &lt;B class="cBold"&gt;Apply&lt;/B&gt; to commit your changes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pSN_StepNext"&gt;&lt;SPAN style="font-family:times new roman,times,serif;"&gt;&lt;B&gt;Step&amp;nbsp;4 &lt;/B&gt;&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="5" /&gt;Click &lt;B class="cBold"&gt;Save Configuration&lt;/B&gt; to save your changes.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jun 2015 08:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/failed-radius-requests-increase-possible/m-p/2717587#M217105</guid>
      <dc:creator>abwahid</dc:creator>
      <dc:date>2015-06-09T08:55:36Z</dc:date>
    </item>
  </channel>
</rss>

