cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
711
Views
0
Helpful
3
Replies

WLAN cannot be connected when deploying 9130AX with eWLC with IPv6

Lingfeng Xiong
Level 1
Level 1

We are deploying a few 9130AX with eWLC and we noticed an issue.

In a network with multiple 9130AX/eWLC, one AP would be elected as Primary WLC, another AP would be elected as Secondary WLC. What we noticed is that, if the CAPWAP is IPv6, the AP Primary WLC will behave strangely. It will broadcast WLANs as usual, however, only Open WLANs can be connected. Any other WLANs, regardless its Enterprise or Pre-shared Key, WPA2 or WPA3, would be unable to connect. Client would simply says connection failed. In Mac, it might prompt Password required, even the WLAN is WPA3 OWE.

If the Primary WLC AP power cycled, the Secondary WLC AP would become Primary, and the symptom moves with it. Thus, at any given moment, there is an AP would broadcast non-connectable WLANs and disrupting the operations.

During the investigation, we deployed one single 9130AX in an isolated IPv6-only network, the issue is 100% reproducible. We also find, if we plug the console cable to the AP and reload the eWLC in the console, once eWLC is off, the AP will run standalone and the WLAN are all working normally. However, once the eWLC back online and AP rejoins it, all encrypted WLANs are broken again.

This issue essentially renders IPv6-only deployment impossible. Are there any documents or workarounds?

Software: IOSXE 17.15.04

P.S., to make things a bit more annoying, even the eWLC is operated in dual-stack and CAPWAP is set to IPv4 preferred (since Central Authentication is mandatory in eWLC), it still blocks using IPv6 radius server. Once an IPv6 radius server is configured and used for 802.1X authentication, the client would fail to auth, and the eWLC console would have:

*Aug 24 20:53:31.642: %IOSXE_INFRA-4-BSO_MSG_RIB_WATCH_WARN: BSO message RIB watch start error
-Traceback= 1#51f831fc725b0a59ceabac5d8451fb7e :10000+3BB2E8 :10000+382C508 :10000+382AA58 bsock_ios:7D160000+CEA8 bsock_ios:7D160000+7A2A bsock_ios:7D160000+D21C :10000+382D7D0 :10000+D758DC :10000+18A546C

for each WLAN auth attempt

Regards, Lingfeng Xiong
3 Replies 3

@Lingfeng Xiong hi, appreciate sharing your all pre tests and troubleshooting steps which is helpful for everyone. in this level i propose to open TAC case and see how Cisco can do deep dive on this issue. additionally, you can verify and make sure all other internal connections between auth servers, any local connections are working as expected without an issue. 

 

Please rate this and mark as solution/answer, if this resolved your issue
Good luck
KB

Mark Elsen
Hall of Fame
Hall of Fame

 

  - @Lingfeng Xiong            FYI :   https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn29574

  M.



-- Let everything happen to you  
       Beauty and terror
      Just keep going    
       No feeling is final
Reiner Maria Rilke (1899)

@Mark Elsen  I'm not sure if the bug you linked is applicable here, but this does remind me one more caveat on configuring the radius authentication in EWC... in Server Group tab, it seems the IPv6 Source Interface must be selected. Otherwise it would never reach the radius server. The same behaviour applies to ping. Reaching IPv6 hosts on the EWC must have source interface specified, even a default IPv6 route is configured.

Regards, Lingfeng Xiong
Review Cisco Networking for a $25 gift card