<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RADSEC Issues in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494144#M299662</link>
    <description>&lt;P&gt;I've seen the error but only when it wasn't working period.&lt;/P&gt;&lt;P&gt;FYI the 127.0.0.1 IP is due to the architecture of the RADSEC. The APs use some sort of proxy in their code to implement RADSEC, so the dashboard will show the localhost IP instead of the actual IP.  It definitely confuses troubleshooting. The error could be within the AP RADSEC functionality or still be a normal error with connectivity or your RADIUS server.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Oct 2024 17:20:54 GMT</pubDate>
    <dc:creator>mloraditch</dc:creator>
    <dc:date>2024-10-21T17:20:54Z</dc:date>
    <item>
      <title>RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494143#M299661</link>
      <description>&lt;P&gt;Has anyone seen the folloiwng issue? We're running 30.7 on an MR44 when testing.&lt;/P&gt;&lt;P&gt;When using Radsec we see this 802.1X error.&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HenryM_0-1729505141503.png" style="width: 400px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/274889i90FFB230AA479533/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The client will eventually connect and stay connected.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 10:06:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494143#M299661</guid>
      <dc:creator>Henry-M</dc:creator>
      <dc:date>2024-10-21T10:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494144#M299662</link>
      <description>&lt;P&gt;I've seen the error but only when it wasn't working period.&lt;/P&gt;&lt;P&gt;FYI the 127.0.0.1 IP is due to the architecture of the RADSEC. The APs use some sort of proxy in their code to implement RADSEC, so the dashboard will show the localhost IP instead of the actual IP.  It definitely confuses troubleshooting. The error could be within the AP RADSEC functionality or still be a normal error with connectivity or your RADIUS server.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 17:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494144#M299662</guid>
      <dc:creator>mloraditch</dc:creator>
      <dc:date>2024-10-21T17:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494145#M299663</link>
      <description>&lt;P&gt;If you're using a cloud based radius having a few failed auth's in between happens quite alot.  It's best to look at the logs of your radius service to see why it rejected that auth.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2024 20:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494145#M299663</guid>
      <dc:creator>joey.debra</dc:creator>
      <dc:date>2024-10-21T20:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494146#M299664</link>
      <description>&lt;P&gt;"We have been experiencing this problem since using SCEPman and RADIUSSaaS:&lt;BR /&gt;&lt;BR /&gt;'Client failed 802.1X authentication to the RADIUS server. auth&lt;EM&gt;mode='wpa2-802.1x' vlan&lt;/EM&gt;id='16' radius&lt;EM&gt;proto='ipv4' radius&lt;/EM&gt;ip='127.0.0.1' reason='radius&lt;EM&gt;login&lt;/EM&gt;failure' reassoc='1' radio='1' vap='3' channel='48' rssi='52'.&lt;BR /&gt;&lt;BR /&gt;We have tested the beta firmware in collaboration with Meraki Support, but it was a complete disaster. The current firmware works with the caveat of some of these messages. Downgrading the access point to the current firmware has unfortunately permanently damaged the access point; firmware downgrade, factory reset, none of it helped. Users can no longer connect to the SSID with radsec active on this specific access point."&lt;/P&gt;</description>
      <pubDate>Mon, 23 Dec 2024 13:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494146#M299664</guid>
      <dc:creator>HenkDirksen73</dc:creator>
      <dc:date>2024-12-23T13:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494147#M299665</link>
      <description>&lt;P&gt;That sounds just like the issue I had with all the errors getting logged. I'm having to use a RADIUS proxy in RADIUSaaS as a work around, which is far from ideal. I'm going to raise this again with Meraki support but they've been no help so far.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 09:48:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494147#M299665</guid>
      <dc:creator>Henry-M</dc:creator>
      <dc:date>2025-01-02T09:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494148#M299666</link>
      <description>&lt;P&gt;Hi all, im having a similar issue with an MR20. We have over 600 sites and it's only affecting one site where radsec refuses to work. Have had to switch to RADIUSaaS proxy at the moment. We have other sites with MR20's working fine.&lt;/P&gt;&lt;P&gt;The AP has firmware 30.7.1 and i've also got a ticket open with support.&lt;/P&gt;&lt;P&gt;Did anyone manage to get to the bottom of this?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 10:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494148#M299666</guid>
      <dc:creator>markd-bit</dc:creator>
      <dc:date>2025-11-07T10:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494149#M299667</link>
      <description>&lt;P&gt;Just to provide an update, they have told me this is known bug fixed in 31.1.6 but as this AP can only go up to 30.7.1 they have a custom firmware which can be installed. It locks the device to this version though, doesn't sound very good as a long term solution.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 14:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494149#M299667</guid>
      <dc:creator>markd-bit</dc:creator>
      <dc:date>2025-11-10T14:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: RADSEC Issues</title>
      <link>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494150#M299668</link>
      <description>&lt;P&gt;I am also having the same issue with a &lt;SPAN&gt;CW9164I access point running firmware version "MR 31.1.8". This has resulted in using a RADIUSaaS proxy as a work around. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 15:46:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/radsec-issues/m-p/5494150#M299668</guid>
      <dc:creator>AlexanderMorgan</dc:creator>
      <dc:date>2025-12-09T15:46:13Z</dc:date>
    </item>
  </channel>
</rss>

