09-09-2024 02:00 PM
I migrated ISE from 2.7 to 3.3 and all configs are same. for wireless Radius client I changed shared key to a new one on WLC and ISE and clients fails to authenticate, if I change back to old key then it works! any advice ? maybe WLC somehow caches old shared key?
11036 The Message-Authenticator RADIUS attribute is invalid
Check whether the Shared Secrets on the AAA Client and ISE Server, match. Ensure that the AAA Client and the network device, have no hardware problems or problems with RADIUS compatibility. Also ensure that the network that connects the device to the ISE, has no hardware problems.
Solved! Go to Solution.
09-13-2024 03:43 PM
For the community:
I finally figured out the issue. we had the default ISE settings enabled for Radius with old shared key, the default settings says in case a network device tries to auth to ISE and not defained can be auth via this shared key and that is why it was working till the moment i changed WLC shared key on ISE and WLC. so i disabled default and defined ISE device for APs which i basically put the subnet on WLC device rather than just a single IP.
09-09-2024 04:08 PM
Make sure you are not using some kind of invalid password. As per cisco docs, the explanation to the message you see is
"When should you expect validation failure?
Validation failure will occur when the shared secret is invalid. Then, the AAA server is not able to validate the request.
The ISE reports:
11036 The Message-Authenticator Radius Attribute is invalid.
This usually occurs at the later stage when the EAP message is attached. The first RADIUS packet of the 802.1x session does not include the EAP message; there is no Message-Authenticator field and it is not possible to verify the request, but at that stage, the client is able to validate the response with the use of the Authenticator field."
09-09-2024 04:20 PM
I am sure of that. I did again, I literally copy and paste a shared key to both ISE and WLC and still same error. then copy and paste old shared key on both and works!
09-10-2024 04:14 AM
Probably you hit some bug. It just dont make sense.
09-10-2024 05:08 AM
Does the shared key contain certain special characters $!%^ etc?
I have found that IW9167 AP's will not accept keys with certain characters, including SNMP strings with say a $ in it.
09-10-2024 08:19 AM
I am using ! and # in the key. based on your advice I just changed it to a simpler alphabet and number only and still same issue. as a matter fact it only works with old shared key! this means somewhere somehow WLC still holding onto old one and i can't figure out how.
I have two ISE RAD server defined in WLC config -> AAA --> then defined server group --> then defined list and binded the server group then called the list in WLAN security AAA Authentication list
09-10-2024 05:13 AM
dont depend on GUI
use CLI in WLC and check radius server password and CoA password if you use CWA
MHM
09-10-2024 08:22 AM
I just did the config via CLI and still same issue
09-11-2024 07:04 AM
can you add new Device in ISE for WLC with new Password instead of change only password
MHM
09-11-2024 03:17 PM
I did and still same issue. worth to mention I have been on the webex with TAC for few hours today and here is the finding:
- I setup the wireless from scratch two years ago with this spec related to the topic:
* created RAD Auth with ISE so defined ISE and on ISE defined WLC as a network device so WLC can send RAD Auth to ISE and for establishment between ISE and WLC defined shared key and added RAD Auth list on WLAN which is EAP cert based
* mode is Flex Mode local switching and for new clients to be connected or re-connect in case of WLC failure I enabled RAD Auth on Flex profile and added same RAD Auth list to Local Auth Tab " Radius Server Group "
* so basically WLC and APs can communicate directly to ISE and in case WLC failure still wireless works.
* on policy profile disabled central authentication ( which according to TAC today it makes only AP to be Authenticater and deal with ISE hence AP needs to be defined in ISE device list!
being said that at the time I setup and tested this I only added WLC to ISE device list and "NOT APs" and it worked perfect till two days ago even thu based on TAC AP should be added to ISE device list and I agree logically.
So based on TAC and tested as a proof when enabled central auth or add AP as device list of ISE the issue of changing shared key goes away and works, which is fine but why without doing that before it was working so far ( without adding AP to ISE or enabling central Authentication on policy profile )?! thats a question that we are investigating with TAC and will continue with it tomorrow.
just wanted to share this
09-11-2024 09:42 PM
The authc can be central (via WLC) or local (via AP)
So if it central you need add WLC as NAD to ISE
If it local the you need to add AP as NAD to ISE
And you need to not use any condition for NAD in authc and authz policy
That my opinion
MHM
09-13-2024 03:43 PM
For the community:
I finally figured out the issue. we had the default ISE settings enabled for Radius with old shared key, the default settings says in case a network device tries to auth to ISE and not defained can be auth via this shared key and that is why it was working till the moment i changed WLC shared key on ISE and WLC. so i disabled default and defined ISE device for APs which i basically put the subnet on WLC device rather than just a single IP.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide