<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 9800-cl 802.1x radius authentication in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5113126#M271801</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have been testing some more but I did not fix the issue yet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Changing the MTU to 1300 did not fix it.&lt;/P&gt;
&lt;P&gt;In the Wireshark I can see:&lt;BR /&gt;1. the association request from the client to the AP&lt;BR /&gt;2. EAP request identity from AP to client&lt;BR /&gt;3. EAP response identity from client to AP&lt;BR /&gt;4. Radius Access Request form WLC to Radius server&lt;BR /&gt;5. Radius Access Challenge from Radius server to WLC&lt;BR /&gt;6. EAP Challenge request from AP to client&lt;BR /&gt;7. EAP Challenge response from client to AP&lt;BR /&gt;8. Radius Access Request from WLC to radius&lt;/P&gt;
&lt;P&gt;Then I should recieve an Radius Access Accept from the radius, but I see a new Access challenge coming from the radius server.&lt;/P&gt;
&lt;P&gt;And then the process starts again...&lt;/P&gt;</description>
    <pubDate>Wed, 22 May 2024 12:23:58 GMT</pubDate>
    <dc:creator>Djeten</dc:creator>
    <dc:date>2024-05-22T12:23:58Z</dc:date>
    <item>
      <title>Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092464#M271083</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I want to configure 802.1x authentication on an SSID on a 9800-CL hosted in Azure.&lt;/P&gt;
&lt;P&gt;I have configured the radius server, server group and method list and set this in the AAA section of the WLAN.&lt;/P&gt;
&lt;P&gt;In Wireshark I can see Access-Request coming from the WLC to the NPS, and Access-Challenge from the NPS to the WLC, but nothing more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Djeten_0-1715082049310.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/217742i11CB5A3C60B06114/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Djeten_0-1715082049310.png" alt="Djeten_0-1715082049310.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I suppose I should see some Accept packet coming from the controller.&lt;/P&gt;
&lt;P&gt;Did anyone have this issue before?&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 11:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092464#M271083</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-07T11:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092514#M271085</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- For starters&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;have a checkup of the &lt;STRONG&gt;9800-CL Azure based controller&lt;/STRONG&gt;&amp;nbsp; configuration with the&lt;BR /&gt;&amp;nbsp; &amp;nbsp;CLI command&amp;nbsp;&lt;/SPAN&gt;&lt;U&gt;&lt;FONT color="#008000"&gt;&lt;STRONG&gt;show tech wireless&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/U&gt;&lt;SPAN&gt;&lt;U&gt;&amp;nbsp;&lt;/U&gt;and feed the output into :&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://cway.cisco.com/wireless-config-analyzer/" target="_blank" rel="nofollow noopener noreferrer"&gt;Wireless Config Analyzer&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 13:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092514#M271085</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-05-07T13:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092618#M271089</link>
      <description>&lt;P&gt;Thx for your reply, but this did not reveal any issues regarding Radius&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 14:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092618#M271089</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-07T14:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092866#M271092</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- In any case make sure that the overall wlc check-results (&lt;STRONG&gt;Tab&lt;/STRONG&gt;) contain no errors &lt;FONT color="#FF0000"&gt;red flagged&lt;/FONT&gt;, because for sure these must always be corrected.&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;For the rest : what's in the&lt;FONT color="#0000FF"&gt;&lt;EM&gt; native NPS server's&lt;/EM&gt; &lt;/FONT&gt;&lt;U&gt;&lt;STRONG&gt;logs&lt;/STRONG&gt;&lt;/U&gt; for authenticating request from the 9800-cl ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2024 16:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5092866#M271092</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-05-07T16:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5100895#M271338</link>
      <description>&lt;P&gt;If you do the packet capture on the WLC do you see the WLC receiving the challenge from the NPS?&lt;BR /&gt;If not check routing/ACL/firewall etc between NPS/WLC.&lt;/P&gt;
&lt;P&gt;If WLC receives the challenge then debug on WLC to see what is happening when it receives the challenge.&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 17:20:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5100895#M271338</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-05-10T17:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5101306#M271346</link>
      <description>&lt;P&gt;Hi, got same issue,&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/855158"&gt;@Djeten&lt;/a&gt;&amp;nbsp;have you found the solution ?&lt;/P&gt;&lt;P&gt;WLC in Azure 17.9.5, WLC&lt;SPAN&gt;&amp;nbsp;stops replying to second 'access-challenge' packet from NPS (MS Windows).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;When disabling 'central authentication' it authenticates correctly.&lt;/P&gt;&lt;P&gt;Capture when fail:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="xes_1-1715370637785.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/218076i9960D1473D85112B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="xes_1-1715370637785.png" alt="xes_1-1715370637785.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 19:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5101306#M271346</guid>
      <dc:creator>xes</dc:creator>
      <dc:date>2024-05-10T19:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5101545#M271349</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/791371"&gt;@xes&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/855158"&gt;@Djeten&lt;/a&gt; Is this a sporadic or a constant issue, and when did it start? After upgrading to 17.9.5? Are any APs/clients able to authenticate successfully?&lt;/P&gt;&lt;P&gt;In addition to checking routing/ACL/firewalls and doing a capture from the WLC as Rich suggested, you could do an OTA capture or a capture from a client trying to authenticate. That would give more information on where the issue lies if the WLC capture shows that the expected packets are not arriving from the client. Is the AP not sending the challenge to the client, or is the AP not sending the client's second request back out to the WLC? Etc.&lt;/P&gt;&lt;P&gt;Also, what model WAP are you using? If it's certain 9100 series, you may be hitting this bug:&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwj45141" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwj45141&lt;/A&gt;&lt;/P&gt;&lt;P&gt;We haven't yet confirmed whether we're experiencing the bug, but we've found that 5 GHz radios on our 9130, 9166, and 9136 APs stop authenticating after prolonged high client count situations. x700 and x800 series don't seem to be affected. You could confirm by rebooting the WAP, or temporarily disabling the 5 GHz radio, which will force clients on 2.4 GHz instead. Note that this is a time-based issue in my experience; it's fine when the AP boots up, but within 2-3 days of high client count (say over 30-50 clients on an AP), the issue occurs.&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 21:16:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5101545#M271349</guid>
      <dc:creator>eglinsky2012</dc:creator>
      <dc:date>2024-05-10T21:16:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5102281#M271365</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314036"&gt;@eglinsky2012&lt;/a&gt;&amp;nbsp;did you notice that they've changed&amp;nbsp;CSCwj45141 status to&amp;nbsp;Unreproducible which basically means TAC were unable to reproduce it themselves so have thrown their arms in the air and given up.&amp;nbsp; Meaning they won't do any more work on it until a big enough customer escalates and they'll then put more effort into repro and/or fixing it.&amp;nbsp; With similar bugs in the past they usually address it by introducing extra debugs in the code to help diagnose the issue and then eventually a fix but seems they're getting lazy and have just decided to give up on this one! It's &lt;STRONG&gt;only&lt;/STRONG&gt; got 6 TAC cases attached &amp;lt;sarcasm&amp;gt; to the bug so it would be helpful if everybody observing the issue opens a TAC case and gets it attached to the bug so they can see it's not a rare and isolated issue.&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2024 12:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5102281#M271365</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-05-11T12:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5103383#M271432</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/314036"&gt;@eglinsky2012&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a new WLC we have deployed in Azure to replace an older on prem WLC. So it hasn't worked before on this WLC.&lt;/P&gt;
&lt;P&gt;There are different types of AP's registered on the controller: C9115AXI-E, AP1832I and AP1852I.&lt;/P&gt;
&lt;P&gt;I will do a capture on the WLC and on a client to get more info and will get back to you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 08:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5103383#M271432</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-13T08:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5103529#M271450</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/855158"&gt;@Djeten&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i think i solved my issue setting radius Framed MTU to 1300&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-6/deployment-guide/Configurable_Framed-MTU_on_Cisco_Catalyst_9800.html" target="_blank"&gt;Configurable Framed-MTU on Cisco Catalyst 9800 - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Setting Framed MTU on NPS in Network Policy settings also seems to help.&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 12:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5103529#M271450</guid>
      <dc:creator>xes</dc:creator>
      <dc:date>2024-05-13T12:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5113126#M271801</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have been testing some more but I did not fix the issue yet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Changing the MTU to 1300 did not fix it.&lt;/P&gt;
&lt;P&gt;In the Wireshark I can see:&lt;BR /&gt;1. the association request from the client to the AP&lt;BR /&gt;2. EAP request identity from AP to client&lt;BR /&gt;3. EAP response identity from client to AP&lt;BR /&gt;4. Radius Access Request form WLC to Radius server&lt;BR /&gt;5. Radius Access Challenge from Radius server to WLC&lt;BR /&gt;6. EAP Challenge request from AP to client&lt;BR /&gt;7. EAP Challenge response from client to AP&lt;BR /&gt;8. Radius Access Request from WLC to radius&lt;/P&gt;
&lt;P&gt;Then I should recieve an Radius Access Accept from the radius, but I see a new Access challenge coming from the radius server.&lt;/P&gt;
&lt;P&gt;And then the process starts again...&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2024 12:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5113126#M271801</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-22T12:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5120292#M272133</link>
      <description>&lt;P&gt;I have been doing further testing and have opened a case with TAC.&lt;/P&gt;
&lt;P&gt;It seems it is not a Radius issue. We have different types of AP's. The SSID is working fine on&amp;nbsp;&lt;SPAN&gt;C9115AXI-E AP's, but does not work on&amp;nbsp;AP1832I&amp;nbsp;AP's.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Traces on the client, controller, AP and switch show that Radius works, but the 4-way handshake fails.&amp;nbsp;&lt;BR /&gt;We see that step 4 of the 4-way handshake is not sent from the AP to the switch, resulting in a failure of the connection.&lt;/P&gt;
&lt;P&gt;Logs from the AP (AP recieves EAPOL frame 4 from client):&lt;/P&gt;
&lt;P&gt;[*05/29/2024 11:55:05.1760] Client(00:d4:9e:54:6e:8d): apr1v2: 802.11: start SAE authentication (RX commit, status=126 (SAE_HASH_TO_ELEMENT))&lt;BR /&gt;[*05/29/2024 11:55:05.1760] Client(00:d4:9e:54:6e:8d): apr1v2: 802.11: SAE authentication (RX confirm, status=0 (SUCCESS))&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: MLME: MLME-AUTHENTICATE.indication(00:d4:9e:54:6e:8d, unknown)&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: MLME: MLME-DELETEKEYS.request(00:d4:9e:54:6e:8d)&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: event 0 notification&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: event 1 notification&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: start authentication&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: 802.1X: unauthorizing port&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: sending 1/4 msg of 4-Way Handshake&lt;BR /&gt;[*05/29/2024 11:55:05.1860] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: received EAPOL-Key frame (2/4 Pairwise)&lt;BR /&gt;[*05/29/2024 11:55:05.1960] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: sending 3/4 msg of 4-Way Handshake&lt;BR /&gt;[*05/29/2024 11:55:05.1960] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: &lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;received EAPOL-Key frame (4/4 Pairwise)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;[*05/29/2024 11:55:05.1960] Client(00:d4:9e:54:6e:8d): apr1v2: 802.1X: authorizing port&lt;BR /&gt;[*05/29/2024 11:55:05.1960] Client(00:d4:9e:54:6e:8d): apr1v2: WPA: pairwise key handshake completed (RSN)&lt;BR /&gt;[*05/29/2024 11:55:05.2660] Client(00:d4:9e:54:6e:8d): apr1v2: RADIUS: starting accounting session 0FD827614105CB66&lt;/P&gt;
&lt;P&gt;PCAP on the switchport (Switch does not recieve message 4 from the AP):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Djeten_0-1717055521907.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219614iB61BAA0530C27679/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Djeten_0-1717055521907.png" alt="Djeten_0-1717055521907.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So there is a problem on the AP, investigation by TAC still ongoing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 07:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5120292#M272133</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-30T07:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5120893#M272160</link>
      <description>&lt;P&gt;Apologies if I missed it - but what software version are you using&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/855158"&gt;@Djeten&lt;/a&gt;&amp;nbsp;?&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 14:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5120893#M272160</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-05-30T14:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121661#M272180</link>
      <description>&lt;P&gt;Well this is weird...&lt;/P&gt;
&lt;P&gt;When I deployed the WLC, it was on version 17.7.1.&lt;BR /&gt;Because of these issues, I upgraded to version 17.9.5.&lt;BR /&gt;When I check the version now, it says it is back at 17.7.1... I am 100% sure the upgrade to 17.9.5 was completed succesfully, because I checked before I opened the TAC case...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 06:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121661#M272180</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-31T06:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121673#M272181</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Check content of&lt;STRONG&gt; bootflash:&lt;/STRONG&gt;&amp;nbsp; and examine the boot setting(s)&amp;nbsp; (boot variable) &lt;U&gt;&lt;EM&gt;in the running configuration ,&amp;nbsp;&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 07:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121673#M272181</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-05-31T07:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121680#M272182</link>
      <description>&lt;P&gt;Are you sure you committed after install otherwise it will do automatic rollback?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-9/config-guide/b_wl_17_9_cg/m_upgrade_9800cl.html#overview-upgrade-cont-sw__sw_upgrade_opt" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-9/config-guide/b_wl_17_9_cg/m_upgrade_9800cl.html#overview-upgrade-cont-sw__sw_upgrade_opt&lt;/A&gt;&lt;/P&gt;
&lt;TABLE class="olh_note" role="note" border="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="1%" class="td_faq"&gt;
&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;&lt;/P&gt;
&amp;nbsp;&lt;/TD&gt;
&lt;TD class="td_faq"&gt;
&lt;SECTION class="note__content"&gt;For 17.4 and later releases, this step is mandatory for the upgrade to be persistent. &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;If you do not click &lt;SPAN class="ph uicontrol"&gt;Commit&lt;/SPAN&gt;, the auto-timer terminates the upgrade operation after 6 hours, and the controller reverts back to the previous image.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SECTION&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Fri, 31 May 2024 07:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121680#M272182</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-05-31T07:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121697#M272187</link>
      <description>&lt;P&gt;I guess not... I performed the upgrade again and now I did commit. So now it is at version 17.9.5&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 08:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121697#M272187</guid>
      <dc:creator>Djeten</dc:creator>
      <dc:date>2024-05-31T08:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 9800-cl 802.1x radius authentication</title>
      <link>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121740#M272190</link>
      <description>&lt;P&gt;A common mistake to make &amp;lt;smile&amp;gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 09:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-9800-cl-802-1x-radius-authentication/m-p/5121740#M272190</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2024-05-31T09:23:12Z</dc:date>
    </item>
  </channel>
</rss>

