08-26-2025 01:45 PM
I am in the middle of migrating WLC 5520 (8.10.190.0) to C9800-CL (17.12.05) while APs remain the same (3802i). AAA servers are ISE 3.4 patch 2. We use centralized switching (no Flex mode). I have an 802.1X SSID allowing both EAP-TLS and PEAP+MSCHAPv2. The SSID on WLC 5520 works for pretty much all devices we have. The same SSID on C9800-CL works for most devices I tested so far but one particular Windows laptop.
It’s interesting to notice the captured packets are between the C9800-CL and the AP, but 802.1X authentication is between the supplicant (laptop) and the AP (BSSID MAC). On a successful connection, after the supplicant sends Response with Identity (host/xxxxxx), the AP sends a EAP-TLS Request, and after quite a few EAP packets exchange authentication succeeds.
On a failed connection, after the supplicant sends Response with Identity (host/xxxxxx), the AP just sends a Failure EAP packet and never sends a 802.1X proposal:
This explains why ISE never sees a Radius request for this particular laptop. I’ve tested 5 Windows laptops and a few iOS/Android devices so far, and found only one problematic laptop, but I don’t know how many more out of about 1000 laptops may experience the same issue.
A TAC ticket is going nowhere, and the engineer insists something is wrong with the laptop but doesn’t know what exactly is wrong. I’ve seen some similar issues online and it seems nobody was able to explain why there is no logs on Radius servers. Has anyone seen this?
08-26-2025 02:11 PM
I see same issue month ago' but what can I say' engineer leave us with many Q and dont reply to our comment.
Anyway' what I understand'
There are two inner and outer authc
The identity wlc receive for outer authc is wrong and this make authc failed.
MHM
08-26-2025 02:24 PM
My understanding is PEAP + MSCHAPv2, PEAP + EAP-TLS etc. use outer and inner authc, but EAP-TLS alone uses only one layer. I am thinking a compatibility issue between 3802 AP and C9800-CL but according to this matrix they are supported.
08-26-2025 02:28 PM
Yes correct eap-tls use only one authc
Let take it as reference
Connect laptop to wlc 5500 and capture traffic and connect it to wlc 9800 and capture traffic
Then identity response open both packet and share it here let me check different
MHM
08-27-2025 07:48 AM
Unfortunately the only way to do packet capture on 5520 is to use an AP as monitor AP, which I don't have one handy now. When I try "config ap packet-dump" it says my AP doesn't support it.
08-27-2025 10:51 AM
Hey @Simon Z, although the 5520 doesn't support packet capture natively you can still achieve it via this flow: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/211342-packet-captures-on-aireos-wlc.html
Since its Identity response you are after, give this a shot and compare against 9800, for AP side packet capture I would suggest to do an EPC on the switch where AP is connected and do the same for 5520 vs 9800.
08-26-2025 02:38 PM
It may not be easy to do packet capture on 5520. Wireshark on the laptop seems not be able to capture all 802.11 traffic as the Wi-Fi card doesn't support "Monitor mode". I am going to try if I can do it on the AP.
08-26-2025 11:36 PM
- @Simon Z Use client debugging for this windows laptop using instructions from https://logadvisor.cisco.com/logadvisor/wireless/9800/9800ClientConnectivity
These so called RadioActive Traces can be analyzed with Wireless Debug Analyzer
Outputs from commands mentioned in https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/217738-monitor-catalyst-9800-kpis-key-performa.html#toc-hId-866973845
can also be useful
Validate the configuration of your new C9800-CL controller using the CLI command
show tech wireless and feed the output from that into Wireless Config Analyzer
M.
08-27-2025 07:43 AM
Wireless Debug Analyzer shows a simple reason: Cred Fail. For whatever reason, the WLC/AP and the client don't try any of the 802.1X protocols. As soon as the client provides Identity as host/<FQDM>, WLC/AP says Failure.
Wireless Config Analyzer shows 1 error 16 warnings - none seems related to the issue.
08-27-2025 07:56 AM
In wlc 9800 there is EPC use it to share traffic between WLC abd ISE' let see if WLC is end authc or ISE
Share ISE ver abd wlc ver
Thanks
MHM
08-27-2025 11:32 PM
- @Simon Z If the issue is experienced on one laptop only and not the rest of them ,then the issue is not related to the wireless infrastructure : my advice is to safe user data , and re-install the laptop from scratch.
M.
08-28-2025 11:04 AM
08-27-2025 08:40 AM - edited 08-27-2025 08:42 AM
I specify 9800 as source and ISE as destination in EPC, then try to join the SSID on the problematic laptop. Nothing is captured. When I try on a good laptop, I see lots of Radius traffic.
9800 is v17.12.05. ISE is v3.4 patch 2.
08-27-2025 08:49 AM
Good, now what is good laptop and bad laptop?
What is OS for both laptop?
08-27-2025 09:10 AM
The bad one is now Win11 version 24H2 (a fresh install). Tried Win10 on it earlier. Same issue.
The good ones include Win10 (22H2), Win 11 (22H2 and 24H2).
They all have the latest Windows updates.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide