05-12-2025 06:50 AM
Is it possible to create a client exclusion policy for the Cisco 9800's to prevent bad password attempts from locking out a users AD account? I have found some documentation that all seems to be for AireOS for configuring Client Exclusion Policies which appears to be what I am after, but I can't find the equivalent configuration on 9800. I wanted to configure an exclusion policy to exclude a client that failed 802.1x authentication after 4 failed attempts. Our AD lockout policy is 5 failed attempts so hoping to stop the client from continually locking out the account before it hits AD. I have found the Client Exclusion policy under Wireless Protection Policies, but there aren't any options to configure the max failures or lockout duration, just some checkboxes to enable the events. We have 1 particular SSID that relies on PEAP for non-company-managed devices where this scenario is a problem. I couldn't find anything under this SSID's policy profile that would allow me to set a max failure for bad passwords.
05-12-2025 08:14 AM
That policy can be only enabled in the RADIUS server (ISE/NPS) but not in the WLCs.
The only option is to tweak the Client Exclusion Policy in WLC to block the client for x amount of time if they send multiple failed authentications:
wireless wps client-exclusion dot11-assoc
wireless wps client-exclusion dot1x-auth
wireless wps client-exclusion dot1x-timeout
no wireless wps client-exclusion ip-theft
wireless wps client-exclusion web-auth
05-12-2025 08:49 AM
it's possible that I misunderstood the client exclusion policies, it appeared in the AireOS configuration that it was more customizable rather than just enabled or disabled as you could specify the max-1x-aaa-fail-attempts, maybe this only applies when you are running internal RADIUS on the controller. If it's not possible to do from the controller, I will investigate the possibility of enabling MaxDenials in Microsoft NPS.
05-12-2025 08:34 AM
Since your AD lockout policy is 5 failed attempts, it should not happen. Because, by design, exclusion due to excessive 802.1x auth failure will only happen when client fail 3 consecutive attempts. In the 4th attempt it will be excluded.
05-12-2025 08:41 AM
I would love if this is how it was working, but unfortunately clients are not being excluded after 4 consecutive failed attempts and ultimately their accounts are being locked out in AD. I can confirm that we do have wireless wps client-exclusion dot1x-auth enabled. Just for clarity, this is on a 9800 running 17.9.6 code.
05-12-2025 08:49 AM
If possible, can you take RA trace+ EPC with client mac address as filter and share? make sure that you start these first and then repro the issue.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide