<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4820232#M254926</link>
    <description>&lt;P&gt;Any update from TAC&lt;BR /&gt;&lt;BR /&gt;even i am observing the same issue&lt;BR /&gt;&lt;BR /&gt;Authentication failed for client (70a8.d39b.f5c8) with reason (Cred Fail) on Interface capwap_90000010 AuditSessionID 0408FA0A000869CBB2E052E7 Username: host/d3187f91-6ca9-4969-ae54-9fe6e0015c2a.beig.birdseyeiglo.com&lt;/P&gt;</description>
    <pubDate>Mon, 24 Apr 2023 11:08:40 GMT</pubDate>
    <dc:creator>gaurav mahajan1</dc:creator>
    <dc:date>2023-04-24T11:08:40Z</dc:date>
    <item>
      <title>dot1x Clients can't get authenticated du to Cred Fail on Cisco 9800</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4755944#M250483</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;clients cannot join our dot1x SSIDs. We get below messages in our WLC 9800:&lt;/P&gt;
&lt;P&gt;WLC1#&lt;BR /&gt;Jan 17 10:46:44.155: %DOT1X-5-FAIL: Chassis 1 R0/0: wncd: Authentication failed for client (ee23.093e.5580) with reason (Cred Fail) on Interface capwap_90000002 AuditSessionID 1964900A000006A7BF56A2A1 Username:&amp;nbsp;&lt;BR /&gt;Jan 17 10:46:44.155: %SESSION_MGR-5-FAIL: Chassis 1 R0/0: wncd: Authorization failed or unapplied for client (ee23.093e.5580) on Interface capwap_90000002 AuditSessionID 1964900A000006A7BF56A2A1. Failure reason: Authc fail. Authc failure reason: Cred Fail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;our platform is:&amp;nbsp;Cisco IOS Software [Bengaluru], C9800 Software (C9800_IOSXE-K9), Version 17.6.4, RELEASE SOFTWARE (fc1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would you please guide me what is the remedy?&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;Farkhan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 10:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4755944#M250483</guid>
      <dc:creator>FreddyJay</dc:creator>
      <dc:date>2023-01-17T10:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4755973#M250484</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;....Authc fail. Authc failure reason: &lt;FONT color="#FF0000"&gt;Cred Fail.&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp;- The reason(s) seems obvious , client credentials&lt;FONT color="#FF0000"&gt; are incorrect,&lt;/FONT&gt; if you have backend radius authenticating server(s) , then check the radius&lt;STRONG&gt; logs&lt;/STRONG&gt; too.&lt;BR /&gt;&amp;nbsp; &lt;EM&gt;&amp;nbsp;&lt;U&gt;You may also find these commands useful on the 9800 controller&amp;nbsp; :&lt;/U&gt;&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;show wireless stats client delete reasons&lt;BR /&gt;&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;show wireless stats client detail&lt;BR /&gt;&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;show wireless client summary&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; Also review the&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;9800&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;&lt;STRONG&gt;configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with the CLI command :&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;show&amp;nbsp; tech&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;wireless&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;, have the output analyzed by&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cway.cisco.com/tools/WirelessAnalyzer/" target="_blank" rel="noopener nofollow noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://cway.cisco.com/tools/WirelessAnalyzer/&amp;amp;source=gmail&amp;amp;ust=1662270212514000&amp;amp;usg=AOvVaw1v8X824xUFwNwiDM_o5Fxf"&gt;https://cway.cisco.com/&lt;WBR /&gt;tools/WirelessAnalyzer/&lt;/A&gt;&amp;nbsp; , please note do not use classical&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;show tech-support&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(short version) , use the command denoted in green for Wireless Analyzer.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Checkout all advisories!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 12:10:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4755973#M250484</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-01-17T12:10:41Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4767366#M251099</link>
      <description>&lt;P&gt;Hello Farkhan&lt;/P&gt;&lt;P&gt;Have you checked the Logs in your AAA server, what logs its showing.Because its credentials failed.Please checked the policy also you have applied for dot1x. And Please confirm all user are facing issue or some particular clients.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 10:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4767366#M251099</guid>
      <dc:creator>Gaurav  Kansal</dc:creator>
      <dc:date>2023-02-02T10:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4781563#M252121</link>
      <description>&lt;P&gt;I am seeing the same issue on 17.9.2 using 2802I and 2802E APs. Central authentication for a DOT1X WLAN does not work and no Radius requests are sent from any interface on the C9800-CL device to the radius servers. Tested this with a packet capture at both ends. It is not a communication issue between the C9800-CL and the radius servers, as the "test aaa" command sends radius packets just fine.&lt;/P&gt;&lt;P&gt;Any legitimate connection attempt to the SSID will instantly result in the (Cred Fail) log, even if the credentials are correct.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Disabling central authentication allows the APs themselves to send the DOT1X requests which pass as expected.&lt;/P&gt;&lt;P&gt;I have an open ticket with TAC regarding this issue.&lt;BR /&gt;&lt;BR /&gt;You may want to test with non-central authentication, provided that you setup the wireless client on your RADIUS servers to accommodate the APs doing the authentication themselves.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2023 17:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4781563#M252121</guid>
      <dc:creator>zachhoiberg</dc:creator>
      <dc:date>2023-02-23T17:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4783252#M252265</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Have you had any success with TAC so far? We seem to have a similar issue now in our environment..&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 13:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4783252#M252265</guid>
      <dc:creator>Schulda</dc:creator>
      <dc:date>2023-02-27T13:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4783315#M252271</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1303825"&gt;@Schulda&lt;/a&gt;&amp;nbsp;you should start a new thread.&amp;nbsp; Majority of folks have a different setup and that makes a big difference.&amp;nbsp; Start a new thread and add as much information as possible.&amp;nbsp; Add what troubleshooting you have done, if this is a new setup or existing, has it worked before, is it with a specific device type or authorization type, etc.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Feb 2023 15:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4783315#M252271</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2023-02-27T15:03:35Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4786892#M252594</link>
      <description>&lt;P&gt;I have not had any luck thus far. It seems like the EAP request is sent between the AP and the Controller during Central Authentication, and I see the username passing, but once that packet hits the Controller (which is nearly instantly), the controller doesn't forward it to the defined radius servers and marks it as a failed authentication attempt.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I hope to get more information from TAC next week when I have more time to troubleshoot this further. Additionally, I'd like to state that I am using 2800 series APs for all of this testing, incase this happens to be a model specific issue. I will finally get some 9120s in next week for testing as well.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2023 22:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4786892#M252594</guid>
      <dc:creator>zachhoiberg</dc:creator>
      <dc:date>2023-03-03T22:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4786949#M252595</link>
      <description>&lt;P&gt;What error do you see on the radius server? &amp;nbsp;Are you using ISE?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Mar 2023 00:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4786949#M252595</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2023-03-04T00:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4786978#M252598</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1469567"&gt;@zachhoiberg&lt;/a&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;gt;&lt;FONT color="#FF6600"&gt;...seeing the&lt;U&gt; same&lt;/U&gt; issue...&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;Did you also check the&lt;U&gt; same&lt;/U&gt; advisories :&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;gt;....Authc fail. Authc failure reason:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;FONT color="#FF0000"&gt;Cred Fail.&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp;- The reason(s) seems obvious , client credentials&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;are incorrect,&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;if you have backend radius authenticating server(s) , then check the radius&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;logs&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;too.&lt;BR /&gt;&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&amp;nbsp;&lt;U&gt;You may also find these commands useful on the 9800 controller&amp;nbsp; :&lt;/U&gt;&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;show wireless stats client delete reasons&lt;BR /&gt;&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;show wireless stats client detail&lt;BR /&gt;&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;STRONG&gt;show wireless client summary&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; Also review the&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;9800&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;&lt;STRONG&gt;configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;with the CLI command :&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;show&amp;nbsp; tech&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;wireless&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;, have the output analyzed by&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cway.cisco.com/tools/WirelessAnalyzer/" target="_blank" rel="noopener nofollow noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://cway.cisco.com/tools/WirelessAnalyzer/&amp;amp;source=gmail&amp;amp;ust=1662270212514000&amp;amp;usg=AOvVaw1v8X824xUFwNwiDM_o5Fxf"&gt;https://cway.cisco.com/&lt;WBR /&gt;tools/WirelessAnalyzer/&lt;/A&gt;&amp;nbsp; , please note do not use classical&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;show tech-support&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(short version) , use the command denoted in green for Wireless Analyzer.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Checkout all advisories!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;- If still not resolved perform client debugging as described in :&amp;nbsp;&lt;A href="https://logadvisor.cisco.com/logadvisor/wireless/9800/9800ClientConnectivity" target="_blank"&gt;https://logadvisor.cisco.com/logadvisor/wireless/9800/9800ClientConnectivity&lt;/A&gt;&amp;nbsp;, you can have client debugs analyzed with :&amp;nbsp;&lt;A href="https://cway.cisco.com/wireless-debug-analyzer" target="_blank"&gt;https://cway.cisco.com/wireless-debug-analyzer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Mar 2023 06:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4786978#M252598</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-03-04T06:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4790638#M252864</link>
      <description>&lt;P&gt;I saw nothing on the radius server logs and no traffic hitting the radius server with a packet capture running on the server. We are using Windows NPS, not ISE.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In some more testing this week, Central Authentication is now working at a separate site with a stronger WAN connection. The testing setup used originally was using a cell router for its WAN. Additionally, on that weaker WAN connection, I would occasionally see the CAPWAP tunnels drop and re-establish, presumably due to that weaker connection. I have not seen the same behavior at the new site.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It could be that there is some hidden threshold that the test setup was not meeting that the new site now is, and I am waiting to hear more from TAC after reporting my latest findings.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 19:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4790638#M252864</guid>
      <dc:creator>zachhoiberg</dc:creator>
      <dc:date>2023-03-09T19:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4820232#M254926</link>
      <description>&lt;P&gt;Any update from TAC&lt;BR /&gt;&lt;BR /&gt;even i am observing the same issue&lt;BR /&gt;&lt;BR /&gt;Authentication failed for client (70a8.d39b.f5c8) with reason (Cred Fail) on Interface capwap_90000010 AuditSessionID 0408FA0A000869CBB2E052E7 Username: host/d3187f91-6ca9-4969-ae54-9fe6e0015c2a.beig.birdseyeiglo.com&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 11:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4820232#M254926</guid>
      <dc:creator>gaurav mahajan1</dc:creator>
      <dc:date>2023-04-24T11:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4830119#M255541</link>
      <description>&lt;P&gt;same environment cisco 9800 and nps server as a radius side.&lt;/P&gt;&lt;P&gt;and taking similer logs like;&lt;/P&gt;&lt;P&gt;May 7 20:43:24: %SESSION_MGR-5-FAIL: Chassis 2 R0/0: wncd: Authorization failed or unapplied for client (0028.f88f.63f3) on Interface capwap_90000005 AuditSessionID F003320A0000011EF74F7F31. Failure reason: Authc fail. Authc failure reason: Cred Fail.&lt;/P&gt;&lt;P&gt;any update from tac ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 May 2023 17:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4830119#M255541</guid>
      <dc:creator>CSCO11177789</dc:creator>
      <dc:date>2023-05-07T17:54:22Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4830993#M255563</link>
      <description>&lt;P&gt;Nothing concrete, but I did update to 17.9.3 and tested the same configuration from a different site (with a stronger WAN signal, our test setup was using a cell modem for its primary connection), and I've been unable to replicate the same behavior since.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm unsure if it was simply the update to 17.9.3, the stronger WAN signal (as I was observing the CAPWAP tunnels occasionally timeout/drop from the test setup, which I have not seen since), or a combination of the two.&lt;BR /&gt;&lt;BR /&gt;Do you guys also see the CAPWAP tunnels timing out within your logs periodically?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2023 12:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4830993#M255563</guid>
      <dc:creator>zachhoiberg</dc:creator>
      <dc:date>2023-05-08T12:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4838656#M256007</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I was facing the same issue in my production environment, and just found a solution for my issue. I am working with a 9800-L Wireless Controller and NPS as our radius server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After checking the logs on my failed authentication requests, I found that under the Authentication Details the request was calling the wrong Network Policy Name. We use a policy that grants us privilege 15 to cisco command lines,&amp;nbsp; and that is what was being called. I moved my new policy ( the one I'm trying to get to work) above the one being called in processing order, and I was able to authenticate finally.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This was a unique situation, but I hope this info helps some.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 21:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4838656#M256007</guid>
      <dc:creator>GEgishira</dc:creator>
      <dc:date>2023-05-18T21:54:55Z</dc:date>
    </item>
    <item>
      <title>回复： dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4862892#M257482</link>
      <description>&lt;P&gt;我在现网也碰到了相同的问题，我检查了客户端证书，发现证书过期了，更新了证书后客户端就可以正常使用网络。&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 04:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4862892#M257482</guid>
      <dc:creator>TriAngel</dc:creator>
      <dc:date>2023-06-27T04:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4997612#M265337</link>
      <description>&lt;P&gt;What is the known proper resolution for this issue? I am facing the same issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 13:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/4997612#M265337</guid>
      <dc:creator>kiranraj</dc:creator>
      <dc:date>2024-01-16T13:08:36Z</dc:date>
    </item>
    <item>
      <title>回复： dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5008662#M265841</link>
      <description>&lt;P&gt;请问你是更新ISE的证书吗？我不管用wlc做本地EAP认证，还是用ISE做raduis认证，都有这个问题。如果是WLC本地认证，是否有证书可以导出的呢？谢谢。&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 06:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5008662#M265841</guid>
      <dc:creator>Uncle ZZL</dc:creator>
      <dc:date>2024-01-30T06:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5034611#M267689</link>
      <description>&lt;P&gt;I'm having the same issue with 17.9.4a.&lt;BR /&gt;From WLC debug I see 4 login attempts (before setting clients as excluded) but from ISE Live Logs I'm seeing only one request and not the others. It seems that WLC is "caching" authentication.&lt;BR /&gt;Someone solved this?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2024 21:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5034611#M267689</guid>
      <dc:creator>CiscoU9834</dc:creator>
      <dc:date>2024-03-05T21:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5035957#M267803</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the Windows update of November 10th, EAP was updated to support TLS 1.2. This means that during the TLS handshake, the server announces support for TLS 1.2, enabling the use of TLS 1.2.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; Here is the solution to the problem of configuring TLS version. By default, EAP must add a DWORD value to the TlsVersion registry subkey:&lt;/P&gt;&lt;P&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\PPP\EAP\13 The value of this registry key can be 0xC0, 0x300, or 0xC00&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 14:55:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5035957#M267803</guid>
      <dc:creator>nemrinoureddine</dc:creator>
      <dc:date>2024-03-07T14:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: dot1x Clients can't get authenticated du to Cred Fail on Cisco 980</title>
      <link>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5036009#M267809</link>
      <description>&lt;P&gt;Are you saying that this registry setting affects "cred fail" errors being described above?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Mar 2024 16:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/dot1x-clients-can-t-get-authenticated-du-to-cred-fail-on-cisco/m-p/5036009#M267809</guid>
      <dc:creator>arvinvidal</dc:creator>
      <dc:date>2024-03-07T16:13:42Z</dc:date>
    </item>
  </channel>
</rss>

