2 ssid with 802.1x NPS server

hi
i have a 1140 AP and i have an ssid on it authenticate users from NPS server.
but now i need to conifure on it 2 ssid  with different vlans each ssid authenticate from the same NPS server but with diferent groups.
how could i do this ?

Hello there..
Below link are config examples
http://www.cisco.com/en/US/tech/tk722/tk809/tech_configuration_examples_list.html
VLANS on a autonomous example
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080665ceb.shtml
802.1X example
http://www.cisco.com/en/US/products/hw/wireless/ps4570/products_configuration_example09186a00801bd035.shtml
NPS 802.1X config info
http://blogs.technet.com/b/nap/archive/2008/06/19/nap-802-1x-configuration-walkthrough.aspx
This should get you started ...

Similar Messages

  • NAP with DHCP with an external NPS server

    Hi ,
    I have setup NAP with DHCP setup in my lab setup  and it is working . On my setup both the DHCP server and NPS are running on the same Longhorn server .
    What  I would like to understand better is the communication between the DHCP server and the radius server ( i.e NPS ) .I would therefore  like to run these two components on two separate boxes and capture sniffer traces as the two are communicating.
    My question is what do I need to configure to have the DHCP server and  NPS to talk to each other since I will run them on two separate machines. Is there a write up that explains the interaction between the two .
    Thanks
     Mohammed Yassin

    I have configured NPS2 to proxy Machine Identity "Machine health check" to NPS1.  NPS2 is generating RADIUS Access-Requests when a client is attempting to obtain a DHCP address (as configured in the step by step doc) The RADIUS Access-Reject message is being returned, here is the output.  There is no user account in the originating request from NPS2, nor is the user account info present in the DHCP request by the NAP enabled client so I'm not sure how this should work.
    Log Name:      System
    Source:        IAS
    Date:          1/24/2007 9:25:47 AM
    Event ID:      2
    Task Category: None
    Level:         Warning
    Keywords:      Classic
    User:          N/A
    Computer:      NPS1
    Description:
    User <not present>  was denied access.
     Fully-Qualified-User-Name = <undetermined>
     Machine-Name = Infoblox-Vista1
     OS-Version = <not present>
     NAS-IP-Address = 192.168.0.3
     NAS-IPv6-Address = <not present>
     NAS-Identifier = NPS2
     Called-Station-Identifier = 192.168.0.0
     Calling-Station-Identifier = 001641E14B12
     Client-Friendly-Name = NPS2
     Client-IP-Address = 192.168.0.3
     Client-IPv6-Address = <not present>
     NAS-Port-Type = Ethernet
     NAS-Port = <not present>
     Proxy-Policy-Name = Use Windows authentication for all users
     Policy-Name = Connections to other access servers
     Authentication-Provider = Windows
     Authentication-Server = NPS1.idblox.com
     Authentication-Type = Unauthenticated
     EAP-Type = <undetermined>
     Account-Session-Identifier=349348166
     Reason-Code = 65
     Reason = The connection attempt failed because remote access permission for the user account was denied. To allow remote access, enable remote access permission for the user account, or, if the user account specifies that access is controlled through the matching remote access policy, enable remote access permission for that remote access policy.
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="IAS" />
        <EventID Qualifiers="32768">2</EventID>
        <Level>3</Level>
        <Task>0</Task>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2007-01-24T17:25:47.000Z" />
        <EventRecordID>38921</EventRecordID>
        <Channel>System</Channel>
        <Computer>NPS1</Computer>
        <Security />
      </System>
      <EventData>
        <Data>%%2147483686</Data>
        <Data>%%2147483685</Data>
        <Data>Infoblox-Vista1</Data>
        <Data>%%2147483686</Data>
        <Data>192.168.0.3</Data>
        <Data>%%2147483686</Data>
        <Data>NPS2</Data>
        <Data>192.168.0.0</Data>
        <Data>001641E14B12</Data>
        <Data>NPS2</Data>
        <Data>192.168.0.3</Data>
        <Data>%%2147483686</Data>
        <Data>Ethernet</Data>
        <Data>%%2147483686</Data>
        <Data>Use Windows authentication for all users</Data>
        <Data>Connections to other access servers</Data>
        <Data>%%2147483688</Data>
        <Data>NPS1.idblox.com</Data>
        <Data>Unauthenticated</Data>
        <Data>%%2147483685</Data>
        <Data>349348166</Data>
        <Data>65</Data>
        <Data>%%3221229633</Data>
        <Binary>00000000</Binary>
      </EventData>
    </Event>

  • Wireless Guest Access with 802.1X (PEAP/MSCHAPv2) and ISE?

    Hi,
    I have a setup based on WLC 5508, Catalyst 3750-X and AP3600i.
    The WLCs are running 7.3 and ISE is 1.1.1
    I'm trying to setup wireless guest access, where the guests connect to a SSID with 802.1X using PEAP/MSCHAPv2.
    They should receive their username/password either from a sponsor directly (corporate AD user which prints the credentials) or through a SMS.
    The credentials will be created by the sponsor, using the sponsor portal on the ISE.
    Now to the questions:
    Is it correct that the foreign WLC (i.e. the WLC within the internal corporate network), should be set to no L2 and L3 security on the guest WLAN, to avoid having the foreign WLC contact the ISE and all traffic be forwarded directly to the anchor WLC?
    Is it correct that the anchor WLC (i.e. the WLC in the DMZ), should be configured with 802.1X/WPA2 L2 security and the ISE servers as the RADIUS servers on the guest WLAN, to ensure that the client is correctly authenticated/authorized by the ISE?
    When a guest logs on, how can I ensure that only one device (MAC address) is allowed per user?
    As it is now, a guest is able to log on with (I assume) an unlimited number of devices, using the credentials they have received.
    Thankyou very much :-)
    Best Regards,
    Niels J. Larsen

    Hi,
    I have a setup based on WLC 5508, Catalyst 3750-X and AP3600i.
    The WLCs are running 7.3 and ISE is 1.1.1
    I'm trying to setup wireless guest access, where the guests connect to a SSID with 802.1X using PEAP/MSCHAPv2.
    They should receive their username/password either from a sponsor directly (corporate AD user which prints the credentials) or through a SMS.
    The credentials will be created by the sponsor, using the sponsor portal on the ISE.
    Now to the questions:
    Is it correct that the foreign WLC (i.e. the WLC within the internal corporate network), should be set to no L2 and L3 security on the guest WLAN, to avoid having the foreign WLC contact the ISE and all traffic be forwarded directly to the anchor WLC?
    Is it correct that the anchor WLC (i.e. the WLC in the DMZ), should be configured with 802.1X/WPA2 L2 security and the ISE servers as the RADIUS servers on the guest WLAN, to ensure that the client is correctly authenticated/authorized by the ISE?
    When a guest logs on, how can I ensure that only one device (MAC address) is allowed per user?
    As it is now, a guest is able to log on with (I assume) an unlimited number of devices, using the credentials they have received.
    Thankyou very much :-)
    Best Regards,
    Niels J. Larsen

  • RADIUS Authentication Problems with NPS Server Eventid 6274

    Hi,
    We have struggled for a while with RADIUS auth for some clients against an NPS Server when the user or computer tries to connect to the wireless network the following error can be seen on the NPS server:
    Network Policy Server discarded the request for a user
    Contact the Network Policy Server administrator for more information.
    User:
        Security ID:            NULL SID
        Account Name:            host/hostname.domainname.com
        Account Domain:            -
        Fully Qualified Account Name:    -
    Client Machine:
        Security ID:            NULL SID
        Account Name:            -
        Fully Qualified Account Name:    -
        OS-Version:            -
        Called Station Identifier:        40-20-B1-F4-BB-15:Wireless-SSID
        Calling Station Identifier:        C1-18-85-08-10-E1
    NAS:
        NAS IPv4 Address:        192.168.10.10
        NAS IPv6 Address:        -
        NAS Identifier:            AP name
        NAS Port-Type:            Wireless - IEEE 802.11
        NAS Port:            0
    RADIUS Client:
        Client Friendly Name:        name
        Client IP Address:            192.168.10.10
    Authentication Details:
        Connection Request Policy Name:    Secure Wireless Connections
        Network Policy Name:        -
        Authentication Provider:        Windows
        Authentication Server:        NPS servername
        Authentication Type:        -
        EAP Type:            -
        Account Session Identifier:        -
        Reason Code:            3
        Reason:                The RADIUS Request message that Network Policy Server received from the network access server was malformed.
    Network Policy Server discarded the request for a user.
    Contact the Network Policy Server administrator for more information.
    User:
        Security ID:            NULL SID
        Account Name:            domainname\username
        Account Domain:            -
        Fully Qualified Account Name:    -
    Client Machine:
        Security ID:            NULL SID
        Account Name:            -
        Fully Qualified Account Name:    -
        OS-Version:            -
        Called Station Identifier:        20-18-B1-F4-BB-15:Wireless-SSID
        Calling Station Identifier:        09-3E-8E-3E-5A-C9
    NAS:
        NAS IPv4 Address:        192.168.10.10
        NAS IPv6 Address:        -
        NAS Identifier:            AP name
        NAS Port-Type:            Wireless - IEEE 802.11
        NAS Port:            0
    RADIUS Client:
        Client Friendly Name:        name
        Client IP Address:            192.168.10.10
    Authentication Details:
        Connection Request Policy Name:    Secure Wireless Connections
        Network Policy Name:        -
        Authentication Provider:        Windows
        Authentication Server:        NPS server name
        Authentication Type:        -
        EAP Type:            -
        Account Session Identifier:        -
        Reason Code:            3
        Reason:                The RADIUS Request message that Network Policy Server received from the network access server was malformed.
    Message seen from the AP's logs:
    (317)IEEE802.1X auth is starting (at if=wifi0.2)
    (318)Send message to RADIUS Server(192.168.60.166): code=1 (Access-Request) identifier=157 length=162,  User-Name=domain\username NAS-IP-Address=192.168.10.10 Called-Station-Id=40-18-B1-F4-BB-15:Wireless-SSID Calling-Station-Id=C0-18-85-08-10-E1
    (319)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=157 length=90
     (320)Send message to RADIUS Server(192.168.60.166): code=1 (Access-Request) identifier=158 length=286,  User-Name=domain\username NAS-IP-Address=192.168.10.10 Called-Station-Id=40-18-B1-F4-BB-15:Wireless-SSID Calling-Station-Id=C0-18-85-08-10-E1
     (321)Send message to RADIUS Server(192.168.60.166): code=1 (Access-Request) identifier=161 length=162,  User-Name=domain\username NAS-IP-Address=192.168.10.10 Called-Station-Id=40-18-B1-F4-BB-15:Wireless-SSID Calling-Station-Id=C0-18-85-08-10-E1
     (322)Receive message from RADIUSServer: code=11 (Access-Challenge) identifier=161 length=90 BASIC  
    Output omitted
    (330)Sta(at if=wifi0.2) is de-authenticated because of notification of driver
    We have other NPS Servers with corresponding policy settings which are working so I am having trouble to understand why this errors occurs.
    Initally the problem seemed to be related to the Cert on the NPS server cause it used the cert generated from the Somputer template. Now it uses the template for Domain controller just as the other NPS servers so this should not be the issue(Not sure if
    this matters?)
    Please guide me on how to take this further
    Thank you :)
    //Cris

    Hi,
    NPS Event ID: 6274.
    This condition occurs when the NPS discards accounting requests because the structure of the accounting request message that was sent by a RADIUS client does not comply with the RADIUS protocol. You should reconfigure, upgrade, or replace the RADIUS client.
    Detailed information reference:
    Event ID 6274 — NPS Accounting Request Message Processing
    https://technet.microsoft.com/en-us/library/cc735339(v=WS.10).aspx
    Best Regards,
    Eve Wang
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Need for NPS server certificate with PEAP-MS-CHAPv2

    Hi,
    I have a question about a small setup I'm currently testing. In a Wireless access with 802.1X authentication based on PEAP/MS-CHAPv2, and a NPS server (MS server 2012R2), I've noted reading technet documentation that the NPS server or other RADIUS server
    do have a certificate (issued by a 3rd party CA or by an AD CS environment).
    However, it remains for me a point I would like to clarify (sorry I surely have a bad understanding of documentation). If my client is configured for not "validate server certificate", do I still need to have a certificate on the NPS server ?
    Well, I know it is not secured, but this will permit me to test without configuring an AD CS, and without buying a certificate.
    Many thanks in advance for your answer.
    Regards,
    Fabrice

    You also need a server certificate in this case as the protection in Protected EAP is due to the encryption of the TLS session.
    Not validating the server certificate just means that no additional check of the name is done, so the client would be able to connect to any RADIUS server - given that its certificate chain is valid. But the certificate chain as such is checked as in every
    SSL handshake.
    You don't need a certificate issued by a commercial CA though - you could use an inhouse PKI. For tests you could use a self-signed certificate as well.
    Edit: If you want to test self-signed certificates the easiest way is probably to install the web server role and use its built-in option to create a self-signed certificate.
    Elke

  • 802.1x trouble: Can't get Nortel IP Phone to authenticate to NPS server through HP ProCurve switch

    I've been working on getting 802.1x set up.  I've so far gotten WinXP clients to authenticate through our HP ProCurve switch to the NPS server using PEAP/EAP-MSCHAPv2, and to put different authorized users on different VLANs based on AD Groups, as well
    as unauthorized users onto a separate VLAN.  Also, the switch is using the NPS server for securing management logons.
    However, when I configure and plug in a Nortel phone, I can see the EAP packets going to the switch, which then send the Access-Request message to the NPS server.  On the NPS server, I can see that the NIC receives the Access-Request packet, but it
    never responds to it.  When I compare the packet to an Access-Request packet from a WinXP client, the only differences I can see are User-Name (1), Port (5), Port-ID (87), Calling-Station-ID (31) and the EAP-Message (79), which to me are the fields that
    *should* be different.  I can also see that the packet is coming in on the correct port (1812).  Nothing gets logged in Event Viewer, nor in the NPS log (c:\windows\system32\logfiles\inDDMMYY.log).
    It's my understanding that at least, I should be getting an IAS_NO_POLICY_MATCH in the log, as I haven't set up a policy for it yet.  Also, if I set up a dummy policy to accept all requests on all days and times, using any authentication method, I still
    get nothing.
    The phone is set to use PEAP, but if I understand correctly, even if that was set wrong, I should at least see an Access-Challenge response packet from the server; PEAP doesn't factor in quite that early.  Or do I misunderstand?
    Any help would be appreciated.

    Thanks for the reply.
    > At the command prompt, type the following command, and then press ENTER:
    > auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable
    I had read about that previously.  I had checked whether it was enabled or not, and it only had failure enabled.  So following the recomendation on that
    page, I disabled both, then enabled both.  So yes, it's currently enabled.  And after this, I tried both the PC and phone again, and while I saw the PC's authentication succeed in the Event Log, I still see nothing for the phone.
    > PEAP does not specify an authentication method, but provides additional security for other EAP authentication protocols, such as Extensible
    Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (EAP-MS-CHAP v2), that can operate through the TLS encrypted channel provided by PEAP.
    Yeah, but
    if I understand correctly (and I'm going to read your link right after I post this), after the switch sends the initial Access-Request message in the clear, the RADIUS server should then respond with an Access-Challenge to begin securing the connection beween
    itself and the phone, regardless of what the phone has set for it's security type.  If the phone can't talk in a way that the server is set to accept, then it won't respond to the Access-Challenge packet, but the server should be sending that Access-Challenge
    in the first place.  Or is there something I've missed in the Access-Request packet that specifies what security type(s) it can handle?  I thought that happened after the Access-Challenge?
    > Please also provide us the type of your Nortel IP Phone, because some types of Nortel IP Phone may only support EAP-MS-CHAP v1 which is not supported by Windows
    2008. We also suggest that you might post your issue on Nortel forums to ask for some more help.
    I'm
    using a Nortel 1120e phone for testing; we also have 1140e phones that will be used with this when it's working, but they should be the same as far as this setup is concerned.  I read somewhere that perhaps the Nortel phones only support PEAP-MD5, which
    doesn't seem to be an option in NPS without a reghack.  I'm also following up with our Nortel support locally, as the phone itself and the manual for the phone only says "PEAP" without specifying what it's using inside, but right now I'm trying to determine
    whether the problem lies with the phone or the server or both.  So I thought I'd ask the experts here.
    FWIW,
    I've been testing using a HP ProCurve 3400cl with the lastest firmware.  I've managed to get the same setup on a Cisco Catalyst 3550 switch, also on it's latest firmware, and I get the same results.  The PCs can authenticate, the phone can't; NPS
    still isn't responding.

  • Wireless with PEAP Authentication not working using new NPS server

    All,
    We are planning to migrate from our old IAS server to new NPS server. We are testing the new NPS server with our wireless infrastructure using WISM. We are using PEAP with server Cert for authentication. For testing purpose we are doing user authentication but our goal is to do machine authentication. On client side we are using Windows XP, Windows 7 & iPAD’s
    I believe I have configured the NPS & CA server as per the documents I found on Cisco support forum & Microsoft’s site.
    But it is not working for me. I am getting the following error message on the NPS server.
    Error # 1
    =======
    Cryptographic operation.
    Subject:
                Security ID:                 SYSTEM
                Account Name:                       MADXXX
                Account Domain:                    AD
                Logon ID:                    0x3e7
    Cryptographic Parameters:
                Provider Name:          Microsoft Software Key Storage Provider
                Algorithm Name:         RSA
                Key Name:      XXX-Wireless-NPS
                Key Type:       Machine key.
    Cryptographic Operation:
                Operation:       Decrypt.
                Return Code:  0x80090010
    Error # 2
    ======
    An error occurred during the Network Policy Server use of the Extensible Authentication Protocol (EAP). Check EAP log files for EAP errors.
    I was wondering if anyone has any insight on what is going on.
    Thanks, Ds

    Scott,
    I have disabled MS-CHAP v1 & only MS-CHAP v2 is enabled on Network Policies > Constraints.
    I  disabled validate Certificate on Windows 7 and tried to authenticate, it is still failing. Here is the output from the event viewer:
    Cryptographic operation.
    Subject:
    Security ID: SYSTEM
    Account Name: MADHFSVNPSPI01$
    Account Domain: AD
    Logon ID: 0x3e7
    Cryptographic Parameters:
    Provider Name: Microsoft Software Key Storage Provider
    Algorithm Name: RSA
    Key Name: DOT-Wireless-NPS
    Key Type: Machine key.
    Cryptographic Operation:
    Operation: Decrypt.
    Return Code: 0x80090010
    Network Policy Server denied access to a user.
    Contact the Network Policy Server administrator for more information.
    User:
    Security ID: AD\mscdzs
    Account Name: AD\mscdzs
    Account Domain: AD
    Fully Qualified Account Name: AD\mscdzs
    Client Machine:
    Security ID: NULL SID
    Account Name: -
    Fully Qualified Account Name: -
    OS-Version: -
    Called Station Identifier: 64-ae-0c-00-de-f0:DOT
    Calling Station Identifier: a0-88-b4-e2-79-cc
    NAS:
    NAS IPv4 Address: 130.47.128.7
    NAS IPv6 Address: -
    NAS Identifier: WISM2B
    NAS Port-Type: Wireless - IEEE 802.11
    NAS Port: 29
    RADIUS Client:
    Client Friendly Name: WISM2B
    Client IP Address: 130.47.128.7
    Authentication Details:
    Connection Request Policy Name: Secure Wireless Connections
    Network Policy Name: Secure Wireless Connections
    Authentication Provider: Windows
    Authentication Server: MADHFSVNPSPI01.AD.DOT.STATE.WI.US
    Authentication Type: PEAP
    EAP Type: -
    Account Session Identifier: -
    Logging Results: Accounting information was written to the local log file.
    Reason Code: 23
    Reason: An error occurred during the Network Policy Server use of the Extensible Authentication Protocol (EAP). Check EAP log files for EAP errors.
    Attached are EAP logs & debug logs from the controller.
    Thanks for all the help. I really appreciate.

  • Config RADIUS on WLC 5508 - Problems comunication with NPS Server

    Hi,
    I'm facing some problems when configuring RADIUS auth with a NPS Windows Server.
    My WLAN interface is in a different vlan than the management interface, is that a problem?
    I want this wlan to be on a different vlan from the management. When i use wlan interface in the same vlan the RADIUS works without problems. But in different vlans is not working.
    The NPS server as 2 NICs, 1 for the wireless vlan, and another for the management vlan.
    the logs from the WLC shows this, but i have difficulties interpreting all this data:
    *apfMsConnTask_0: Dec 29 12:49:14.636: Association request from the P2P Client Process P2P Ie and Upadte CB
    *apfMsConnTask_5: Dec 29 12:49:36.607: 3c:c2:43:94:3e:bc Adding mobile on LWAPP AP d4:d7:48:45:fb:20(0)
    *apfMsConnTask_5: Dec 29 12:49:36.607: 3c:c2:43:94:3e:bc Association received from mobile on AP d4:d7:48:45:fb:20
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1709)
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1876)
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Applying site-specific Local Bridging override for station 3c:c2:43:94:3e:bc - vapId 9, site 'XXX', interface 'wlan'
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Applying Local Bridging Interface Policy for station 3c:c2:43:94:3e:bc - vlan 900, interface id 16, interface 'wlan'
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Applying site-specific override for station 3c:c2:43:94:3e:bc - vapId 9, site 'XXX', interface 'wlan'
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1709)
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1876)
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc processSsidIE  statusCode is 0 and status is 0
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc processSsidIE  ssid_done_flag is 0 finish_flag is 0
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc STA - rates (8): 130 132 139 12 18 150 24 36 0 0 0 0 0 0 0 0
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc suppRates  statusCode is 0 and gotSuppRatesElement is 1
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc STA - rates (12): 130 132 139 12 18 150 24 36 48 72 96 108 0 0 0 0
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc extSuppRates  statusCode is 0 and gotExtSuppRatesElement is 1
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Processing RSN IE type 48, length 20 for mobile 3c:c2:43:94:3e:bc
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Received RSN IE with 0 PMKIDs from mobile 3c:c2:43:94:3e:bc
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Setting active key cache index 8 ---> 8
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc unsetting PmkIdValidatedByAp
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 START (0) Initializing policy
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state AUTHCHECK (2)
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state 8021X_REQD (3)
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) DHCP required on AP d4:d7:48:45:fb:20 vapId 9 apVapId 8for this client
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc Not Using WMM Compliance code qosCap 00
    *apfMsConnTask_5: Dec 29 12:49:36.608: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP d4:d7:48:45:fb:20 vapId 9 apVapId 8 flex-acl-name:
    *apfMsConnTask_5: Dec 29 12:49:36.609: 3c:c2:43:94:3e:bc apfMsAssoStateInc
    *apfMsConnTask_5: Dec 29 12:49:36.609: 3c:c2:43:94:3e:bc apfPemAddUser2 (apf_policy.c:270) Changing state for mobile 3c:c2:43:94:3e:bc on AP d4:d7:48:45:fb:20 from Idle to Associated
    *apfMsConnTask_5: Dec 29 12:49:36.609: 3c:c2:43:94:3e:bc Stopping deletion of Mobile Station: (callerId: 48)
    *apfMsConnTask_5: Dec 29 12:49:36.609: 3c:c2:43:94:3e:bc Sending Assoc Response to station on BSSID d4:d7:48:45:fb:20 (status 0) ApVapId 8 Slot 0
    *apfMsConnTask_5: Dec 29 12:49:36.609: 3c:c2:43:94:3e:bc apfProcessAssocReq (apf_80211.c:6309) Changing state for mobile 3c:c2:43:94:3e:bc on AP d4:d7:48:45:fb:20 from Associated to Associated
    *dot1xMsgTask: Dec 29 12:49:36.611: 3c:c2:43:94:3e:bc Station 3c:c2:43:94:3e:bc setting dot1x reauth timeout = 0
    *dot1xMsgTask: Dec 29 12:49:36.611: 3c:c2:43:94:3e:bc Stopping reauth timeout for 3c:c2:43:94:3e:bc
    *dot1xMsgTask: Dec 29 12:49:36.611: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Connecting state
    *dot1xMsgTask: Dec 29 12:49:36.611: 3c:c2:43:94:3e:bc Sending EAP-Request/Identity to mobile 3c:c2:43:94:3e:bc (EAP Id 1)
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.684: 3c:c2:43:94:3e:bc Received EAPOL START from mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.684: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Connecting state
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.684: 3c:c2:43:94:3e:bc Sending EAP-Request/Identity to mobile 3c:c2:43:94:3e:bc (EAP Id 2)
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.761: 3c:c2:43:94:3e:bc Received EAPOL EAPPKT from mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.761: 3c:c2:43:94:3e:bc Received Identity Response (count=2) from mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.761: 3c:c2:43:94:3e:bc EAP State update from Connecting to Authenticating for mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.761: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Authenticating state
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:36.761: 3c:c2:43:94:3e:bc Entering Backend Auth Response state for mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.794: 3c:c2:43:94:3e:bc Received EAPOL START from mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.794: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Aborting state
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Connecting state
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc Sending EAP-Request/Identity to mobile 3c:c2:43:94:3e:bc (EAP Id 4)
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc Reached Max EAP-Identity Request retries (3) for STA 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc Sent Deauthenticate to mobile on BSSID d4:d7:48:45:fb:20 slot 0(caller 1x_auth_pae.c:3165)
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc Scheduling deletion of Mobile Station:  (callerId: 6) in 10 seconds
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Disconnected state
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:54.795: 3c:c2:43:94:3e:bc Not sending EAP-Failure for STA 3c:c2:43:94:3e:bc
    *apfMsConnTask_5: Dec 29 12:49:55.518: 3c:c2:43:94:3e:bc Association received from mobile on AP d4:d7:48:45:fb:20
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1709)
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1876)
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Applying site-specific Local Bridging override for station 3c:c2:43:94:3e:bc - vapId 9, site 'XXX', interface 'wlan'
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Applying Local Bridging Interface Policy for station 3c:c2:43:94:3e:bc - vlan 900, interface id 16, interface 'wlan'
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Applying site-specific override for station 3c:c2:43:94:3e:bc - vapId 9, site 'XXX', interface 'wlan'
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1709)
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1876)
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc processSsidIE  statusCode is 0 and status is 0
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc processSsidIE  ssid_done_flag is 0 finish_flag is 0
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc STA - rates (8): 130 132 139 12 18 150 24 36 48 72 96 108 0 0 0 0
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc suppRates  statusCode is 0 and gotSuppRatesElement is 1
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc STA - rates (12): 130 132 139 12 18 150 24 36 48 72 96 108 0 0 0 0
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc extSuppRates  statusCode is 0 and gotExtSuppRatesElement is 1
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Processing RSN IE type 48, length 20 for mobile 3c:c2:43:94:3e:bc
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Received RSN IE with 0 PMKIDs from mobile 3c:c2:43:94:3e:bc
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Setting active key cache index 8 ---> 8
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc unsetting PmkIdValidatedByAp
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Initializing policy
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3)
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state 8021X_REQD (3)
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) DHCP required on AP d4:d7:48:45:fb:20 vapId 9 apVapId 8for this client
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc Not Using WMM Compliance code qosCap 00
    *apfMsConnTask_5: Dec 29 12:49:55.519: 3c:c2:43:94:3e:bc 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP d4:d7:48:45:fb:20 vapId 9 apVapId 8 flex-acl-name:
    *apfMsConnTask_5: Dec 29 12:49:55.520: 3c:c2:43:94:3e:bc apfPemAddUser2 (apf_policy.c:270) Changing state for mobile 3c:c2:43:94:3e:bc on AP d4:d7:48:45:fb:20 from Associated to Associated
    *apfMsConnTask_5: Dec 29 12:49:55.520: 3c:c2:43:94:3e:bc Stopping deletion of Mobile Station: (callerId: 48)
    *apfMsConnTask_5: Dec 29 12:49:55.520: 3c:c2:43:94:3e:bc Sending Assoc Response to station on BSSID d4:d7:48:45:fb:20 (status 0) ApVapId 8 Slot 0
    *apfMsConnTask_5: Dec 29 12:49:55.520: 3c:c2:43:94:3e:bc apfProcessAssocReq (apf_80211.c:6309) Changing state for mobile 3c:c2:43:94:3e:bc on AP d4:d7:48:45:fb:20 from Associated to Associated
    *dot1xMsgTask: Dec 29 12:49:55.521: 3c:c2:43:94:3e:bc Station 3c:c2:43:94:3e:bc setting dot1x reauth timeout = 0
    *dot1xMsgTask: Dec 29 12:49:55.521: 3c:c2:43:94:3e:bc Stopping reauth timeout for 3c:c2:43:94:3e:bc
    *dot1xMsgTask: Dec 29 12:49:55.521: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Connecting state
    *dot1xMsgTask: Dec 29 12:49:55.521: 3c:c2:43:94:3e:bc Sending EAP-Request/Identity to mobile 3c:c2:43:94:3e:bc (EAP Id 1)
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:55.592: 3c:c2:43:94:3e:bc Received EAPOL START from mobile 3c:c2:43:94:3e:bc
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:55.592: 3c:c2:43:94:3e:bc dot1x - moving mobile 3c:c2:43:94:3e:bc into Connecting state
    *Dot1x_NW_MsgTask_4: Dec 29 12:49:55.592: 3c:c2:43:94:3e:bc Sending EAP-Request/Identity to mobile 3c:c2:43:94:3e:bc (EAP Id 2)

    yes, I thought of that. But if i use a simple password authentication on the wireless, i can reach the server with the same subnet interface. But i don't want to allow this subnet to acess the management subnet of the wireless controller.
    One question i have is: The WLC uses whitch subnet on radius? Uses the subnet of the wireless interface or uses always the management interface?
    Could you help me understand how the radius auth works with this wireless controller? Did you see anything strange in the logs that I posted above? It seems to run ok until:
    dot1x - moving mobile 3c:c2:43:94:3e:bc into Authenticating state
    Entering Backend Auth Response state for mobile 3c:c2:43:94:3e:bc
    Received EAPOL START from mobile 3c:c2:43:94:3e:bc
    dot1x - moving mobile 3c:c2:43:94:3e:bc into Aborting state
    I also note this: "Applying Local Bridging Interface Policy for station "
    What does this means?

  • VWLC 802.1x NPS authentication Fails

    Hi Guys,
    Hopefully someone can help me with the following problem i'm facing...
    I've a vWLC running 7.3 deployed in our HQ site.
    At the HQ we have a W2k8 R2 NPS deployed at works fine for VPN, Router and Switch Authentication
    In a few remote branch offices which are connected to the HQ over DMVPN we have a couple of 3500's running in flexconnect mode with local switching.
    These AP's register just fine through the VPN link back to the vWLC.
    We deployed a few SSID's that are bound to AP groups.
    All SSID's that use WPA2 with PSK work fine
    All SSID's that use WPA2 with 802.1x Fail
    The Security Settings for the failing SSID's are:
    WPA2 Policy
    WPA2 Encryption AES
    Key Man 802.1x
    AAA Server is pointing to the right NPS for Auth and Accounting
    Radius overwrite IF is disabled
    The settings of the NPS are:
    Conditions:
    Win Group: DOMAIN\Groupxx
    NAS Port Type: Wireless - IEEE 802.11
    Settings:
    EAP Conf: Configured
    Access Perm: Granted
    EAP Method: MS PEAP
    Auth Method: EAP
    NAP Enforcement: Allow full access
    Update non complient: True
    Service Type: Login
    When a laptop (Mac os 10.8) tries to connect to a 802.1x SSID It Prompts for a username and passwd.
    Using DOMAIN\user + passwd the client tries to authenticate for a couple of times and fails
    On the vWLC i can see trap:
    AAA Authentication Failure for UserName:user  User Type: WLAN USER
    At the NPS i can see:
    Network Policy Server denied access to a user.
    Contact the Network Policy Server administrator for more information.
    User:
    Security ID:                              DOMAIN\user
    Account Name:                              user
    Account Domain:                              DOMAIN
    Fully Qualified Account Name:          dom.com/OU/OU/OU/USER full name
    Client Machine:
    Security ID:                              NULL SID
    Account Name:                              -
    Fully Qualified Account Name:          -
    OS-Version:                              -
    Called Station Identifier:                    34-a8-4e-70-0b-90:test.sec
    Calling Station Identifier:                    10-40-f3-8f-ac-62
    NAS:
    NAS IPv4 Address:                    IP vWLC
    NAS IPv6 Address:                    -
    NAS Identifier: VWLC001
    NAS Port-Type:                              Wireless - IEEE 802.11
    NAS Port:                              1
    RADIUS Client:
    Client Friendly Name: vWLC001
    Client IP Address:                              IP vWLC
    Authentication Details:
    Connection Request Policy Name:          Use Windows authentication for all users
    Network Policy Name:                    Cisco WiFi
    Authentication Provider:                    Windows
    Authentication Server:                    FQDN NPS server
    Authentication Type:                    PEAP
    EAP Type:                              -
    Account Session Identifier:                    -
    Logging Results:                              Accounting information was written to the local log file.
    Reason Code:                              23
    Reason:                                        An error occurred during the Network Policy Server use of the Extensible Authentication Protocol (EAP). Check EAP log files for EAP errors.
    Hopefully someone can point me in the right direction.
    Cheers,
    JP

    Find below the output of the debug:
    (Cisco Controller) >
    (Cisco Controller) >*Dot1x_NW_MsgTask_4: May 27 10:08:51.567: 00:21:6a:72:3c:ec apfMsRunStateInc
    *apfMsConnTask_1: May 27 10:09:41.389: 10:40:f3:8f:ac:62 Processing RSN IE type 48, length 20 for mobile 10:40:f3:8f:ac:62
    *apfMsConnTask_1: May 27 10:09:41.389: 10:40:f3:8f:ac:62 Received RSN IE with 0 PMKIDs from mobile 10:40:f3:8f:ac:62
    *apfMsConnTask_1: May 27 10:09:41.389: 10:40:f3:8f:ac:62 Setting active key cache index 8 ---> 8
    *apfMsConnTask_1: May 27 10:09:41.389: 10:40:f3:8f:ac:62 unsetting PmkIdValidatedByAp
    *apfMsConnTask_1: May 27 10:09:41.389: 10:40:f3:8f:ac:62 apfMsAssoStateInc
    *dot1xMsgTask: May 27 10:09:41.428: 10:40:f3:8f:ac:62 Station 10:40:f3:8f:ac:62 setting dot1x reauth timeout = 1800
    *dot1xMsgTask: May 27 10:09:41.428: 10:40:f3:8f:ac:62 Sending EAP-Request/Identity to mobile 10:40:f3:8f:ac:62 (EAP Id 1)
    *dot1xMsgTask: May 27 10:09:41.428: 10:40:f3:8f:ac:62 Sending 802.11 EAPOL message to mobile 10:40:f3:8f:ac:62 WLAN 5, AP WLAN 3
    *dot1xMsgTask: May 27 10:09:41.429: 00000000: 02 00 00 32 01 01 00 32 01 00 6e 65 74 77 6f 72 ...2...2..networ
    *dot1xMsgTask: May 27 10:09:41.429: 00000010: 6b 69 64 3d 73 65 63 75 72 65 2c 6e 61 73 69 64 kid=secure,nasid
    *dot1xMsgTask: May 27 10:09:41.429: 00000020: 3d 45 49 4e 44 2d 56 57 4c 43 30 30 31 2c 70 6f =EIND-VWLC001,po
    *dot1xMsgTask: May 27 10:09:41.429: 00000030: 72 74 69 64 3d 31 rtid=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 18) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 00000000: 01 00 00 0e 02 01 00 0e 01 6a 65 61 6e 70 61 75 .........jeanpau
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 00000010: 6c 73 ls
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Received EAPOL EAPPKT from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Received Identity Response (count=1) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Adding AAA_ATT_USER_NAME(1) index=0
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLING_STATION_ID(31) index=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLED_STATION_ID(30) index=2
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.471: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT(5) index=3
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_INT_CISCO_AUDIT_SESSION_ID(7) index=4
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IP_ADDRESS(4) index=5
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IDENTIFIER(32) index=6
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_VAP_ID(1) index=7
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_SERVICE_TYPE(6) index=8
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_FRAMED_MTU(12) index=9
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT_TYPE(61) index=10
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_EAP_MESSAGE(79) index=11
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Adding AAA_ATT_MESS_AUTH(80) index=12
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 AAA EAP Packet created request = 0x13a375e4.. !!!!
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 Sending EAP Attribute (code=2, length=14, id=1) for mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 00000000: 02 01 00 0e 01 6a 65 61 6e 70 61 75 6c 73 .....jeanpauls
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *Dot1x_NW_MsgTask_2: May 27 10:09:41.472: 10:40:f3:8f:ac:62 [BE-req] Sending auth request to 'RADIUS' (proto 0x140001)
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.473: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 4) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.473: 00000000: 01 01 00 00 ....
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.473: 10:40:f3:8f:ac:62 Received EAPOL START from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.474: 10:40:f3:8f:ac:62 Sending EAP-Request/Identity to mobile 10:40:f3:8f:ac:62 (EAP Id 3)
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.474: 10:40:f3:8f:ac:62 Sending 802.11 EAPOL message to mobile 10:40:f3:8f:ac:62 WLAN 5, AP WLAN 3
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.474: 00000000: 02 00 00 32 01 03 00 32 01 00 6e 65 74 77 6f 72 ...2...2..networ
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.474: 00000010: 6b 69 64 3d 73 65 63 75 72 65 2c 6e 61 73 69 64 kid=secure,nasid
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.474: 00000020: 3d 45 49 4e 44 2d 56 57 4c 43 30 30 31 2c 70 6f =EIND-VWLC001,po
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.474: 00000030: 72 74 69 64 3d 31 rtid=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 18) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 00000000: 01 00 00 0e 02 03 00 0e 01 6a 65 61 6e 70 61 75 .........jeanpau
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 00000010: 6c 73 ls
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Received EAPOL EAPPKT from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Received Identity Response (count=2) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_USER_NAME(1) index=0
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLING_STATION_ID(31) index=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLED_STATION_ID(30) index=2
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT(5) index=3
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_INT_CISCO_AUDIT_SESSION_ID(7) index=4
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IP_ADDRESS(4) index=5
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.526: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IDENTIFIER(32) index=6
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Adding AAA_ATT_VAP_ID(1) index=7
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Adding AAA_ATT_SERVICE_TYPE(6) index=8
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Adding AAA_ATT_FRAMED_MTU(12) index=9
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT_TYPE(61) index=10
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Adding AAA_ATT_EAP_MESSAGE(79) index=11
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Adding AAA_ATT_MESS_AUTH(80) index=12
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 AAA EAP Packet created request = 0x13a375e4.. !!!!
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Sending EAP Attribute (code=2, length=14, id=3) for mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 00000000: 02 03 00 0e 01 6a 65 61 6e 70 61 75 6c 73 .....jeanpauls
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 [BE-req] Local EAP not enabled on WLAN 5. No fallback attempted
    *Dot1x_NW_MsgTask_2: May 27 10:09:46.527: 10:40:f3:8f:ac:62 Unable to send AAA message for mobile 10:40:F3:8F:AC:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 4) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 00000000: 01 01 00 00 ....
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 10:40:f3:8f:ac:62 Received EAPOL START from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 10:40:f3:8f:ac:62 Sending EAP-Request/Identity to mobile 10:40:f3:8f:ac:62 (EAP Id 5)
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 10:40:f3:8f:ac:62 Sending 802.11 EAPOL message to mobile 10:40:f3:8f:ac:62 WLAN 5, AP WLAN 3
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 00000000: 02 00 00 32 01 05 00 32 01 00 6e 65 74 77 6f 72 ...2...2..networ
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 00000010: 6b 69 64 3d 73 65 63 75 72 65 2c 6e 61 73 69 64 kid=secure,nasid
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 00000020: 3d 45 49 4e 44 2d 56 57 4c 43 30 30 31 2c 70 6f =EIND-VWLC001,po
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 00000030: 72 74 69 64 3d 31 rtid=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 10:40:f3:8f:ac:62 Reached Max EAP-Identity Request retries (3) for STA 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.528: 10:40:f3:8f:ac:62 Not sending EAP-Failure for STA 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.686: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 18) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.686: 10:40:f3:8f:ac:62 Station 10:40:f3:8f:ac:62 setting dot1x reauth timeout = 1800
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.686: 00000000: 01 00 00 0e 02 05 00 0e 01 6a 65 61 6e 70 61 75 .........jeanpau
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.686: 00000010: 6c 73 ls
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.686: 10:40:f3:8f:ac:62 Received EAPOL EAPPKT from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:51.686: 10:40:f3:8f:ac:62 Received EAP Response packet with mismatching id (currentid=0, eapid=5) from mobile 10:40:f3:8f:ac:62
    *apfMsConnTask_1: May 27 10:09:54.637: 10:40:f3:8f:ac:62 Processing RSN IE type 48, length 20 for mobile 10:40:f3:8f:ac:62
    *apfMsConnTask_1: May 27 10:09:54.637: 10:40:f3:8f:ac:62 Received RSN IE with 0 PMKIDs from mobile 10:40:f3:8f:ac:62
    *apfMsConnTask_1: May 27 10:09:54.637: 10:40:f3:8f:ac:62 Setting active key cache index 8 ---> 8
    *apfMsConnTask_1: May 27 10:09:54.637: 10:40:f3:8f:ac:62 unsetting PmkIdValidatedByAp
    *dot1xMsgTask: May 27 10:09:54.676: 10:40:f3:8f:ac:62 Sending EAP-Request/Identity to mobile 10:40:f3:8f:ac:62 (EAP Id 1)
    *dot1xMsgTask: May 27 10:09:54.676: 10:40:f3:8f:ac:62 Sending 802.11 EAPOL message to mobile 10:40:f3:8f:ac:62 WLAN 5, AP WLAN 3
    *dot1xMsgTask: May 27 10:09:54.676: 00000000: 02 00 00 32 01 01 00 32 01 00 6e 65 74 77 6f 72 ...2...2..networ
    *dot1xMsgTask: May 27 10:09:54.676: 00000010: 6b 69 64 3d 73 65 63 75 72 65 2c 6e 61 73 69 64 kid=secure,nasid
    *dot1xMsgTask: May 27 10:09:54.676: 00000020: 3d 45 49 4e 44 2d 56 57 4c 43 30 30 31 2c 70 6f =EIND-VWLC001,po
    *dot1xMsgTask: May 27 10:09:54.676: 00000030: 72 74 69 64 3d 31 rtid=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 18) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 00000000: 01 00 00 0e 02 01 00 0e 01 6a 65 61 6e 70 61 75 .........jeanpau
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 00000010: 6c 73 ls
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Received EAPOL EAPPKT from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Received Identity Response (count=1) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_USER_NAME(1) index=0
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLING_STATION_ID(31) index=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLED_STATION_ID(30) index=2
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT(5) index=3
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_INT_CISCO_AUDIT_SESSION_ID(7) index=4
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IP_ADDRESS(4) index=5
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IDENTIFIER(32) index=6
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_VAP_ID(1) index=7
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_SERVICE_TYPE(6) index=8
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_FRAMED_MTU(12) index=9
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT_TYPE(61) index=10
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_EAP_MESSAGE(79) index=11
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Adding AAA_ATT_MESS_AUTH(80) index=12
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 AAA EAP Packet created request = 0x13a375e4.. !!!!
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 Sending EAP Attribute (code=2, length=14, id=1) for mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 00000000: 02 01 00 0e 01 6a 65 61 6e 70 61 75 6c 73 .....jeanpauls
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *Dot1x_NW_MsgTask_2: May 27 10:09:54.717: 10:40:f3:8f:ac:62 [BE-req] Sending auth request to 'RADIUS' (proto 0x140001)
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 4) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 00000000: 01 01 00 00 ....
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 10:40:f3:8f:ac:62 Received EAPOL START from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 10:40:f3:8f:ac:62 Sending EAP-Request/Identity to mobile 10:40:f3:8f:ac:62 (EAP Id 3)
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 10:40:f3:8f:ac:62 Sending 802.11 EAPOL message to mobile 10:40:f3:8f:ac:62 WLAN 5, AP WLAN 3
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 00000000: 02 00 00 32 01 03 00 32 01 00 6e 65 74 77 6f 72 ...2...2..networ
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 00000010: 6b 69 64 3d 73 65 63 75 72 65 2c 6e 61 73 69 64 kid=secure,nasid
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 00000020: 3d 45 49 4e 44 2d 56 57 4c 43 30 30 31 2c 70 6f =EIND-VWLC001,po
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.717: 00000030: 72 74 69 64 3d 31 rtid=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Received 802.11 EAPOL message (len 18) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 00000000: 01 00 00 0e 02 03 00 0e 01 6a 65 61 6e 70 61 75 .........jeanpau
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 00000010: 6c 73 ls
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Received EAPOL EAPPKT from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Received Identity Response (count=2) from mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_USER_NAME(1) index=0
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLING_STATION_ID(31) index=1
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_CALLED_STATION_ID(30) index=2
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT(5) index=3
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_INT_CISCO_AUDIT_SESSION_ID(7) index=4
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IP_ADDRESS(4) index=5
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_IDENTIFIER(32) index=6
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_VAP_ID(1) index=7
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_SERVICE_TYPE(6) index=8
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_FRAMED_MTU(12) index=9
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_NAS_PORT_TYPE(61) index=10
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_EAP_MESSAGE(79) index=11
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Adding AAA_ATT_MESS_AUTH(80) index=12
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 AAA EAP Packet created request = 0x13a375e4.. !!!!
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Sending EAP Attribute (code=2, length=14, id=3) for mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 00000000: 02 03 00 0e 01 6a 65 61 6e 70 61 75 6c 73 .....jeanpauls
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 [BE-req] Local EAP not enabled on WLAN 5. No fallback attempted
    *Dot1x_NW_MsgTask_2: May 27 10:09:59.756: 10:40:f3:8f:ac:62 Unable to send AAA message for mobile 10:40:F3:8F:AC:62
    *radiusTransportThread: May 27 10:10:11.489: 10:40:f3:8f:ac:62 [BE-resp] AAA response 'Timeout'
    *radiusTransportThread: May 27 10:10:11.489: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *radiusTransportThread: May 27 10:10:11.489: 10:40:f3:8f:ac:62 [BE-req] Sending auth request to 'RADIUS' (proto 0x140001)
    *radiusTransportThread: May 27 10:10:11.489: 10:40:f3:8f:ac:62 [BE-resp] AAA request requeued OK
    *radiusTransportThread: May 27 10:10:24.729: 10:40:f3:8f:ac:62 [BE-resp] AAA response 'Timeout'
    *radiusTransportThread: May 27 10:10:24.729: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *radiusTransportThread: May 27 10:10:24.729: 10:40:f3:8f:ac:62 [BE-req] Local EAP not enabled on WLAN 5. No fallback attempted
    *radiusTransportThread: May 27 10:10:24.729: 10:40:f3:8f:ac:62 [BE-resp] Requeue failed. Returning AAA response
    *radiusTransportThread: May 27 10:10:24.729: 10:40:f3:8f:ac:62 AAA Message 'Timeout' received for mobile 10:40:f3:8f:ac:62
    *radiusTransportThread: May 27 10:10:24.729: 10:40:f3:8f:ac:62 Filtering AAA Response with invalid Session ID - proxy state 10:40:f3:8f:ac:62-02:00
    *radiusTransportThread: May 27 10:10:41.513: 10:40:f3:8f:ac:62 [BE-resp] AAA response 'Timeout'
    *radiusTransportThread: May 27 10:10:41.513: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *radiusTransportThread: May 27 10:10:41.513: 10:40:f3:8f:ac:62 [BE-req] Sending auth request to 'RADIUS' (proto 0x140001)
    *radiusTransportThread: May 27 10:10:41.513: 10:40:f3:8f:ac:62 [BE-resp] AAA request requeued OK
    *radiusTransportThread: May 27 10:11:11.529: 10:40:f3:8f:ac:62 [BE-resp] AAA response 'Timeout'
    *radiusTransportThread: May 27 10:11:11.529: 10:40:f3:8f:ac:62 [BE-req] Radius EAP/Local WLAN 5.
    *radiusTransportThread: May 27 10:11:11.529: 10:40:f3:8f:ac:62 [BE-req] Local EAP not enabled on WLAN 5. No fallback attempted
    *radiusTransportThread: May 27 10:11:11.529: 10:40:f3:8f:ac:62 [BE-resp] Requeue failed. Returning AAA response
    *radiusTransportThread: May 27 10:11:11.529: 10:40:f3:8f:ac:62 AAA Message 'Timeout' received for mobile 10:40:f3:8f:ac:62
    *Dot1x_NW_MsgTask_2: May 27 10:11:11.529: 10:40:f3:8f:ac:62 Processing AAA Error 'Timeout' (-5) for mobile 10:40:f3:8f:ac:62

  • I have a Problem with Romming Between SSIDs withing the same WLC but with deferent VLAN .

    HI All,
    I have a Problem with Romming Between SSIDs withing the same WLC but with deferent VLAN . the WLC are providing the HQ and one of the Branches the Wireless services .
    Am using all the available 9 SSIDs at the HQ , and am using only 4 of it at the Brnche.
    The problem that i have are happening only at the Branch office as i cant room between the SSIDs within Diferent VLANs but i can do it with the one that pointing to the same VLAN. Once the client ( Laptop/Phone ) connected to one of the SSIDs. it imposiible to have him connected to the other ones with Different VLAN. meanwhile, It says its connected to the other SSID but its not getting IP from that pool.
    here is the Show Run-Config from my WLC .. and the Problem happening between the SSID AMOBILE and ASTAFF. i have the Debug while am switching between the SSIDs if needed .
    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.11.04 10:20:47 =~=~=~=~=~=~=~=~=~=~=~=
    show run-config
    Press Enter to continue...
    System Inventory
    NAME: "Chassis"   , DESCR: "Cisco 5500 Series Wireless LAN Controller"
    PID: AIR-CT5508-K9, VID: V01, SN: FCW1535L01G
    Burned-in MAC Address............................ 30:E4:DB:1B:99:80
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 12
    Press Enter to continue or <ctrl-z> to abort
    System Information
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.0.235.0
    Bootloader Version............................... 1.0.1
    Field Recovery Image Version..................... 6.0.182.0
    Firmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27
    Build Type....................................... DATA + WPS
    System Name...................................... WLAN Controller 5508
    System Location..................................
    System Contact...................................
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    IP Address....................................... 10.125.18.15
    Last Reset....................................... Software reset
    System Up Time................................... 41 days 5 hrs 14 mins 42 secs
    System Timezone Location......................... (GMT -5:00) Eastern Time (US and Canada)
    Current Boot License Level....................... base
    Current Boot License Type........................ Permanent
    Next Boot License Level.......................... base
    Next Boot License Type........................... Permanent
    Configured Country............................... US - United States
    --More or (q)uit current module or <ctrl-z> to abort
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    Internal Temperature............................. +36 C
    External Temperature............................. +20 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 10
    Number of Active Clients......................... 61
    Burned-in MAC Address............................ 30:E4:DB:1B:99:80
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 12
    Press Enter to continue or <ctrl-z> to abort
    AP Bundle Information
    Primary AP Image  Size
    ap3g1             5804
    ap801             5192
    ap802             5232
    c1100             3096
    c1130             4972
    c1140             4992
    c1200             3364
    c1240             4812
    c1250             5512
    c1310             3136
    c1520             6412
    c3201             4324
    c602i             3716
    Secondary AP Image      Size
    ap801             4964
    c1100             3036
    --More or (q)uit current module or <ctrl-z> to abort
    c1130             4884
    c1140             4492
    c1200             3316
    c1240             4712
    c1250             5064
    c1310             3084
    c1520             5244
    c3201             4264
    Press Enter to continue or <ctrl-z> to abort
    Switch Configuration
    802.3x Flow Control Mode......................... Disable
    FIPS prerequisite features....................... Disabled
    secret obfuscation............................... Enabled
    Strong Password Check Features:
           case-check ...........Enabled
           consecutive-check ....Enabled
           default-check .......Enabled
           username-check ......Enabled
    Press Enter to continue or <ctrl-z> to abort
    Network Information
    RF-Network Name............................. OGR
    Web Mode.................................... Disable
    Secure Web Mode............................. Enable
    Secure Web Mode Cipher-Option High.......... Disable
    Secure Web Mode Cipher-Option SSLv2......... Enable
    OCSP........................................ Disabled
    OCSP responder URL..........................
    Secure Shell (ssh).......................... Enable
    Telnet...................................... Disable
    Ethernet Multicast Forwarding............... Disable
    Ethernet Broadcast Forwarding............... Disable
    AP Multicast/Broadcast Mode................. Unicast
    IGMP snooping............................... Disabled
    IGMP timeout................................ 60 seconds
    IGMP Query Interval......................... 20 seconds
    User Idle Timeout........................... 300 seconds
    ARP Idle Timeout............................ 300 seconds
    Cisco AP Default Master..................... Enabled
    AP Join Priority............................ Disable
    Mgmt Via Wireless Interface................. Disable
    Mgmt Via Dynamic Interface.................. Disable
    --More or (q)uit current module or <ctrl-z> to abort
    Bridge MAC filter Config.................... Enable
    Bridge Security Mode........................ EAP
    Mesh Full Sector DFS........................ Enable
    AP Fallback ................................ Enable
    Web Auth Redirect Ports .................... 80
    Web Auth Proxy Redirect ................... Disable
    Fast SSID Change ........................... Enabled
    AP Discovery - NAT IP Only ................. Enabled
    IP/MAC Addr Binding Check .................. Enabled
    Press Enter to continue or <ctrl-z> to abort
    Port Summary
               STP   Admin   Physical   Physical   Link   Link
    Pr Type   Stat   Mode     Mode     Status   Status Trap    POE   SFPType  
    1 Normal Forw Enable Auto       1000 Full Up     Enable N/A     1000BaseTX
    2 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    3 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    4 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    5 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    6 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    7 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    8 Normal Disa Enable Auto       Auto       Down   Enable N/A     Not Present
    Press Enter to continue or <ctrl-z> to abort
    AP Summary
    Number of APs.................................... 8
    Global AP User Name.............................. Not Configured
    Global AP Dot1x User Name........................ Not Configured
    AP Name             Slots AP Model             Ethernet MAC       Location         Port Country Priority
    KNOWLOGY_DC01       2     AIR-LAP1131AG-A-K9   00:1d:45:86:ed:4e KNOWLOGY_DC_Serv 1       US       1
    KNOWLOGY_DC02       2     AIR-LAP1131AG-A-K9   00:21:d8:36:c5:c4 KNOWLOGY_DC_Serv 1       US       1
    KN1252_AP01         2     AIR-LAP1252AG-A-K9   00:21:d8:ef:06:50 Knowlogy Confere 1       US       1
    KN1252_AP02         2     AIR-LAP1252AG-A-K9   00:22:55:8e:2e:d4 Server Room Side 1       US       1
    Anham_AP03           2     AIR-LAP1142N-A-K9     70:81:05:88:15:b5 default location 1       US       1
    ANHAM_AP01          2     AIR-LAP1142N-A-K9     70:81:05:b0:e4:62 Small Conference 1       US       1
    ANHAM_AP04           2     AIR-LAP1131AG-A-K9   00:1d:45:86:e1:b8   Conference room 1       US       1
    ANHAM_AP02           2     AIR-LAP1142N-A-K9     70:81:05:96:7a:49         Copy Room 1       US       1
    AP Tcp-Mss-Adjust Info
    AP Name             TCP State MSS Size
    KNOWLOGY_DC01       disabled   -
    KNOWLOGY_DC02       disabled   -
    --More or (q)uit current module or <ctrl-z> to abort
    KN1252_AP01         disabled   -
    KN1252_AP02         disabled   -
    Anham_AP03           disabled   -
    ANHAM_AP01           disabled   -
    ANHAM_AP04           disabled   -
    ANHAM_AP02           disabled   -
    Press Enter to continue or <ctrl-z> to abort
    AP Location
    Total Number of AP Groups........................ 3  
    Site Name........................................ ANHAM8075
    Site Description................................. ANHAM 8075 Location
    WLAN ID         Interface         Network Admission Control         Radio Policy
    1               knowlogy_ogr         Disabled                         None
    6               knowlogy_ogr         Disabled                         None
    9               knowlogy_ogr         Disabled                         None
    7               knowlogy_ogr         Disabled                         None
    AP Name             Slots AP Model             Ethernet MAC       Location         Port Country Priority
    Anham_AP03           2     AIR-LAP1142N-A-K9   70:81:05:88:15:b5 default location 1     US       1
    ANHAM_AP01           2     AIR-LAP1142N-A-K9   70:81:05:b0:e4:62 Small Conference 1     US       1
    ANHAM_AP04           2     AIR-LAP1131AG-A-K9   00:1d:45:86:e1:b8   Conference room 1     US       1
    ANHAM_AP02           2     AIR-LAP1142N-A-K9   70:81:05:96:7a:49         Copy Room 1     US       1
    Site Name........................................ Knowlogy_DC
    --More or (q)uit current module or <ctrl-z> to abort
    Site Description................................. DC Center Access points
    WLAN ID         Interface         Network Admission Control         Radio Policy
    2               knowlogy_ogr         Disabled                         None
    4               knowlogy_ogr         Disabled                         None
    3               knowlogy_ogr         Disabled                         None
    AP Name             Slots AP Model             Ethernet MAC       Location         Port Country Priority
    KNOWLOGY_DC01       2     AIR-LAP1131AG-A-K9   00:1d:45:86:ed:4e KNOWLOGY_DC_Serv 1     US       1
    KNOWLOGY_DC02       2     AIR-LAP1131AG-A-K9   00:21:d8:36:c5:c4 KNOWLOGY_DC_Serv 1     US       1
    Site Name........................................ OGR
    Site Description................................. 1934 OGR Office
    WLAN ID         Interface         Network Admission Control         Radio Policy
    1               knowlogy_ogr         Disabled                         None
    2               knowlogy_ogr         Disabled                        None
    4               knowlogy_ogr         Disabled                         None
    6               knowlogy_ogr         Disabled                         None
    --More or (q)uit current module or <ctrl-z> to abort
    7               knowlogy_ogr        Disabled                         None
    9               knowlogy_ogr         Disabled                         None
    8               knowlogy_ogr         Disabled                         None
    AP Name             Slots AP Model             Ethernet MAC       Location         Port Country Priority
    KN1252_AP01         2     AIR-LAP1252AG-A-K9   00:21:d8:ef:06:50 Knowlogy Confere 1    US       1
    KN1252_AP02         2     AIR-LAP1252AG-A-K9   00:22:55:8e:2e:d4 Server Room Side 1     US       1
    Site Name........................................ default-group
    Site Description................................. <none>
    WLAN ID        Interface         Network Admission Control         Radio Policy
    1               knowlogy_ogr         Disabled                         None
    2               knowlogy_ogr         Disabled                         None
    3               knowlogy_ogr         Disabled                         None
    4               knowlogy_ogr         Disabled                         None
