cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2495
Views
11
Helpful
48
Replies

Windows laptop not able to join 802.1x SSID on C9800-CL

Simon Z
Level 1
Level 1

I am in the middle of migrating WLC 5520 (8.10.190.0) to C9800-CL (17.12.05) while APs remain the same (3802i). AAA servers are ISE 3.4 patch 2. We use centralized switching (no Flex mode). I have an 802.1X SSID allowing both EAP-TLS and PEAP+MSCHAPv2. The SSID on WLC 5520 works for pretty much all devices we have. The same SSID on C9800-CL works for most devices I tested so far but one particular Windows laptop.

  1. The same laptop connects to the SSID on 5520 without any issues using EAP-TLS. Tried different Windows builds (10 and 11) and updated Wi-Fi NIC driver to the latest. Machine certificate is fine. Tried manually adding network with EAP-TLS, and PEAP + MSCHAPv2. None worked with the new C9800-CL.
  2. There is no logs for this particular laptop/MAC on ISE meaning the Authenticator (C9800-CL) is not sending Radius request to Authentication Server (ISE) when the Supplicant client tries to join the SSID.
  3. I did some packet captures on the C9800-CL by providing “Inner Filter MAC” and did a comparison between a successful connection and a failed one.

It’s interesting to notice the captured packets are between the C9800-CL and the AP, but 802.1X authentication is between the supplicant (laptop) and the AP (BSSID MAC). On a successful connection, after the supplicant sends Response with Identity (host/xxxxxx), the AP sends a EAP-TLS Request, and after quite a few EAP packets exchange authentication succeeds.

SimonZ_0-1756240489592.png

On a failed connection, after the supplicant sends Response with Identity (host/xxxxxx), the AP just sends a Failure EAP packet and never sends a 802.1X proposal:

SimonZ_1-1756240489596.png

This explains why ISE never sees a Radius request for this particular laptop. I’ve tested 5 Windows laptops and a few iOS/Android devices so far, and found only one problematic laptop, but I don’t know how many more out of about 1000 laptops may experience the same issue.

A TAC ticket is going nowhere, and the engineer insists something is wrong with the laptop but doesn’t know what exactly is wrong. I’ve seen some similar issues online and it seems nobody was able to explain why there is no logs on Radius servers. Has anyone seen this?

48 Replies 48

Ok in your original post you can capture traffic 

Capture both wifi good and bad 

Abd share the identity response from client I need to see it

MHM

Simon Z
Level 1
Level 1

For a good connection, it's a bunch of EAP and TLSv1.2 packets:

SimonZ_0-1756318239354.png

I believe my issue is very similar to this one:

https://community.cisco.com/t5/wireless/reason-cred-fail-on-interface-capwap/td-p/4971126/page/2

The OP claimed he fixed the issue by adding a Windows Registry key named TTLS (to apply to EAP-TTLS) and a DWORD named Tlsversion in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\13. I believe the value fc0 forces Windows to use one of TLS 1.0, 1.1 or 1.2, not TLS 1.3. I did the same to no avail.

Friend only I need to see identity response for both cases 

MHM

Simon Z
Level 1
Level 1

Sorry @Parithosh Vema I missed your post. I followed the instruction. I specified src/dst as 5520/AP and AP/5520 and this is what I got:

SimonZ_0-1756322012240.png

 

Unfortunately there is no EAP traffic being captured. Not sure I used a wrong ACL. Apparently the client doesn't have an IP yet at this stage. I did notice there is some limitations by doing this:

SimonZ_1-1756322192619.png

Simon Z
Level 1
Level 1

Hi @MHM Cisco World, right after client replied with Identity host/<FQDN>, The AP requests for EAP-TLS, the client then starts a TLSv1.2 handshake, and client and server start to identity each other with certificates.

SimonZ_0-1756323192382.png

 

On a failed connection, the AP simply says Failure.

I need to see how client reply for identity request 

I need to see how hostname and op in that packet 

MHM

Client replies with this format: host/<hostname.xxx.org.local>, where xxx.org.local is our AD domain name. We have a CA infrastructure in the domain to issue certs to ISE and all clients.

Screenshot 2025-08-27 154153.jpg

This success'

for failed wifi client 

Check how hostname is build 

Check ver of 802.1x  <<- this can also cause

Check LLC 

MHM

 

For the failed client, the Identity is constructed exactly the same way: host/hostname.xxx.org.local.

Layer2 security is at WPA+WPA2. 6 GHz is disabled.

Can you share screenshots of failed client <<- open packet to see what inside packet

MHM

The vlan for this ssid is 48?

MHM

No 48 is actually for WMI. The EAP packet is between 9800 and AP, but the 802.11 data inside shows communications between the client (Intel_xx:xx:xx) and BSSID MAC of the AP (Cisco_xx:xx:xx)

SimonZ_0-1756329898215.png

 

 

Both work and not work association with same AP?

If Yes why work client have tag 48 and non work dont have any tag??

MHM

Same 9800 and same (and only) AP. For the failed one there is actually another Identity Response packet has tag 48 in it:

SimonZ_0-1756332799362.png

 

Review Cisco Networking for a $25 gift card