In this document Cisco TAC engineer "Varun Ajmani" has explained how to troubleshoot when Clients disconnecting randomly with 5508 (22.214.171.124) authentication issues with SSID's using Ldap via an ACS 126.96.36.199 server.
WLC running 188.8.131.52 (all six controllers are facing same issue)
SSID using 802.1x, ACS 184.108.40.206 (PEAP-MSCHAPv2) with Active Directory
All domain users are getting de-authenticated. Machines have “user or machine authentication” selected when the issue occurs, once they
change it to “machine authentication” or reboot the machine, the issue is resolved.
Errors on ACS
*15039 Selected Authorization Profile is DenyAccess*Radius authentication failed for USER: DISTRICT\testuser MAC: 84-4B-xx-xx-xx-xx AUTHTYPE: PEAP(EAP-MSCHAPv2)*Radius authentication failed for USER: DISTRICT\testuser MAC: 84-4B-xx-xx-xx-xx AUTHTYPE: PEAP(EAP-MSCHAPv2)*Radius authentication failed for USER: DISTRICT\testuser MAC: 84-4B-xx-xx-xx-xx AUTHTYPE: PEAP(EAP-MSCHAPv2)*24423 ACS has not been able to confirm previous successful machine authenticationfor user in Active Directory*11003 Returned RADIUS Access-Reject
The aging time in ACS for End user authentication settings was set to 12 hours. We need to increase the timer to have the users connected throughout.
End User Authentication Settings
End User Authentication Settings
Enable Machine Access Restrictions
Click to ensure that machine authentication results are tied to user authentication and authorization. If you enable this feature, you must set the Aging time.
Aging time (hours) time
Time after a machine was authenticated that a user can be authenticated from that machine. If this time elapses, user authentication fails.
You must set this time if you clicked the Enable Machine Access Restrictions check box.
ACS supports the authentication of computers that are running the Microsoft Windows operating systems that support EAP computer authentication. Machine authentication, also called computer authentication, allows networks services only for computers known to Active Directory.
This feature is especially useful for wireless networks, where unauthorized users outside the physical premises of your workplace can access your wireless access points.
When machine authentication is enabled, there are three different types of authentications. When starting a computer, the authentications occur in this order:
Machine authentication—ACS authenticates the computer prior to user authentication. ACS checks the credentials that the computer provides against the Windows identity store.
User domain authentication—If machine authentication succeeded, the Windows domain authenticates the user. If machine authentication failed, the computer does not have access to Windows domain services and the user credentials are authenticated by using cached credentials that the local operating system retains.
User network authentication—ACS authenticates the user, allowing the user to have network connectivity. If the user exists, the identity store that is specified is used to authenticate the user.
Hello I hope someone has a few moments to help.I have installed a C9130AXI-E with Mobility Express "C9800-AP-universalk9.17.03.03",. Because this is a 9130 I have, during installation, uploaded C9800-AP-iosxe-wlc.bin and ap1g6a. "ap1g6a" is...
Hi all, does anyone knows if it is possible to use the old AIR-ACC1530-PMK1 mounting bracket with the new Catalyst 9124AX APs? New mounting kit for outdoor Catalyst AIR-MNT-VERT1 seems to have the same specs as AIR-ACC1530-PMK1 accordi...
hi guys. i have a cisco 2960G-24Tc-l that connected to radio. occasionally the Communication port downed and lose its connection but the radio is on without any problem. the debugging cli only show that the port is shutting down. i re...
Hi Team,I am having below queries for 9120 AP. Can anyone assist
i. What are the commands to configure WLC IP address through console?
ex. for 3800 AP - controller ip address XXXX YYYY
ii. Any other best practices for installations comparing to 3800...