10-31-2022 01:07 AM
Hi there!
Please, help.
I have cisco wlc 5520 + windows radius nps with dynamic vlans assigment and it works fine.
I bought cisco catalyst c9800-l and configure it by cisco guides with is using my working windows radius nps to got dynamic vlan assigment on my new wlc, however it is not work - each time my test user got random vlan number...
AAA override for wlan enabled. Also I tried 3 different firmware from 17.3.5b to 17.9.1...
Radius ip 10.10.6.2/23
wlc c9800 ip 10.10.4.2/23 (vlan 1114)
AP ip 10.10.4.28/23 (vlan 1114)
correct users vlan id 4
Here is dump from my radius server and debug from my new c9800-l at the same time:
only one access-accept in the dump - authentificator number c2 95 (string 5006)
2022/10/31 10:25:23.038501048 {wncd_x_R0-0}{1}: [aaa] [22860]: (debug): Valid server internal check: server MY_s02-dc03 with handle f5000005 : is valid
2022/10/31 10:25:23.038508777 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: authenticator 0b ec 51 6a 7e de 93 8c - ec 9d 5a e4 4c af c2 95
2022/10/31 10:25:23.038515475 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Framed-Protocol [7] 6 PPP [1]
2022/10/31 10:25:23.038520920 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Service-Type [6] 6 Framed [2]
2022/10/31 10:25:23.038524582 {wncd_x_R0-0}{1}: [radius] [22860]: (info): 00:
2022/10/31 10:25:23.038526930 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Tunnel-Medium-Type [65] 6 ALL_802 [6]
2022/10/31 10:25:23.038531828 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Tunnel-Private-Group-Id[81] 3 "4"
2022/10/31 10:25:23.038535653 {wncd_x_R0-0}{1}: [radius] [22860]: (info): 00:
2022/10/31 10:25:23.038537817 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Tunnel-Type [64] 6 VLAN [13]
2022/10/31 10:25:23.038541837 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: EAP-Message [79] 6 ...
2022/10/31 10:25:23.038548917 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: EAP-Message [79] 6
RADIUS: 03 0c 00 04
2022/10/31 10:25:23.038553292 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Class [25] 46 ...
2022/10/31 10:25:23.038599449 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: Class [25] 46
RADIUS: b3 72 0b 53 00 00 01 37 00 01 02 00 0a 0a 06 02 00 00 00 00 ed 55 e2 77 a0 79 bc d5 01 d8 8a f4 75 f1 28 d0 00 00 00 00 01 66 55 45 [ rS7Uwyu(fUE]
2022/10/31 10:25:23.038604141 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 12
2022/10/31 10:25:23.038608211 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-Link-Util-Thresh[14] 6 ...
2022/10/31 10:25:23.038623496 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: MS-Link-Util-Thresh[14] 6
RADIUS: 00 00 00 32 [ 2]
2022/10/31 10:25:23.038627657 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 12
2022/10/31 10:25:23.038631649 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-Link-Drop-Time-Limit[15] 6 ...
2022/10/31 10:25:23.038647034 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: MS-Link-Drop-Time-Limit[15] 6
RADIUS: 00 00 00 78 [ x]
2022/10/31 10:25:23.038661037 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 12
2022/10/31 10:25:23.038665273 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-MPPE-Enc-Policy [7] 6 ...
2022/10/31 10:25:23.038671870 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: MS-MPPE-Enc-Policy [7] 6
RADIUS: 00 00 00 02
2022/10/31 10:25:23.038675906 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 12
2022/10/31 10:25:23.038679872 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-MPPE-Enc-Type [8] 6 ...
2022/10/31 10:25:23.038686375 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: MS-MPPE-Enc-Type [8] 6
RADIUS: 00 00 00 0e
2022/10/31 10:25:23.038690433 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 14
2022/10/31 10:25:23.038695017 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-CHAP-DOMAIN [10] 8 "MY_DOMAINO"
2022/10/31 10:25:23.038699246 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 51
2022/10/31 10:25:23.038704020 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-CHAP-V2-Success [26] 45 "S=683ED09CD8CC52B4263F000E85E7373A477CF49C"
2022/10/31 10:25:23.038708164 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 58
2022/10/31 10:25:23.038712122 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-MPPE-Send-Key [16] 52 *
2022/10/31 10:25:23.038716351 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: MS-MPPE-Send-Key [16] 52 *
2022/10/31 10:25:23.038720323 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Vendor, Microsoft [26] 58
2022/10/31 10:25:23.038724191 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: MS-MPPE-Recv-Key [17] 52 *
2022/10/31 10:25:23.038728326 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: MS-MPPE-Recv-Key [17] 52 *
2022/10/31 10:25:23.038732576 {wncd_x_R0-0}{1}: [radius] [22860]: (info): RADIUS: Message-Authenticator[80] 18 ...
2022/10/31 10:25:23.038753971 {wncd_x_R0-0}{1}: [radius] [22860]: (debug): RADIUS: Message-Authenticator[80] 18
RADIUS: 6f 18 38 3a db 06 34 4e 31 3c a0 be 96 e4 14 d6 [ o8:4N1<]
debug logs, that I got during connecting my user to wlan:
authenticator id started from string 5006, and there is correct vlan (4) - Tunnel-Private-Group-Id[81] 3 "4", but in previous stings I saw strange symbols like qnJ'cC_N4bA<? (sting 4966) and incorrect vlan vlan-id=1360 in string 4979...
Full log in attach.
in radius-screen-log stange that account session identifier is - (empty). I compared this with worked wlc (5520) - there is some id...
I don't know what to try...
Solved! Go to Solution.
12-14-2022 04:07 AM
Hi again...
In general, there was needed authorization config
simple... but not obviously
10-31-2022 02:24 AM
- Below , you will find the output of your attached debug when processed with : https://cway.cisco.com/wireless-debug-analyzer/ , it would also be advisable to start with a checkup of the current c9800-l configuration with the CLI command : show tech wireless , have the output analyzed by https://cway.cisco.com/
Review this document too : https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/217043-configure-dynamic-vlan-assignment-with-c.html
--following debug analyzed with https://cway.cisco.com/wireless-debug-analyzer/ --- (seems rather normal at first glance)
TimeTaskTranslated
2022/10/31 10:25:22.945 | client-orch-sm | Client made a new Association to an AP/BSSID: BSSID 84f1.476f.49ad, WLAN MY_WLAN, Slot 1 AP 84f1.476f.49a0, APF01D.2DB7.6904 |
2022/10/31 10:25:22.946 | dot11 | Association success for client, assigned AID is: 1 |
2022/10/31 10:25:22.946 | client-orch-sm | Client started layer 2 authentication (either dot1X or PSK) |
2022/10/31 10:25:22.951 | client-auth | Entering 802.1X authentication process |
2022/10/31 10:25:22.951 | client-auth | Entering 802.1X authentication process |
2022/10/31 10:25:23.040 | client-auth | Starting EAPOL 4-Way Handshake |
2022/10/31 10:25:23.040 | client-keymgmt | Sent M1 for EAPOL 4-Way Handshake |
2022/10/31 10:25:23.042 | client-keymgmt | Received and validated M2 for EAPOL 4-Way Handshake |
2022/10/31 10:25:23.042 | client-keymgmt | Sent M3 for EAPOL 4-Way Handshake |
2022/10/31 10:25:23.044 | client-keymgmt | Received and validated M4 for EAPOL 4-Way Handshake |
2022/10/31 10:25:23.044 | client-keymgmt | Negotiated the following encryption mechanism: AKM:DOT1X Cipher:CCMP WPA Version: WPA2 |
2022/10/31 10:25:23.044 | client-orch-sm | Client passed layer 2 authentication |
2022/10/31 10:25:23.044 | client-orch-state | Starting Mobility Anchor discovery for client |
2022/10/31 10:25:23.046 | client-orch-state | Entering IP learn state |
2022/10/31 10:25:24.713 | client-iplearn | Client got IP: 10.10.4.25, discovered through: ARP |
2022/10/31 10:25:24.714 | client-orch-sm | IP Learn state completed, IP information discovered through: IPLEARN_METHOD_ARP |
2022/10/31 10:25:24.714 | client-orch-state | Client reached RUN state, connection completed. |
2022/10/31 10:25:27.002 | client-iplearn | Controller updated IP information. IP: 10.10.4.25, discovered through: DHCP |
10-31-2022 03:25 AM
Thank you for answer.
Yes, it seems like all right, but assigned vlan and ip that device got are not correct
10-31-2022 04:33 AM
- Have you already executed the procedure concerning WirelessAnalyzer ?
M.
11-01-2022 02:22 AM
wireless analyzer output:
11-01-2022 04:34 AM
- Note that all red-flagged items should be corrected,
M.
10-31-2022 10:14 AM
1. I recommend 17.6.4 as the best stable release at the moment.
2. If I understand correctly, you say your radius is sending the wrong VLAN id, but you think that is because it's not getting the correct session identifier from the WLC?
Check that you have all the correct settings enabled for radius. For example we use:
radius-server attribute wireless authentication callStationIdCase lower
radius-server attribute wireless authentication mac-delimiter hyphen
radius-server attribute wireless authentication call-station-id ap-name-ssid
radius-server attribute wireless 44 include-in-access-req
But your config will depend on what your radius server requires. Similarly for accounting we use:
radius-server attribute wireless accounting mac-delimiter hyphen
radius-server attribute wireless accounting username-delimiter hyphen
radius-server attribute wireless accounting username-case lower
radius-server attribute wireless accounting call-station-id ap-name-ssid
radius-server attribute wireless accounting callStationIdCase lower
11-01-2022 04:13 AM - edited 11-01-2022 04:28 AM
Hi, no, radius returns correct vlan - vlan 4, but controller see not only vlan 4, and vlan 1360.
Here is my config from controller:
WLC1#sho run | inc radius-server
radius-server attribute wireless accounting mac-delimiter none
radius-server attribute wireless accounting call-station-id ipaddress
radius-server attribute wireless authentication mac-delimiter none
radius-server attribute wireless authentication call-station-id ipaddress
I will try authentication callStationIdCase lower and authentication 44 include-in-access-req +accounting username-case lower and accounting callStationIdCase lower.
Unfortunately, it didn't help
11-01-2022 04:20 AM
Then I think you need to open a TAC case.
If there was a general bug I'm sure lots of other people would have seen this so I suspect something specific to your setup.
11-01-2022 05:08 AM
ehhh, obviously, but I can't
10-31-2022 11:30 AM
Is the APs are in Local mode or Flex mode?
Do you have any SVI's configured in your WLC? (interface Vlan with IP address apart from the WMI)
Are you using any VLAN Groups? If yes did the client get an IP from a vlan in the pool?
11-01-2022 04:28 AM
Hi, Arshad.
Local mode and yes, I configured SVI per vlan (vlan 4, vlan 2, vlan 1114) and made vlan group and mapped it to wlan interface.
Users get IP, but these IP not correct because they moved to incorrect vlans (I expected vlan 4 for users, but they put to vlan 1114 or vlan 1360 etc)
11-01-2022 05:21 AM
Hi Peter,
I would suggest you to read the best practices guide (link in my signature). Please start fixing the issues highlighted by the config analyzer first and then check how you can incorporate the best practices to your design.
For 9800s you don't need to configure any SVI's for any VLANs attached to WLANs unless you use mdns or dhcp bridging. So you can start removing them from the WLC if not needed. Also make sure that you don't use any Native VLAN's connecting to WLC uplinks from switch and WLC side both. For AP connecting switchports use the AP management VLAN as the native VLAN and also refer the below section form the best practices guide to understand why you need the policy profile configured correctly.
Also make sure that you allow only the required VLAN's on the trunk ports connecting to the WLC. I am pretty certain that this is a configuration issue in your WLC. I have almost 50 WLC's deployed for K12 currently working with NPS for dynamic VLAN assignment mostly on 17.3 codes and also 17.6 codes where we have all Catalyst APs.
11-02-2022 11:39 AM
Could you check that your WLC's configuration matches the configuration from this guide:
The guide uses Cisco ISE but if your NPS is already working with a 5520 then it should also work with the 9800
12-14-2022 04:07 AM
Hi again...
In general, there was needed authorization config
simple... but not obviously
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide