cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1263
Views
5
Helpful
14
Replies

PSK WLAN showing 802.1x Auth Failure

IlijaZhikovski
Level 1
Level 1

Greetings everyone,

I really need help with an issue that appeared randomly out of nowhere. All of a sudden, clients trying to connect to a PSK WLAN show 802.1x authentication failures when trying to connect to this PSK WLAN and these clients go to excluded clients for this reason.

The log which i keep seeing for example is:

Client Excluded: MAC Address:28:cd:c4:71:b0:31, Base Radio MAC:0c:d5:d3:cd:fb:00, Slot:1, Username:Unknown, IP Address:Unknown, Reason:802.1x Authentication failed 3 times., ReasonCode:4

Virtual WLC version: 8.10.190.0

AP model: C9105AXI-E

Configuration of the PSK WLAN:

IlijaZhikovski_1-1730900417611.pngIlijaZhikovski_2-1730900439787.png

IlijaZhikovski_3-1730900461227.png

IlijaZhikovski_4-1730900493470.png

I'm in desperate need of some help after days of troubleshooting. I'm here to offer any information regarding the issue i'm facing.

 

Regards

 

 

 

14 Replies 14

marce1000
Hall of Fame
Hall of Fame

 

 - I would start by upgrading to https://software.cisco.com/download/home/284464214/type/280926587/release/8.10.196.0
   and check if that can help ; that is important these days because aireos solutions are EOL and the platforms should use the last release per model ,

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Share the following output

  • show wlan <Wlan Number>
  • show radius summary

Jagan Chowdam

/**Pls rate useful responses**/

IlijaZhikovski
Level 1
Level 1

@marce1000 I'll plan for the following days to make a upgrade from 8.10.190.0 to 8.10.196.0. Hopefully these issues can be sorted out. Also, what are your recommendations about replacing this WLC to plan in the near future? I have around 200 APs, around 1000 to 1500 clients.

@jagan.chowdam Greetings Jagan, here are the following outputs which you requested, attached.

As you can see in the show_wlan.txt file, 802.1x is completely disabled, only PSK is enabled. Like i mentioned, for some unknown reason, i get 802.1x Auth Failures and clients being excluded for this WLAN.

Please if you have any suggestions about resolving this issue, or need any additional information, let me know.

Regards

 

 - @IlijaZhikovski wrote :  Also, what are your recommendations about replacing this WLC to plan in the near future? I have around 200 APs, around 1000 to 1500 clients.

      You should certainly migrate to the 9800 platform ; about choosing a model  ; checkout https://www.cisco.com/c/en/us/products/collateral/wireless/catalyst-9800-series-wireless-controllers/nb-06-cat9800-ser-wirel-faq-ctp-en.html
               Look at Table 2

  To maintain compatibility for access points , use https://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html

  M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Rich R
VIP
VIP

Have you tried rebooting the APs?
What is the affected client?
If Windows with Intel driver make sure driver is updated to latest version:
https://www.intel.com/content/www/us/en/download/19351/intel-wireless-wi-fi-drivers-for-windows-10-and-windows-11.html

And updating to last version of code essential to get all available bug fixes as Marce highlighted.

Are this issue solved??

MHM

@IlijaZhikovski 

when dealing with weird and unknow issue, start by removing things you dont know why is there. For example, you have WPA2+WPA3 enabled on the Layer2 Security But in Policy you are using only WPA2. Keep config consistent, this avoid trigger more bugs than this device already have.

 Disable Fast Transition unless you tested it and this is required for your environment

Lastly, this log "Reason:802.1x Authentication failed 3 times" is not related to your problem. No way the WLC send you 802.1x fail in a PSK transation.

It would be great to see "debug client <mac address> from one client that connect to the mentioned SSID

 

IlijaZhikovski
Level 1
Level 1

@Rich R Hello Rich, yes, we rebooted the APs multiple times. The affected clients are Dell Laptops and Android/Apple devices.

We will try to the last version of code, which is 8.10.196.0 and see if the issues will be fixed.

@MHM Cisco World Greetings, the issues aren't fixed still.

@Flavio Miranda If i choose WPA+WPA2, it's the same situation, since i'm using only WPA2. These are the options available on the WLC, there's no solely "WPA2" option:

IlijaZhikovski_0-1731333247571.png

Fast Transition is on Adaptive, but that's by default. I'll try to disable it.

I'll also try to debug a client in the following day.

Regards!

You can use WPA+WPA2.  At least we know very well that WPA and WPA2 is there for a long time and cause no issue. Cant say the same for WPA3.

 I had issue with FT in the past andI prefere keep it off.

Send the client debug please while testing. Let see what we can get

you use simple WPA PSK so why log show 802.1x??
can you check the monitor>client 

see in which SSID the client join 

MHM

Have you tried setting the SSID Authentication to "OPEN/None" to see if clients connect without issues? If it's a production SSID, you could create a new SSID with the same settings but set L2 security to "None" for testing. 

Jagan Chowdam

 

 

 

Scott Fella
Hall of Fame
Hall of Fame

Create a new SSID that you can test with and just setup the WLAN very basic using WPA + WPA2.

test-ssid.gif

-Scott
*** Please rate helpful posts ***

IlijaZhikovski
Level 1
Level 1

@Flavio Miranda I haven't set WPA2+WPA3 manually on any of my SSIDs. This must've been done by the WLC itself automatically when i upgraded it from 8.7.106.0 to 8.10.190.0. There's also another bug i have on 8.10.190.0 version, i tried setting WPA+WPA2 per your recommendation on a couple of SSIDs, but when i click Apply, the change is not saved, the SSID stays to WPA2+WPA3. At least when i disabled the "Fast Transition" , the change was saved. I guess i can try and create a test SSID with WPA+WPA2.

@MHM Cisco World That's the whole reason why i opened this discussion, the devices attempt to join a PSK WLAN and for some reason i keep seeing 802.1x failures.

@jagan.chowdam I'm gonna create a new SSID to test just in case, using WPA+WPA2 + no Security like you recommended.

@Scott Fella Greetings Scott, i'll try and create a new SSID with your recommendations, thank you!

 

Meanwhile, I can share with you all the following troubleshooting and "fix" i did for the SSIDs, if you could call it a "fix" even. Here are the steps i've done:

- Tried connecting to the SSID again, got 802.1x failures and client moved to excluded

- Noticed the "11ax Status" is enabled on the SSID, disabled it due to @Rich R recommendation about possible Wi-Fi 6 issues with drivers, got 802.1x failures and client moved to excluded again

- Enabled the "11ax Status" on the SSID, tried to connect again, got 802.1x failures and client moved to excluded again

- After these steps of disabling/enabling "11ax Status" , i then decided to re-enter the same PSK as it was before. Then i tried to connect to the SSID, and the client connected without any issues. No 802.1x failures, no exclusion of the client, no issues at all. The client had successfully connected to the SSID.

A day has passed since i did these changes, I tried connecting again today to the same SSID, the client again connected without any 802.1x failures or exclusions.

I don't know if you could call this a "fix" , but at least this worked for me at the moment of this discussion, not sure if it will stay like this in the near future while i'm planning to move to the Catalyst 9800 Wireless Controller for Cloud. Hopefully it will help for others if they have a similar issue as mine.

I would like to thank everyone for their time and effort regarding these issues, even though we haven't found a permanent "fix".

@MHM Cisco World That's the whole reason why i opened this discussion, the devices attempt to join a PSK WLAN and for some reason i keep seeing 802.1x failures. <<- did you check the monitoring > client 

MHM

Review Cisco Networking for a $25 gift card