cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1919
Views
2
Helpful
1
Replies

(AAA Server Down) PSA

hemmerling
Level 3
Level 3

For anyone else having this kind of problem, I would ask if you have type 6 or type 7 passwords for your radius servers in the 9800CL config?
For years I've been seeing a bug in IOS-XE that you only see when you turn on FIPS and have type 6 radius passwords for something other than ISE, in that the device just stops talking to the radius server, no errors (other than "AAA Server Down" in the 9800CL when trying to authenticate users, and no radius traffic being seen in a capture upstream from a switch), it just doesn't do anything.
So if you're getting (AAA Server Down), and are sure your credentials and ACLs are fine all the way to the server, maybe try removing "password encryption aes" and then remove the radius servers with the type 6 passwords, and re-add them, (now a type 7), and see if your AAA Server Down problem doesn't go right away.
I've seen this on switches running IOS-XE and now the 9800CL. Strangely enough type 6 passwords work just fine with ISE, just nothing else (Forescout, NPS). 
I think a lot of people stumble into the solution and don't realize what fixed it, in switches you turn FIPS on in the CLI, in the 9800CL it's only seen in the GUI. I bet most people won't ever see this bug unless you have to turn FIPS on or accidently turn it on.

Cisco seems to acknowledge this now, but no one is associating this with the problems it's causing. This post is so someone looking can go straight to the solution.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-17/config-guide/b_wl_17_17_cg/m-fips.html 

"FIPS is not compatible with level-6 encrypted passwords. Additionally, 802.1X authentications will fail if the RADIUS shared secret uses a type-6 encryption key."

1 Reply 1

Rich R
VIP
VIP

We use radius extensively but never with ISE and never seen this issue (although we have seen a number of other bugs related to type 6 encryption!) so I think you're right this is only applicable when FIPS is enabled (which we don't use).

Good to know - thanks for the info.

------------------------------
Please click Helpful if this post helped you and Accept as Solution (drop down menu at top right of this reply) if this answered your query.
------------------------------
TAC recommended codes for AireOS WLC's   and   TAC recommended codes for 9800 WLC's
Best Practices for AireOS WLC's,   Best Practices for 9800 WLC's   and   Cisco Wireless compatibility matrix
Check your 9800 WLC config with Wireless Config Analyzer using "show tech wireless" output or "config paging disable" then "show run-config" output on AireOS and use Wireless Debug Analyzer to analyze your WLC client debugs
Field Notice: FN63942 APs and WLCs Fail to Create CAPWAP Connections Due to Certificate Expiration
Field Notice: FN72424 Later Versions of WiFi 6 APs Fail to Join WLC - Software Upgrade Required
Field Notice: FN72524 IOS APs stuck in downloading state after 4 Dec 2022 due to Certificate Expired
- Fixed in 8.10.196.0, latest 9800 releases, 8.5.182.12 (8.5.182.13 for 3504) and 8.5.182.109 (IRCM, 8.5.182.111 for 3504)
Field Notice: FN70479 AP Fails to Join or Joins with 1 Radio due to Country Mismatch, RMA needed
Field Notice: FN74383 APs Running 17.12.4/5/6/6a May Run Out of Flash Space Preventing Upgrades
How to avoid boot loop due to corrupted image on Wave 2 and Catalyst 11ax Access Points (CSCvx32806)
Field Notice: FN74035 - Wave2 APs DFS May Not Detect Radar After Channel Availability Check Time
Leo's list of bugs affecting 2800/3800/4800/1560 APs
Default AP console baud rate from 17.12.x is 115200 - introduced by CSCwe88390
Review Cisco Networking for a $25 gift card