<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Fab Mode APs - Wireless Client Authentication Sessions on switch int in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4733299#M249223</link>
    <description>&lt;P&gt;Hi all, hoping that somebody out there might have seen something similar to what we're currently experiencing?&lt;/P&gt;&lt;P&gt;Basically, we are seeing issues whereby clients are associating to a SSID configured for 802.1x, being authenticated successfully (ISE Policy Set filtering on the WLC) and then allowed connection to the appropriate network as per defined VNID... However, at some point after that authentication, approx 45mins according to support chaps the users report a loss of connectivity and have to connect to the wired network.&lt;/P&gt;&lt;P&gt;This is where it gets interesting, when we look in ISE we can see that the clients wireless MAC address is now hitting authentication policies within a policy set that is filtered on the Switch hostnames and where the MAB request is coming from the switch interface where the AP is configured. This means that we see a load of MACs on the switch port;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="StevieC666_0-1670327447781.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/169983i5AB3AE4080D8ACB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="StevieC666_0-1670327447781.png" alt="StevieC666_0-1670327447781.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After extensive searching I've found a bug&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb87363" target="_blank" rel="noopener"&gt;CSCwb87363 : Bug Search Tool (cisco.com)&lt;/A&gt;&amp;nbsp;which appears to be along similar lines however there's no detail.&lt;/P&gt;&lt;P&gt;We've had a TAC case open for this whereby it was intimated that there was an ISE policy configuration issue, I've guided my support colleagues to go back to TAC with the above bug reference.&lt;/P&gt;&lt;P&gt;The affected users if they physically roam to another AP immediately authenticate and get onboarded as expected, I'm not sure if the problem follows them around as we've not ascertained that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Dec 2022 12:32:33 GMT</pubDate>
    <dc:creator>StevieC666</dc:creator>
    <dc:date>2022-12-06T12:32:33Z</dc:date>
    <item>
      <title>Fab Mode APs - Wireless Client Authentication Sessions on switch int</title>
      <link>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4733299#M249223</link>
      <description>&lt;P&gt;Hi all, hoping that somebody out there might have seen something similar to what we're currently experiencing?&lt;/P&gt;&lt;P&gt;Basically, we are seeing issues whereby clients are associating to a SSID configured for 802.1x, being authenticated successfully (ISE Policy Set filtering on the WLC) and then allowed connection to the appropriate network as per defined VNID... However, at some point after that authentication, approx 45mins according to support chaps the users report a loss of connectivity and have to connect to the wired network.&lt;/P&gt;&lt;P&gt;This is where it gets interesting, when we look in ISE we can see that the clients wireless MAC address is now hitting authentication policies within a policy set that is filtered on the Switch hostnames and where the MAB request is coming from the switch interface where the AP is configured. This means that we see a load of MACs on the switch port;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="StevieC666_0-1670327447781.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/169983i5AB3AE4080D8ACB6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="StevieC666_0-1670327447781.png" alt="StevieC666_0-1670327447781.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After extensive searching I've found a bug&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb87363" target="_blank" rel="noopener"&gt;CSCwb87363 : Bug Search Tool (cisco.com)&lt;/A&gt;&amp;nbsp;which appears to be along similar lines however there's no detail.&lt;/P&gt;&lt;P&gt;We've had a TAC case open for this whereby it was intimated that there was an ISE policy configuration issue, I've guided my support colleagues to go back to TAC with the above bug reference.&lt;/P&gt;&lt;P&gt;The affected users if they physically roam to another AP immediately authenticate and get onboarded as expected, I'm not sure if the problem follows them around as we've not ascertained that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2022 12:32:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4733299#M249223</guid>
      <dc:creator>StevieC666</dc:creator>
      <dc:date>2022-12-06T12:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: Fab Mode APs - Wireless Client Authentication Sessions on switch i</title>
      <link>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4742043#M249644</link>
      <description>&lt;P&gt;I see you never got a reply to this - hopefully you've solved it now.&lt;/P&gt;
&lt;P&gt;But you're quite right it's a bug - which&amp;nbsp;CSCwb87363 is pointing to now -&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb68720" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb68720&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;It's fixed in 17.6.4 which I'd recommend anyway.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 23:37:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4742043#M249644</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2022-12-19T23:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: Fab Mode APs - Wireless Client Authentication Sessions on switch i</title>
      <link>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4742356#M249654</link>
      <description>&lt;P&gt;Hi Rich, thanks so much for pointing us in this direction.&lt;/P&gt;&lt;P&gt;We're currently running 17.6.3 so the bugfix note aligns perfectly. We've been guided by TAC to go to higher release for another issue we have related to RSSI value collection so we're going to reach out to TAC in regards to this case to give them a chance to confirm formally that this bugfix relates to the issue and will be covered in the suggested release.&lt;/P&gt;&lt;P&gt;Will update this once confirmed &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 09:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/fab-mode-aps-wireless-client-authentication-sessions-on-switch/m-p/4742356#M249654</guid>
      <dc:creator>StevieC666</dc:creator>
      <dc:date>2022-12-20T09:15:29Z</dc:date>
    </item>
  </channel>
</rss>

