cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
622
Views
0
Helpful
1
Replies

Mobility controller Password + mac filtering not working for all users

hashimwajid1
Level 3
Level 3

Hi Team,

 

we are using 1560 AP as mobility controller for other APs. firmware is 8.10.130.0. it works fine when we enable SSID with Password protection only or with MAC filtering only.

 

however when we enable Password + MAC filtering together on that SSID then most of users are not connecting at all (users are mix of android, Apple, windows)

below are the controller logs of one user when he trying to connect. client mac is A2:93:EF:B8:FC:3F

 


(Cisco Controller) >debug client A2:93:EF:B8:FC:3F  

(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >*emWeb: Mar 02 08:43:30.032:
Debugging session started on Mar 02 08:43:30.032 for WLC AIR-AP1562I-M-K9 Version :8.10.130.0
*apfReceiveTask: Mar 02 08:44:26.303: IP Context distribution - event: (DHCP IP LEARN) msCount: 1 ToAllAps: 1
*spamApTask0: Mar 02 08:45:00.144: IP context - srcApMac: 10:06:ED:E3:02:80 msMac: 48:B8:A3:6F:D4:74 msIpAddr: 10.6.96.34 msIpv6Cnt: 1
*spamApTask0: Mar 02 08:45:00.144: msIpv6Addr[1] : fe80:0000:0000:0000:183d:b131:0238:f7c7
*spamApTask0: Mar 02 08:45:00.149: IP context - srcApMac: 10:06:ED:E3:02:80 msMac: 48:B8:A3:6F:D4:74 msIpAddr: 10.6.96.34 msIpv6Cnt: 1
*spamApTask0: Mar 02 08:45:00.149: msIpv6Addr[1] : fe80:0000:0000:0000:183d:b131:0238:f7c7
*spamApTask0: Mar 02 08:45:09.331: IP context - srcApMac: 74:AD:98:BE:EB:A0 msMac: 48:B8:A3:6F:D4:74 msIpAddr: 10.6.96.34 msIpv6Cnt: 1
*spamApTask0: Mar 02 08:45:09.331: msIpv6Addr[1] : fe80:0000:0000:0000:183d:b131:0238:f7c7
*spamApTask0: Mar 02 08:45:09.356: IP context - srcApMac: 74:AD:98:BE:EB:A0 msMac: 48:B8:A3:6F:D4:74 msIpAddr: 10.6.96.34 msIpv6Cnt: 1
*spamApTask0: Mar 02 08:45:09.356: msIpv6Addr[1] : fe80:0000:0000:0000:183d:b131:0238:f7c7
*spamApTask0: Mar 02 08:45:16.569: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:16.570: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:16.750: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:16.751: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:16.936: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:16.938: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:17.121: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:17.122: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:17.546: a2:93:ef:b8:fc:3f Received DELETE mobile, reasonCode MN_AP_AUTH_STOP, deleteReason 15 from AP 10:06:ed:e3:02:80, slot 1 ...cleaning up mscb
*spamApTask0: Mar 02 08:45:29.409: IP context - srcApMac: 74:AD:98:BE:EB:A0 msMac: 46:34:12:DB:F8:17 msIpAddr: 10.6.96.30 msIpv6Cnt: 1
*spamApTask0: Mar 02 08:45:29.409: msIpv6Addr[1] : fe80:0000:0000:0000:4434:12ff:fedb:f817
*spamApTask0: Mar 02 08:45:29.421: IP context - srcApMac: 74:AD:98:BE:EB:A0 msMac: 46:34:12:DB:F8:17 msIpAddr: 10.6.96.30 msIpv6Cnt: 1

 

appreciate you response 

 

 

 

 

 

 

1 Reply 1

Arshad Safrulla
VIP Alumni
VIP Alumni

I am pretty sure multiple authentication (PSK+MAB) is supported in AireOS running boxes and VM's. But I haven't tested it yet in ME. I would suggest that you start by upgrading your code to the latest Cisco recommended 8.10.162 or higher and then test.

Review Cisco Networking for a $25 gift card