<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: EAP-TLS Authentication failure over  WiFi in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730176#M248944</link>
    <description>&lt;P&gt;Thanks . I will check the links&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Nov 2022 08:10:48 GMT</pubDate>
    <dc:creator>HAT</dc:creator>
    <dc:date>2022-11-30T08:10:48Z</dc:date>
    <item>
      <title>EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729621#M248909</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I have been trying to deploy a wireless solution but been stuck with appears to be an authentication failure with the Radius Server .&amp;nbsp;The device is an&amp;nbsp; Intune laptop&amp;nbsp; &amp;nbsp;attempting to connect&amp;nbsp; to a Meraki managed SSID&amp;nbsp; but&amp;nbsp; every attempt has&amp;nbsp; been unsuccessful so far&amp;nbsp; &amp;nbsp;.&amp;nbsp; I m using Meraki&amp;nbsp;APs connected over a trunk to a Meraki switch that eventually traverses the Wan to the target radius server . All the required routing is in place to ensure the 802.1x messages can reach ISE , can also confirm&amp;nbsp; the device and CA root&amp;nbsp; certificates on the test device have been properly configured and that the correct policy is being hit on ISE&lt;/P&gt;&lt;P&gt;EAP-TLS is being used as the&amp;nbsp; authentication method in this scenario&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find below the ISE logs for the failed authentication&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;&lt;SPAN&gt;Steps&lt;/SPAN&gt;&lt;/H3&gt;&lt;TABLE border="0" cellpadding="3"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11017&lt;/TD&gt;&lt;TD&gt;RADIUS created a new session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11117&lt;/TD&gt;&lt;TD&gt;Generated a new session ID&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15049&lt;/TD&gt;&lt;TD&gt;Evaluating Policy Group&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15008&lt;/TD&gt;&lt;TD&gt;Evaluating Service Selection Policy&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Network Access.UserName&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;15048&lt;/TD&gt;&lt;TD&gt;Queried PIP - Radius.Called-Station-ID&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11507&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response/Identity&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12500&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request proposing EAP-TLS with challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12502&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response and accepting EAP-TLS as negotiated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12800&lt;/TD&gt;&lt;TD&gt;Extracted first TLS record; TLS handshake started&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12545&lt;/TD&gt;&lt;TD&gt;Client requested EAP-TLS session ticket&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12805&lt;/TD&gt;&lt;TD&gt;Extracted TLS ClientHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12806&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerHello message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12807&lt;/TD&gt;&lt;TD&gt;Prepared TLS Certificate message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12808&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerKeyExchange message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12809&lt;/TD&gt;&lt;TD&gt;Prepared TLS CertificateRequest message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12810&lt;/TD&gt;&lt;TD&gt;Prepared TLS ServerDone message&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request (&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Step latency=2588 ms)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11001&lt;/TD&gt;&lt;TD&gt;Received RADIUS Access-Request&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11018&lt;/TD&gt;&lt;TD&gt;RADIUS is re-using an existing session&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12504&lt;/TD&gt;&lt;TD&gt;Extracted EAP-Response containing EAP-TLS challenge-response&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12505&lt;/TD&gt;&lt;TD&gt;Prepared EAP-Request with another EAP-TLS challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;11006&lt;/TD&gt;&lt;TD&gt;Returned RADIUS Access-Challenge&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;12935&lt;/TD&gt;&lt;TD&gt;Supplicant stopped responding to ISE during EAP-TLS certificate exchange (&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Step latency=120000 ms)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;61025&lt;/TD&gt;&lt;TD&gt;Open secure connection with TLS peer&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;5411&lt;/TD&gt;&lt;TD&gt;Supplicant stopped responding to ISE&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Tue, 29 Nov 2022 11:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729621#M248909</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-11-29T11:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729638#M248913</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;- Check the logs on the radius server for this particular authentication (too).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 11:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729638#M248913</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-11-29T11:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729857#M248927</link>
      <description>&lt;P&gt;Hi .&lt;/P&gt;&lt;P&gt;Thanks for the reply , not sure what you mean , ISE is the radius server and the above is the 802.1x sequence&amp;nbsp; for the failed authentication . Also attaching additional information .&lt;/P&gt;&lt;P&gt;Thanks in advance&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 17:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729857#M248927</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-11-29T17:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729879#M248931</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Ok&amp;nbsp; , check these threads for hints :&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/some-win-10-clients-get-quot-12935-supplicant-stopped-responding/td-p/4031608" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/some-win-10-clients-get-quot-12935-supplicant-stopped-responding/td-p/4031608&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/12935-supplicant-stopped-responding-to-ise-during-eap-tls/td-p/4577834" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/12935-supplicant-stopped-responding-to-ise-during-eap-tls/td-p/4577834&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/td-p/4084578" target="_blank"&gt;https://community.cisco.com/t5/network-access-control/5411-supplicant-stopped-responding-to-ise-quot-use-eap-tls-for/td-p/4084578&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 18:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4729879#M248931</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-11-29T18:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730176#M248944</link>
      <description>&lt;P&gt;Thanks . I will check the links&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 08:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730176#M248944</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-11-30T08:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730594#M248979</link>
      <description>&lt;P&gt;My guess is that the client is not trusting the cert from ISE so it stops responding.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 21:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730594#M248979</guid>
      <dc:creator>Wes Schochet</dc:creator>
      <dc:date>2022-11-30T21:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730882#M249010</link>
      <description>&lt;P&gt;Thanks for the feedback , I did&amp;nbsp; suspect a certificate trust issue but the certificate chain between the client and server appears to be correct since similar devices can connect fine on the same SSID Onprem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I m now looking some timeout or MTU&amp;nbsp; related issues&amp;nbsp; as traffic traverses the Wan for the client to authenticate on the OnPrem radius server ( ISE)&lt;/P&gt;&lt;P&gt;Any further help will be greatly&amp;nbsp;&lt;SPAN&gt;appreciated&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 11:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4730882#M249010</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-12-01T11:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4741738#M249624</link>
      <description>&lt;P&gt;Hi All .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have lowered&amp;nbsp; the MTU onto the switch the APs are connected to but that hasn't made&amp;nbsp; a difference .However, I just noticed that&amp;nbsp; &amp;nbsp;that the APs Radius requests are experiencing some packet drops as they hit our Onprem firewall ( yes there s a firewall indeed ).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any idea why ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The packet capture in attachment has been obtained from the firewall.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-12-19 11_25_34-drop (3).pcap.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/171358iDAC7AA104398F0B1/image-size/large?v=v2&amp;amp;px=999" role="button" title="2022-12-19 11_25_34-drop (3).pcap.png" alt="2022-12-19 11_25_34-drop (3).pcap.png" /&gt;&lt;/span&gt;Thanks in advance for all you input&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 11:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4741738#M249624</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-12-19T11:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4741868#M249634</link>
      <description>&lt;P&gt;I have similar issues with EAP-TLS, but its only to our ISE 3.2 PSN's in Azure.&amp;nbsp; Our issue is a mtu mismatch between our tunnel from our DC to Azure which I think is the issue.&amp;nbsp; Folks suggested to look at all the mtu configurations on the path and see if you have a mismatch.&amp;nbsp; Typically some FW's will drop fragmented packets which I think you are seeing.&amp;nbsp; Also ISE 3.1, you can define the mtu on Gig 0, but before that, look at the mtu configuration on all devices along the path to ISE.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 16:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4741868#M249634</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2022-12-19T16:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742520#M249657</link>
      <description>&lt;P&gt;Thanks for the feedback . The devices MTU along the path are configured as follow&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client MTU : 1500&lt;/P&gt;&lt;P&gt;Meraki Switch ( Remote site ) :&amp;nbsp;9578&lt;/P&gt;&lt;P&gt;Wan Router MTU ( Remote site) : 1500&lt;/P&gt;&lt;P&gt;Wan Router MTU ( Head Office) : 1500&lt;/P&gt;&lt;P&gt;Firewall ( Head Office ) : 1500 ( this s where we are seeing some packet drops)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 10:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742520#M249657</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-12-20T10:57:18Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742705#M249678</link>
      <description>&lt;P&gt;What you have to look at is the overhead that might be added between the Wan and the FW.&amp;nbsp; If you are seeing the FW dro the packets, its most likely because of fragmentation, so you might have to drop the mtu more that what you have.&amp;nbsp; I'm no expert in mtu, but since I have similar issues, folks are guiding me to change the mtu or make sure it isn't fragmenting EAP packets.&amp;nbsp; Have you tried to set the mtu on the client or the Meraki Switch lower than 1500?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 15:54:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742705#M249678</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2022-12-20T15:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742745#M249688</link>
      <description>&lt;P&gt;Hi Scott&lt;/P&gt;&lt;P&gt;Thanks for advising , 1500 is the lowest the Meraki switch&amp;nbsp; can be lowered to . Tried that but no luck . Will test locally so I can determine whether this is Wan related or not .&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742745#M249688</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2022-12-20T17:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742757#M249689</link>
      <description>&lt;P&gt;In my case, any ISE instance that is not going over our tunnel to Azure Virtual Gateway works fine.&amp;nbsp; for us, it is a possible mtu mismatch.&amp;nbsp; I think if you have an ISE node locally that doesn't hit your Fw, you will be fine as switches and routers will reassemble the packets.&lt;/P&gt;
&lt;P&gt;Search online, "firewall droping eap-tls"&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4742757#M249689</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2022-12-20T17:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: EAP-TLS Authentication failure over  WiFi</title>
      <link>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4759493#M250684</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;Just to let you know&amp;nbsp; the matter is now solved . Our on Prem Firewall had a Zone protection profile&amp;nbsp; with a setting instructing&amp;nbsp; the firewall to drop fragmented traffic .&lt;/P&gt;&lt;P&gt;Once&amp;nbsp; that setting was updated it worked .&lt;/P&gt;&lt;P&gt;Thanks all for your contributions&lt;/P&gt;</description>
      <pubDate>Sun, 22 Jan 2023 22:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/eap-tls-authentication-failure-over-wifi/m-p/4759493#M250684</guid>
      <dc:creator>HAT</dc:creator>
      <dc:date>2023-01-22T22:10:26Z</dc:date>
    </item>
  </channel>
</rss>

