<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 802.11r roaming and re-auth on roam in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254150#M280394</link>
    <description>&lt;P&gt;Hallo,&lt;/P&gt;&lt;P&gt;We have been running 8540 in HA/SSO for a long time, and 802.11r has been working very well after the clients started supporting it. Now suddenly, without have done any changes, a lot of clients are starting to experience a full re-auth on roam. This obviously is annoying, as they have to go through a auth and dhcp-process, which takes a few seconds.&lt;/P&gt;&lt;P&gt;What i dont understand is, why does the controller force the client into re-auth?&lt;/P&gt;&lt;P&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c dot1xProcessInitiate1XtoMobile to mobile station 94:e6:f7:1f:90:8c (mscb 157, msg 157)&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c reauth_sm state transition 0 ---&amp;gt; 0 for mobile 94:e6:f7:1f:90:8c at 1x_reauth_sm.c:53&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c Finishing FT roaming for mobile 94:e6:f7:1f:90:8c&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c EAP-PARAM Debug - eap-params for Wlan-Id :7 is enabled - applying Wlan specific eap timers and retries&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c Disable re-auth, use PMK lifetime.&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c dot1x - moving mobile 94:e6:f7:1f:90:8c into Force Auth state&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After this a full auth to ISE is done, and then a new dhcp-req/offer. Am i missing something obvious here? WLC running 8.10.185, APs are 9115.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 11:22:11 GMT</pubDate>
    <dc:creator>trondaker</dc:creator>
    <dc:date>2025-01-29T11:22:11Z</dc:date>
    <item>
      <title>802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254150#M280394</link>
      <description>&lt;P&gt;Hallo,&lt;/P&gt;&lt;P&gt;We have been running 8540 in HA/SSO for a long time, and 802.11r has been working very well after the clients started supporting it. Now suddenly, without have done any changes, a lot of clients are starting to experience a full re-auth on roam. This obviously is annoying, as they have to go through a auth and dhcp-process, which takes a few seconds.&lt;/P&gt;&lt;P&gt;What i dont understand is, why does the controller force the client into re-auth?&lt;/P&gt;&lt;P&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c dot1xProcessInitiate1XtoMobile to mobile station 94:e6:f7:1f:90:8c (mscb 157, msg 157)&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c reauth_sm state transition 0 ---&amp;gt; 0 for mobile 94:e6:f7:1f:90:8c at 1x_reauth_sm.c:53&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c Finishing FT roaming for mobile 94:e6:f7:1f:90:8c&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c EAP-PARAM Debug - eap-params for Wlan-Id :7 is enabled - applying Wlan specific eap timers and retries&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c Disable re-auth, use PMK lifetime.&lt;BR /&gt;*Dot1x_NW_MsgTask_4: Jan 29 12:13:30.220: [PA] 94:e6:f7:1f:90:8c dot1x - moving mobile 94:e6:f7:1f:90:8c into Force Auth state&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After this a full auth to ISE is done, and then a new dhcp-req/offer. Am i missing something obvious here? WLC running 8.10.185, APs are 9115.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 11:22:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254150#M280394</guid>
      <dc:creator>trondaker</dc:creator>
      <dc:date>2025-01-29T11:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254154#M280395</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/81999"&gt;@trondaker&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The logs only show what you are already seeing on the network. Client is being forced to re-auth. If I were you I would focus on the client as clients constantly receive updates from their vendor and something can be different now. If you are sure the WLC side is the same, that´s my line of troubleshooting.&lt;/P&gt;
&lt;P&gt;If you identify some similarity on the problematic clients, like vendor, for example. It would be easier to track down the problem.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 11:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254154#M280395</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-01-29T11:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254156#M280396</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Also go for&amp;nbsp;&amp;nbsp;&lt;A href="https://software.cisco.com/download/home/286284728/type/280926587/release/8.10.196.0" target="_blank"&gt;https://software.cisco.com/download/home/286284728/type/280926587/release/8.10.196.0&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp;on the controller to have the latest bugfixes , the aireos models are EOL , using last available software is always&lt;BR /&gt;&amp;nbsp; &amp;nbsp;recommended.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 11:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254156#M280396</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2025-01-29T11:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254157#M280397</link>
      <description>&lt;P&gt;Reboot the APs.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 11:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254157#M280397</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2025-01-29T11:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254162#M280398</link>
      <description>&lt;P&gt;Thanks, i will upgrade the controller tonight, and check if devices have a new versions recently installed. But is there any reason the controller would force a re-auth when running 802.11r?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 11:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254162#M280398</guid>
      <dc:creator>trondaker</dc:creator>
      <dc:date>2025-01-29T11:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254173#M280399</link>
      <description>&lt;P&gt;Hard to say exactly but the process of fast transition (802.11r) starts on client side. If you did not change anything on the WLC side, and knowing that clients constantly gets update from vendor, my first though would be on the client.&lt;/P&gt;
&lt;P&gt;But, as you are going to upgrade the WLC,&amp;nbsp; its better wait the behavior after the upgrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FlavioMiranda_0-1738238173380.png" style="width: 820px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/238702i3C2E16D199732EF3/image-dimensions/820x404?v=v2" width="820" height="404" role="button" title="FlavioMiranda_0-1738238173380.png" alt="FlavioMiranda_0-1738238173380.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 12:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254173#M280399</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2025-01-29T12:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254177#M280400</link>
      <description>&lt;P&gt;Thanks, will let you know!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 12:10:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254177#M280400</guid>
      <dc:creator>trondaker</dc:creator>
      <dc:date>2025-01-29T12:10:21Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254398#M280410</link>
      <description>&lt;P&gt;That is a tricky one, but everyone has been through, "nothing has changed" scenarios.&amp;nbsp; I would assume that the end devices gets patched or upgraded, even maybe newer devices gets implemented.&amp;nbsp; Some things I have tried in the past was to perform a failover to the other controller to verify is something was going on with the primary.&amp;nbsp; Then just reboot the primary and make that the primary again.&amp;nbsp; Switching to one controller to another can also help with isolating an issue with the controller itself.&amp;nbsp; The risk is, that the secondary controller has an issue and when you failover to that, things break.&amp;nbsp; Might be better to reboot the secondary and wait for that to come back up and fully sync.&amp;nbsp; Then proceed with the failover.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 17:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5254398#M280410</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-29T17:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5255208#M280464</link>
      <description>&lt;P&gt;It seems one issue was related to Mac Os 15.3 and private-mac. Something strange happens there that causes full auth much more frequently then before. Disabling private mac and disable the ip tracking thing seems to have solved most of the issues for Macs. Doesnt seem to be fully resolved for all devices yet though, so still on the search.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2025 09:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5255208#M280464</guid>
      <dc:creator>trondaker</dc:creator>
      <dc:date>2025-01-31T09:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5255367#M280473</link>
      <description>&lt;P&gt;There are a lot of things on the client side that can cause these issues like what you have found.&amp;nbsp; We use dot.1 and I deny any using random mac address in the secured SSID's, but allow that on the guest.&amp;nbsp; &amp;nbsp;Its difficult because users might complain they no longer can connect of have connection issues after they upgrade their device, but the decision to have users configure their devices a certain way also makes it difficult.&amp;nbsp; That is what makes wireless the service line that folks complain about all the time, they just want their device to work just like how it works at home.&lt;/P&gt;
&lt;P&gt;If you are using radius, you would need to identify a few devices and debug their mac and look at the auth on both the controller and the radius server, you should see something that doesn't look right, but you are on the right track.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2025 14:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5255367#M280473</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2025-01-31T14:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: 802.11r roaming and re-auth on roam</title>
      <link>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5255377#M280475</link>
      <description>&lt;P&gt;Can I see l2 and l3 secuirty of this SSID&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jan 2025 15:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/802-11r-roaming-and-re-auth-on-roam/m-p/5255377#M280475</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-31T15:05:49Z</dc:date>
    </item>
  </channel>
</rss>

