<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clients cannot connect to a wireless network  (&amp;quot;Received EAPOL-key M2 with invalid MIC from mobile&amp;quot;) in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193841#M223889</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Interesting remark; the radius-part of the debug logs is shown below , I do not know whether this contradicts your assertion or not, is the subsequent/multiple&amp;nbsp; contacting of the radius server suspicious in that context ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="table table--striped table--wrapped table--bordered"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.241&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 63 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.339&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 64 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.436&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 65 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.537&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 66 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.649&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 67 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.745&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 68 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.846&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 69 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.956&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 70 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.053&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 71 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.154&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;RADIUS Server permitted access&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Sat, 05 Dec 2020 08:03:37 GMT</pubDate>
    <dc:creator>Mark Elsen</dc:creator>
    <dc:date>2020-12-05T08:03:37Z</dc:date>
    <item>
      <title>Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193815#M223886</link>
      <description>&lt;P&gt;Hello Experts!&lt;/P&gt;&lt;P&gt;I'm trying to connect a laptop with Windows 10 to AIR-AP2802I using a native sapplicant.&lt;BR /&gt;Security Policy - WPA2Enterprise. Radius Server - External.&lt;/P&gt;&lt;P&gt;In all cases, after authentication on the Radius server, I receive the same error:&lt;/P&gt;&lt;P&gt;"Received EAPOL-key M2 with invalid MIC from mobile"&lt;/P&gt;&lt;P&gt;The same picture with an attempt to connect with Android.&lt;/P&gt;&lt;P&gt;If you put a Cisco NAM on your laptop (in addition to the Cisco AnyConnect Security Mobility Client),&lt;BR /&gt;then with Cisco supplicant, the connection occurs without problems.&lt;/P&gt;&lt;P&gt;But with a built-in supplicant, there is always a problem&lt;/P&gt;&lt;P&gt;This may be due to a different version of EAPOL on the AP and client, or an incorrect basic configuration of the AP and controller.&lt;/P&gt;&lt;P&gt;This is my first mobility express device and I may have made some errors in the basic controller and AP configuration.&lt;BR /&gt;See the MEC settings screens and client connection logs, please!&lt;BR /&gt;Maybe someone will tell me how to solve the problem of connecting Winsows 10 and smartphones.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---------------------------------------------------------&lt;BR /&gt;Some Cisco Community recommendations for similar issues are used:&lt;BR /&gt;- the latest NIC drivers are delivered to the laptop&lt;BR /&gt;- on AP settings PMF - Disabled (default)&lt;BR /&gt;- different eapol-key-timeout tried&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 19:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193815#M223886</guid>
      <dc:creator>sergeydrako</dc:creator>
      <dc:date>2021-07-05T19:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193833#M223887</link>
      <description>I’m willing to bet it’s your radius policy.  Create a new policy with basic rules for EAP-PEAP or EAP-TLS, whichever you plan on using and make sure the policy is getting hit. Then review the logs.  On the wireless, it’s pretty basic, you define your 802.1x and then point to your radius. &lt;BR /&gt;</description>
      <pubDate>Sat, 05 Dec 2020 07:49:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193833#M223887</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2020-12-05T07:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193837#M223888</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Try to disable 802.11r - fast roaming (too). Below you will find the output from :&amp;nbsp;&lt;A href="https://cway.cisco.com/wireless-debug-analyzer/" target="_blank"&gt;https://cway.cisco.com/wireless-debug-analyzer/&lt;/A&gt;&amp;nbsp;following&amp;nbsp; the input of &lt;STRONG&gt;Debug_client.txt&lt;/STRONG&gt;. You may need to re-run that yourself as the forum may wrap this output. Toggling with the flags at the header of the output may also be useful :&lt;/P&gt;
&lt;DIV class="content base-margin-top"&gt;
&lt;DIV class="row justify-content-center"&gt;
&lt;DIV class="ng-container col-10"&gt;
&lt;DIV class="ng-container"&gt;
&lt;DIV class="base-margin-top base-margin-bottom"&gt;
&lt;DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR /&gt;TimeTaskTranslated
&lt;TABLE class="table table--striped table--wrapped table--bordered"&gt;
&lt;THEAD&gt;&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.438&lt;/TD&gt;
&lt;TD&gt;*apfMsConnTask_0&lt;/TD&gt;
&lt;TD&gt;Client made new Association to AP/BSSID BSSID ac:4a:67:d2:d8:cf AP AP2802i_01&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.439&lt;/TD&gt;
&lt;TD&gt;*apfMsConnTask_0&lt;/TD&gt;
&lt;TD&gt;The WLC/AP has found from client association request Information Element that claims PMKID Caching support&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.439&lt;/TD&gt;
&lt;TD&gt;*apfMsConnTask_0&lt;/TD&gt;
&lt;TD&gt;The Reassociation Request from the client comes with 0 PMKID&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.439&lt;/TD&gt;
&lt;TD&gt;*apfMsConnTask_0&lt;/TD&gt;
&lt;TD&gt;Client is entering the 802.1x or PSK Authentication state&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.439&lt;/TD&gt;
&lt;TD&gt;*apfMsConnTask_0&lt;/TD&gt;
&lt;TD&gt;Client has successfully cleared AP association phase&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.440&lt;/TD&gt;
