01-06-2020 04:15 AM - edited 07-05-2021 11:29 AM
Hello all,
I have had WiFi network with 8 APs with one SSID which was PSK secured. One month ago, we have added I have created new SSID which is 802.1X secured with ISE but it turned to be nightmare for me. Some part of people are complaining that they face a lot of outages in using new wifi and it is so bad. I have checked and they were right, some people have weird problems. I updated all their drivers and OS, moreover I disabled DFS channels from DCA(My APs was seeing a lot of radar signals on DFS channels) but nothing helped. Interesting part is that people sitting in same room next to each other and one has problem while for another everything is smooth. I wonder whether that is connected with any timeout timers or nor. I have disabled Re-Authentication timeout and Idle Session Timeout which was not helpful. I am using Cisco recommended software.
Any help is appreciated.
02-10-2020 03:26 AM
02-10-2020 03:49 AM
Well,
11v has been disabled since WLAN creation. 11k - Neighbor List is only thing that is enabled. 11r was disabled by advise which then enabled back because people had both problem with same issue and with roaming.
I cannot be sure that it is because of ISE or 802.1x because all users are authenticated very well. The problem appears to happen after they are authenticated and been working with wifi for a while. I disabled re-authentication and idle-session timeout for minimizing re-authentication.
90% percent of devices in our corporation is MAC and other part is also latest other vendor devices. We checked all drivers and updates which are up to date.
AAA override is enabled under WLAN but ISE is not pushing any VLAN. Authentication policy in ISE is configured to be EAP-TLS and Authorization Policy is set to be Access-Accept and SGT Values.
The current WLAN is in Fabric Network and APs for that WLAN plays standalone role working with VXLAN.
02-10-2020 06:08 AM
02-10-2020 09:49 AM
What you are describing sounds like a compatibility issue with Macbooks and the WLC on the rekey that happens after a session timeout. You may have this disabled on the WLAN but ISE can override it in the authorization policy. Give me the TAC sr number and we can work on it together to confirm if this is the case.
02-10-2020 11:20 PM
Hello,
Here is ,SR 688082420, TAC serial number but as I said because I was in leave and my colleagues forgot to continue working on the case, it was closed. I would really appreciate any help because I already suffer from this problem for 3 months.
Really interesting, if it is compatibility problem then why not all users with same devices are infected. 2 users sitting next to each other with same device and in same AP, but only one faces the issue.
02-11-2020 04:57 AM
If this is the issue I'm thinking it is, then the difference would be the session timeout. The session timeout starts after the client authenticates. Both clients would have most likely authenticated at different times meaning their timeouts would happen at different times. This issue is also a race condition so it only happens on about 10% of the session timeouts. What happens is the client has an encryption key, after the session timeout the key changes, sometimes we already have packets in the queue that have been encrypted with the old key. We send these packets out to flush the queue. The Macbook receives these packets, thinks it is a replay attack and blacklists the bssid. See cisco bug CSCvo91525. I will send you an email to help dig into this further.
02-11-2020 06:10 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide