In this document Cisco TAC engineer "Varun Ajmani" has explained how to troubleshoot when Clients disconnecting randomly with 5508 (220.127.116.11) authentication issues with SSID's using Ldap via an ACS 18.104.22.168 server.
WLC running 22.214.171.124 (all six controllers are facing same issue)
SSID using 802.1x, ACS 126.96.36.199 (PEAP-MSCHAPv2) with Active Directory
All domain users are getting de-authenticated. Machines have “user or machine authentication” selected when the issue occurs, once they
change it to “machine authentication” or reboot the machine, the issue is resolved.
Errors on ACS
*15039 Selected Authorization Profile is DenyAccess*Radius authentication failed for USER: DISTRICT\testuser MAC: 84-4B-xx-xx-xx-xx AUTHTYPE: PEAP(EAP-MSCHAPv2)*Radius authentication failed for USER: DISTRICT\testuser MAC: 84-4B-xx-xx-xx-xx AUTHTYPE: PEAP(EAP-MSCHAPv2)*Radius authentication failed for USER: DISTRICT\testuser MAC: 84-4B-xx-xx-xx-xx AUTHTYPE: PEAP(EAP-MSCHAPv2)*24423 ACS has not been able to confirm previous successful machine authenticationfor user in Active Directory*11003 Returned RADIUS Access-Reject
The aging time in ACS for End user authentication settings was set to 12 hours. We need to increase the timer to have the users connected throughout.
End User Authentication Settings
End User Authentication Settings
Enable Machine Access Restrictions
Click to ensure that machine authentication results are tied to user authentication and authorization. If you enable this feature, you must set the Aging time.
Aging time (hours) time
Time after a machine was authenticated that a user can be authenticated from that machine. If this time elapses, user authentication fails.
You must set this time if you clicked the Enable Machine Access Restrictions check box.
ACS supports the authentication of computers that are running the Microsoft Windows operating systems that support EAP computer authentication. Machine authentication, also called computer authentication, allows networks services only for computers known to Active Directory.
This feature is especially useful for wireless networks, where unauthorized users outside the physical premises of your workplace can access your wireless access points.
When machine authentication is enabled, there are three different types of authentications. When starting a computer, the authentications occur in this order:
Machine authentication—ACS authenticates the computer prior to user authentication. ACS checks the credentials that the computer provides against the Windows identity store.
User domain authentication—If machine authentication succeeded, the Windows domain authenticates the user. If machine authentication failed, the computer does not have access to Windows domain services and the user credentials are authenticated by using cached credentials that the local operating system retains.
User network authentication—ACS authenticates the user, allowing the user to have network connectivity. If the user exists, the identity store that is specified is used to authenticate the user.
HelloI have only one access point outdoor with 4 antenne omnidirectionnel and near c two GSM antenna ...So throughput is not stable and Always low !!!I want to know what's paramater (s) that allow increase throughput ( débit) .Power level , width Channel ...
Hi, Anybody knows how to pull detailed report that showing all APs CDP neighor switches of WLC? Can see one by one through CDP->AP Neighbor, but we have almost 300 APs and bulk report of that, we have Prime.
Hello There is a site where a wireless environment was built with CT3504 (users are factory equipment). All AP power levels are at their maximum (it is said to be difficult to lower because the strength at which the client receives signals is no...
I have a Cisco 1562E - 9120 and i want to extend an antenna about 45ft out to another location. can this WAP support this. Is the documentations the support this theory? or test confirmation possibly? also would I need a specific Co...