&lt;TD&gt;*apfMsConnTask_0&lt;/TD&gt;
&lt;TD&gt;WLC/AP is sending an Association Response to the client with status code 0 = Successful association&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.445&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;Client will be required to Reauthenticate in 1800&lt;BR /&gt;seconds&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:18:51.445&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;WLC/AP is sending EAP-Identity-Request to the client&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.240&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;Client sent EAP-Identity-Response to WLC/AP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.241&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 63 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.339&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 64 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.436&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 65 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.537&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 66 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.649&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 67 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.745&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 68 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.846&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 69 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.956&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 70 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.053&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 71 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.154&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;RADIUS Server permitted access&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.155&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;Client will be required to Reauthenticate in 1800&lt;BR /&gt;seconds&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.156&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Sending M1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.167&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Received M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.409&lt;/TD&gt;
&lt;TD&gt;*osapiBsnTimer&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Client did not respond with M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.409&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Retransmitting M1 retry #1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.411&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Received M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.607&lt;/TD&gt;
&lt;TD&gt;*osapiBsnTimer&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Client did not respond with M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.607&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Retransmitting M1 retry #2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.609&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Received M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.806&lt;/TD&gt;
&lt;TD&gt;*osapiBsnTimer&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Client did not respond with M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.806&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;Client has been deauthenticated&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.806&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;Client expiration timer code set for 10 seconds. The reason: Roaming failed due to WLAN security policy mismatch between controllers (configuration error). It can also be used to report EAPoL retry errors, and GTK rotation failure (in 8.5)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;FOOTER class="footer no-margin"&gt;
&lt;DIV class="footer__links"&gt;
&lt;UL class="list list--inline"&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/FOOTER&gt;</description>
      <pubDate>Sat, 05 Dec 2020 07:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193837#M223888</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-12-05T07:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193841#M223889</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Interesting remark; the radius-part of the debug logs is shown below , I do not know whether this contradicts your assertion or not, is the subsequent/multiple&amp;nbsp; contacting of the radius server suspicious in that context ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="table table--striped table--wrapped table--bordered"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.241&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 63 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.339&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 64 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.436&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 65 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.537&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 66 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.649&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 67 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.745&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 68 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.846&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 69 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:04.956&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 70 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.053&lt;/TD&gt;
&lt;TD&gt;*aaaQueueReader&lt;/TD&gt;
&lt;TD&gt;Radius request with ID 71 sent to 172.16.55.215.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Nov 29 20:19:05.154&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_0&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;RADIUS Server permitted access&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Sat, 05 Dec 2020 08:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193841#M223889</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-12-05T08:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193966#M223894</link>
      <description>&lt;P&gt;can we see step you do in wireless client to connect to AP,&lt;/P&gt;&lt;P&gt;also NAM config&amp;nbsp;&lt;BR /&gt;if you can.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Dec 2020 00:04:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193966#M223894</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-12-06T00:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193994#M223898</link>
      <description>&lt;P&gt;Thanks for the answer, but 802.11r disabled in MEC settings.&lt;/P&gt;&lt;P&gt;It is confusing that when using a Cisco (Network Access Manager) supplicant, the connection occurs without problems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Dec 2020 17:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193994#M223898</guid>
      <dc:creator>sergeydrako</dc:creator>
      <dc:date>2020-12-05T17:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193999#M223900</link>
      <description>&lt;P&gt;Thanks for the answer! That's probably the reason. But сreated authentication and authorization policies, judging by the log they pass successfully and access is allowed by Radius server with Authorization Result - PermitAccess&lt;/P&gt;&lt;P&gt;This is the radius server (ISE 2.0) log:&lt;/P&gt;&lt;P&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11017 RADIUS created a new session&lt;BR /&gt;15049 Evaluating Policy Group&lt;BR /&gt;15008 Evaluating Service Selection Policy&lt;BR /&gt;15048 Queried PIP - Radius.Called-Station-ID&lt;BR /&gt;15004 Matched rule - WiFi Ondskaya GES&lt;BR /&gt;11507 Extracted EAP-Response/Identity&lt;BR /&gt;12300 Prepared EAP-Request proposing PEAP with challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12302 Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated&lt;BR /&gt;12318 Successfully negotiated PEAP version 0&lt;BR /&gt;12800 Extracted first TLS record; TLS handshake started&lt;BR /&gt;12805 Extracted TLS ClientHello message&lt;BR /&gt;12806 Prepared TLS ServerHello message&lt;BR /&gt;12807 Prepared TLS Certificate message&lt;BR /&gt;12810 Prepared TLS ServerDone message&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12318 Successfully negotiated PEAP version 0&lt;BR /&gt;12812 Extracted TLS ClientKeyExchange message&lt;BR /&gt;12813 Extracted TLS CertificateVerify message&lt;BR /&gt;12804 Extracted TLS Finished message&lt;BR /&gt;12801 Prepared TLS ChangeCipherSpec message&lt;BR /&gt;12802 Prepared TLS Finished message&lt;BR /&gt;12816 TLS handshake succeeded&lt;BR /&gt;12310 PEAP full handshake finished successfully&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;12313 PEAP inner method started&lt;BR /&gt;11521 Prepared EAP-Request/Identity for inner EAP method&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11522 Extracted EAP-Response/Identity for inner EAP method&lt;BR /&gt;11806 Prepared EAP-Request for inner method proposing EAP-MSCHAP with challenge&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11808 Extracted EAP-Response containing EAP-MSCHAP challenge-response for inner method and accepting EAP-MSCHAP as negotiated&lt;BR /&gt;15041 Evaluating Identity Policy&lt;BR /&gt;15006 Matched Default Rule&lt;BR /&gt;15013 Selected Identity Source - ie.corp&lt;BR /&gt;24430 Authenticating user against Active Directory - ie.corp&lt;BR /&gt;24325 Resolving identity - ie\DrakoSN&lt;BR /&gt;24313 Search for matching accounts at join point - ie.corp&lt;BR /&gt;24315 Single matching account found in domain - ie.corp&lt;BR /&gt;24367 Skipping unusable domain - RESOURCE.LOCAL,Domain trust is one-way&lt;BR /&gt;24323 Identity resolution detected single matching account&lt;BR /&gt;24343 RPC Logon request succeeded - DrakoSN@ie.corp&lt;BR /&gt;24402 User authentication against Active Directory succeeded - ie.corp&lt;BR /&gt;22037 Authentication Passed&lt;BR /&gt;11824 EAP-MSCHAP authentication attempt passed&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;11810 Extracted EAP-Response for inner method containing MSCHAP challenge-response&lt;BR /&gt;11814 Inner EAP-MSCHAP authentication succeeded&lt;BR /&gt;11519 Prepared EAP-Success for inner EAP method&lt;BR /&gt;12314 PEAP inner method finished successfully&lt;BR /&gt;12305 Prepared EAP-Request with another PEAP challenge&lt;BR /&gt;11006 Returned RADIUS Access-Challenge&lt;BR /&gt;11001 Received RADIUS Access-Request&lt;BR /&gt;11018 RADIUS is re-using an existing session&lt;BR /&gt;12304 Extracted EAP-Response containing PEAP challenge-response&lt;BR /&gt;24423 ISE has not been able to confirm previous successful machine authentication&lt;BR /&gt;15036 Evaluating Authorization Policy&lt;BR /&gt;15048 Queried PIP - Radius.Called-Station-ID&lt;BR /&gt;15004 Matched rule - WiFi Ondskaya GES test&lt;BR /&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;15016 Selected Authorization Profile - PermitAccess&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;12306 PEAP authentication succeeded&lt;BR /&gt;11503 Prepared EAP-Success&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#339966"&gt;11002 Returned RADIUS Access-Accept&lt;/FONT&gt; &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Dec 2020 17:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4193999#M223900</guid>
      <dc:creator>sergeydrako</dc:creator>
      <dc:date>2020-12-05T17:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4194019#M223902</link>
      <description>&lt;P&gt;What version of software running on&amp;nbsp; ME? If you haven't tried with a different (latest) image, I would try that as it could be a bug&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Rasika&lt;/P&gt;</description>
      <pubDate>Sat, 05 Dec 2020 19:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4194019#M223902</guid>
      <dc:creator>Rasika Nayanajith</dc:creator>
      <dc:date>2020-12-05T19:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Clients cannot connect to a wireless network  ("Received EAPOL-key M2 with invalid MIC from mobile")</title>
      <link>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4194457#M223934</link>
      <description>&lt;P&gt;Thank you for helping everyone who responded! Problem solved. After installing another version of Radius server (delivered more recent), everything worked. The ME Controller setting has not changed.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 11:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-cannot-connect-to-a-wireless-network-quot-received-eapol/m-p/4194457#M223934</guid>
      <dc:creator>sergeydrako</dc:creator>
      <dc:date>2020-12-07T11:45:29Z</dc:date>
    </item>
  </channel>
</rss>