    5               knowlogy_ogr         Disabled                         None
    6               knowlogy_ogr         Disabled                         None
    7               knowlogy_ogr         Disabled                         None
    8               knowlogy_ogr         Disabled                          None
    --More or (q)uit current module or <ctrl-z> to abort
    9               knowlogy_ogr         Disabled                         None
    10             management           Disabled                         None
    AP Name             Slots AP Model             Ethernet MAC       Location         Port Country Priority
    Press Enter to continue or <ctrl-z> to abort
    AP Config
    Cisco AP Identifier.............................. 6
    Cisco AP Name.................................... KNOWLOGY_DC01
    Country code..................................... US - United States
    Regulatory Domain allowed by Country............. 802.11bg:-A     802.11a:-A
    AP Country code.................................. US - United States
    AP Regulatory Domain............................. -A
    Switch Port Number .............................. 1
    MAC Address...................................... 00:1d:45:86:ed:4e
    IP Address Configuration......................... DHCP
    IP Address....................................... 10.22.1.100
    Gateway IP Addr.................................. 10.22.1.1
    NAT External IP Address.......................... None
    CAPWAP Path MTU.................................. 1485
    Telnet State..................................... Disabled
    Ssh State........................................ Disabled
    Cisco AP Location................................ KNOWLOGY_DC_ServerRoom
    Cisco AP Group Name.............................. Knowlogy_DC
    Primary Cisco Switch Name........................ wireless.knowlogy.com
    Primary Cisco Switch IP Address.................. 10.125.18.15
    Secondary Cisco Switch Name......................
    Secondary Cisco Switch IP Address................ Not Configured
    --More or (q)uit current module or <ctrl-z> to abortIP Address.................. 10.125.18.15
    Tertiary Cisco Switch Name.......................
    Tertiary Cisco Switch IP Address................. Not Configured
    Administrative State ............................ ADMIN_ENABLED
    Operation State ................................. REGISTERED
    Mirroring Mode .................................. Disabled
    AP Mode ......................................... H-Reap
    Public Safety ................................... Disabled
    AP SubMode ...................................... Not Configured
    Remote AP Debug ................................. Disabled
    Logging trap severity level ..................... informational
    Logging syslog facility ......................... kern
    S/W Version .................................... 7.0.235.0
    Boot Version ................................... 12.3.8.0
    Mini IOS Version ................................ 3.0.51.0
    Stats Reporting Period .......................... 180
    LED State........................................ Enabled
    PoE Pre-Standard Switch.......................... Disabled
    PoE Power Injector MAC Addr...................... Disabled
    Power Type/Mode.................................. Power injector / Normal mode
    Number Of Slots.................................. 2
    AP Model......................................... AIR-LAP1131AG-A-K9
    AP Image......................................... C1130-K9W8-M
    IOS Version...................................... 12.4(23c)JA5
    --More or (q)uit current module or <ctrl-z> to abort
    Reset Button..................................... Enabled
    AP Serial Number................................. FTX1134T0QG
    AP Certificate Type.............................. Manufacture Installed
    H-REAP Vlan mode :............................... Enabled
          Native ID :..................................... 22
          WLAN 2 :........................................ 21
          WLAN 4 :........................................ 25
          WLAN 3 :........................................ 25
    H-REAP Backup Auth Radius Servers :
    Static Primary Radius Server.................... Disabled
    Static Secondary Radius Server.................. Disabled
    Group Primary Radius Server..................... Disabled
    Group Secondary Radius Server................... Disabled
    AP User Mode..................................... AUTOMATIC
    AP User Name..................................... Not Configured
    AP Dot1x User Mode............................... Not Configured
    AP Dot1x User Name............................... Not Configured
    Cisco AP system logging host..................... 255.255.255.255
    AP Up Time....................................... 48 days, 20 h 19 m 18 s
    AP LWAPP Up Time................................. 40 days, 13 h 58 m 18 s
    Join Date and Time............................... Tue Sep 24 21:24:33 2013
    Join Taken Time.................................. 0 days, 00 h 10 m 47 s
    --More or (q)uit current module or <ctrl-z> to abort
    Attributes for Slot 0
        Radio Type................................... RADIO_TYPE_80211b
       Administrative State ........................ ADMIN_ENABLED
       Operation State ............................. UP
       Radio Role .................................. ACCESS
       CellId ...................................... 0
       Station Configuration
         Configuration ............................. AUTOMATIC
         Number Of WLANs ........................... 3
         Medium Occupancy Limit .................... 100
         CFP Period ................................ 4
         CFP MaxDuration ........................... 60
         BSSID ..................................... 00:1d:71:09:8f:90
         Operation Rate Set
           1000 Kilo Bits........................... MANDATORY
           2000 Kilo Bits........................... MANDATORY
           5500 Kilo Bits........................... MANDATORY
           11000 Kilo Bits.......................... MANDATORY
         Beacon Period ............................. 100
         Fragmentation Threshold ................... 2346
         Multi Domain Capability Implemented ....... TRUE
    --More or (q)uit current module or <ctrl-z> to abort
         Multi Domain Capability Enabled ........... TRUE
         Country String ............................ US
        Multi Domain Capability
         Configuration ............................. AUTOMATIC
         First Chan Num ............................ 1
         Number Of Channels ........................ 11
       MAC Operation Parameters
         Configuration ............................. AUTOMATIC
         Fragmentation Threshold ................... 2346
         Packet Retry Limit ........................ 64
       Tx Power
         Num Of Supported Power Levels ............. 8
         Tx Power Level 1 .......................... 20 dBm
         Tx Power Level 2 .......................... 17 dBm
         Tx Power Level 3 .......................... 14 dBm
         Tx Power Level 4 .......................... 11 dBm
         Tx Power Level 5 .......................... 8 dBm
         Tx Power Level 6 .......................... 5 dBm
         Tx Power Level 7 .......................... 2 dBm
         Tx Power Level 8 .......................... -1 dBm
    --More or (q)uit current module or <ctrl-z> to abort
         Tx Power Configuration .................... AUTOMATIC
         Current Tx Power Level .................... 1
       Phy DSSS parameters
         Configuration ............................. AUTOMATIC
         Current Channel ........................... 11
         Extension Channel ......................... NONE
         Channel Width.............................. 20 Mhz
         Allowed Channel List....................... 1,2,3,4,5,6,7,8,9,10,11
         Current CCA Mode .......................... 0
         ED Threshold .............................. -50
         Antenna Type............................... INTERNAL_ANTENNA
         Internal Antenna Gain (in .5 dBi units).... 8
         Diversity.................................. DIVERSITY_ENABLED
       Performance Profile Parameters
         Configuration ............................. AUTOMATIC
         Interference threshold..................... 10 %
         Noise threshold............................ -70 dBm
         RF utilization threshold................... 80 %
         Data-rate threshold........................ 1000000 bps
         Client threshold........................... 12 clients
         Coverage SNR threshold..................... 12 dB
    --More or (q)uit current module or <ctrl-z> to abort
         Coverage exception level................... 25 %
         Client minimum exception level............. 3 clients
       Rogue Containment Information
       Containment Count............................ 0
       CleanAir Management Information
           CleanAir Capable......................... No
    Cisco AP Identifier.............................. 6
    Cisco AP Name.................................... KNOWLOGY_DC01
    Country code..................................... US - United States
    Regulatory Domain allowed by Country............. 802.11bg:-A     802.11a:-A
    AP Country code.................................. US - United States
    AP Regulatory Domain............................. -A
    Switch Port Number .............................. 1
    MAC Address...................................... 00:1d:45:86:ed:4e
    IP Address Configuration......................... DHCP
    IP Address....................................... 10.22.1.100
    Gateway IP Addr.................................. 10.22.1.1
    NAT External IP Address.......................... None
    CAPWAP Path MTU.................................. 1485
    Telnet State..................................... Disabled
    Ssh State........................................ Disabled
    --More or (q)uit current module or <ctrl-z> to abort
    Cisco AP Location................................ KNOWLOGY_DC_ServerRoom
    Cisco AP Group Name.............................. Knowlogy_DC
    Primary Cisco Switch Name........................ wireless.knowlogy.com
    Primary Cisco Switch Secondary Cisco Switch Name......................
    Secondary Cisco Switch IP Address................ Not Configured
    Tertiary Cisco Switch Name.......................
    Tertiary Cisco Switch IP Address................. Not Configured
    Administrative State ............................ ADMIN_ENABLED
    Operation State ................................. REGISTERED
    Mirroring Mode .................................. Disabled
    AP Mode ......................................... H-Reap
    Public Safety ................................... Disabled
    AP SubMode ...................................... Not Configured
    Remote AP Debug ................................. Disabled
    Logging trap severity level ..................... informational
    Logging syslog facility ......................... kern
    S/W Version .................................... 7.0.235.0
    Boot Version ................................... 12.3.8.0
    Mini IOS Version ................................ 3.0.51.0
    Stats Reporting Period .......................... 180
    LED State........................................ Enabled
    PoE Pre-Standard Switch.......................... Disabled
    PoE Power Injector MAC Addr...................... Disabled
    --More or (q)uit current module or <ctrl-z> to abort
    Power Type/Mode.................................. Power injector / Normal mode
    Number Of Slots.................................. 2
    AP Model......................................... AIR-LAP1131AG-A-K9
    AP Image......................................... C1130-K9W8-M
    IOS Version...................................... 12.4(23c)JA5
    Reset Button..................................... Enabled
    AP Serial Number................................. FTX1134T0QG
    AP Certificate Type.............................. Manufacture Installed
    H-REAP Vlan mode :............................... Enabled
          Native ID :..................................... 22
          WLAN 2 :........................................ 21
          WLAN 4 :........................................ 25
          WLAN 3 :........................................ 25
    H-REAP Backup Auth Radius Servers :
    Static Primary Radius Server.................... Disabled
    Static Secondary Radius Server.................. Disabled
    Group Primary Radius Server..................... Disabled
    Group Secondary Radius Server................... Disabled
    AP User Mode..................................... AUTOMATIC
    AP User Name..................................... Not Configured
    AP Dot1x User Mode............................... Not Configured
    AP Dot1x User Name............................... Not Configured
    Cisco AP system logging host..................... 255.255.255.255
    --More or (q)uit current module or <ctrl-z> to abort
    AP Up Time....................................... 48 days, 20 h 19 m 18 s
    AP LWAPP Up Time................................. 40 days, 13 h 58 m 18 s
    Join Date and Time............................... Tue Sep 24 21:24:33 2013
    Join Taken Time.................................. 0 days, 00 h 10 m 47 s
    Attributes for Slot 1
       Radio Type................................... RADIO_TYPE_80211a
       Radio Subband................................ RADIO_SUBBAND_ALL
       Administrative State ........................ ADMIN_ENABLED
       Operation State ............................. UP
       Radio Role .................................. ACCESS
       CellId ...................................... 0
       Station Configuration
         Configuration ............................. AUTOMATIC
         Number Of WLANs ........................... 3
         Medium Occupancy Limit .................... 100
         CFP Period ................................ 4
          CFP MaxDuration ........................... 60
         BSSID ..................................... 00:1d:71:09:8f:90
         Operation Rate Set
           6000 Kilo Bits........................... MANDATORY
    --More or (q)uit current module or <ctrl-z> to abort
           9000 Kilo Bits........................... SUPPORTED
           12000 Kilo Bits.......................... MANDATORY
           18000 Kilo Bits.......................... SUPPORTED
           24000 Kilo Bits.......................... MANDATORY
          36000 Kilo Bits.......................... SUPPORTED
           48000 Kilo Bits.......................... SUPPORTED
           54000 Kilo Bits.......................... SUPPORTED
         Beacon Period ............................. 100
         Fragmentation Threshold ................... 2346
         Multi Domain Capability Implemented ....... TRUE
         Multi Domain Capability Enabled ........... TRUE
         Country String ............................ US
       Multi Domain Capability
         Configuration ............................. AUTOMATIC
         First Chan Num ............................ 36
         Number Of Channels ........................ 20
       MAC Operation Parameters
         Configuration ............................. AUTOMATIC
         Fragmentation Threshold ................... 2346
         Packet Retry Limit ........................ 64
    --More or (q)uit current module or <ctrl-z> to abort
       Tx Power
         Num Of Supported Power Levels ............. 7
         Tx Power Level 1 .......................... 15 dBm
         Tx Power Level 2 .......................... 14 dBm
         Tx Power Level 3 .......................... 11 dBm
         Tx Power Level 4 .......................... 8 dBm
         Tx Power Level 5 .......................... 5 dBm
         Tx Power Level 6 .......................... 2 dBm
         Tx Power Level 7 .......................... -1 dBm
         Tx Power Configuration .................... AUTOMATIC
         Current Tx Power Level .................... 1
       Phy OFDM parameters
         Configuration ............................. AUTOMATIC
         Current Channel ........................... 44
         Extension Channel ......................... NONE
         Channel Width.............................. 20 Mhz
         Allowed Channel List....................... 36,40,44,48,52,56,60,64,100,
           ......................................... 104,108,112,116,132,136,140,
           ......................................... 149,153,157,161
         TI Threshold .............................. -50
         Antenna Type............................... INTERNAL_ANTENNA
         Internal Antenna Gain (in .5 dBi units).... 8
    --More or (q)uit current module or <ctrl-z> to abort
         Diversity.................................. DIVERSITY_ENABLED
       Performance Profile Parameters
         Configuration ............................. AUTOMATIC
         Interference threshold..................... 10 %
         Noise threshold............................ -70 dBm
         RF utilization threshold................... 80 %
          Data-rate threshold........................ 1000000 bps
         Client threshold........................... 12 clients
         Coverage SNR threshold..................... 16 dB
         Coverage exception level................... 25 %
         Client minimum exception level............. 3 clients
       Rogue Containment Information
       Containment Count............................ 0
       CleanAir Management Information
           CleanAir Capable......................... No
    Press Enter to continue or <ctrl-z> to abort
    Cisco AP Identifier.............................. 3
    Cisco AP Name.................................... KNOWLOGY_DC02
    Country code..................................... US - United States
    Regulatory Domain allowed by Country............. 802.11bg:-A     802.11a:-A
    AP Country code.................................. US - United States
    AP Regulatory Domain............................. -A
    Switch Port Number .............................. 1
    MAC Address...................................... 00:21:d8:36:c5:c4
    IP Address Configuration......................... DHCP
    IP Address....................................... 10.22.1.101
    Gateway IP Addr.................................. 10.22.1.1
    NAT External IP Address.......................... None
    CAPWAP Path MTU.................................. 1485
    Telnet State..................................... Disabled
    Ssh State........................................ Disabled
    Cisco AP Location................................ KNOWLOGY_DC_ServerRoom
    Cisco AP Group Name.............................. Knowlogy_DC
    Primary Cisco Switch Name........................
    Primary Cisco Switch IP Address.................. Not Configured
    Secondary Cisco Switch Name......................
    Secondary Cisco Switch IP Address................ Not Configured
    Tertiary Cisco Switch Name.......................
    --More or (q)uit current module or <ctrl-z> to abort
    Tertiary Cisco Switch IP Address................. Not Configured
    Administrative State ............................ ADMIN_ENABLED
    Operation State ................................. REGISTERED
    Mirroring Mode .................................. Disabled
    AP Mode ......................................... H-Reap
    Public Safety ................................... Disabled
    AP SubMode ...................................... Not Configured
    Remote AP Debug ................................. Disabled
    Logging trap severity level ..................... informational
    Logging syslog facility ......................... kern
    S/W  Version .................................... 7.0.235.0
    Boot Version ................................... 12.3.8.0
    Mini IOS Version ................................ 3.0.51.0
    Stats Reporting Period .......................... 180
    LED State........................................ Enabled
    PoE Pre-Standard Switch.......................... Enabled
    PoE Power Injector MAC Addr...................... Disabled
    Power Type/Mode.................................. Power injector / Normal mode
    Number Of Slots.................................. 2
    AP Model......................................... AIR-LAP1131AG-A-K9
    AP Image......................................... C1130-K9W8-M
    IOS Version...................................... 12.4(23c)JA5
    Reset Button..................................... Enabled
    --More or (q)uit current module or <ctrl-z> to abort
    AP Serial Number................................. FTX1230T24F
    AP Certificate Type.............................. Manufacture Installed
    H-REAP Vlan mode :............................... Enabled
          Native ID :..................................... 22
          WLAN 2 :........................................ 21
          WLAN 4 :........................................ 25
          WLAN 3 :........................................ 25
    H-REAP Backup Auth Radius Servers :
    Static Primary Radius Server.................... Disabled
    Static Secondary Radius Server.................. Disabled
    Group Primary Radius Server..................... Disabled
    Group Secondary Radius Server................... Disabled
    AP User Mode..................................... AUTOMATIC
    AP User Name..................................... Not Configured
    AP Dot1x User Mode............................... Not Configured
    AP Dot1x User Name............................... Not Configured
    Cisco AP system logging host..................... 255.255.255.255
    AP Up Time....................................... 48 days, 20 h 24 m 41 s
    AP LWAPP Up Time................................. 40 days, 13 h 58 m 18 s
    Join Date and Time............................... Tue Sep 24 21:24:35 2013
    Join Taken Time.................................. 0 days, 00 h 10 m 48 s
    --More or (q)uit current module or <ctrl-z> to abort
    Attributes for Slot 0
       Radio Type................................... RADIO_TYPE_80211b
       Administrative State ........................ ADMIN_ENABLED
       Operation State ............................. UP
       Radio Role .................................. ACCESS
       CellId ...................................... 0
        Station Configuration
         Configuration ............................. AUTOMATIC
         Number Of WLANs ........................... 3
         Medium Occupancy Limit .................... 100
         CFP Period ................................ 4
         CFP MaxDuration ........................... 60
         BSSID ..................................... 00:22:55:a5:0c:30
         Operation Rate Set
           1000 Kilo Bits........................... MANDATORY
           2000 Kilo Bits........................... MANDATORY
           5500 Kilo Bits........................... MANDATORY
           11000 Kilo Bits.......................... MANDATORY
         Beacon Period ............................. 100
         Fragmentation Threshold ................... 2346
         Multi Domain Capability Implemented ....... TRUE
         Multi Domain Capability Enabled ........... TRUE
    --More or (q)uit current module or <ctrl-z> to abort
         Country String ............................ US
       Multi Domain Capability
         Configuration ............................. AUTOMATIC
         First Chan Num ............................ 1
         Number Of Channels ........................ 11
       MAC Operation Parameters
         Configuration ............................. AUTOMATIC
         Fragmentation Threshold ................... 2346
         Packet Retry Limit ........................ 64
       Tx Power
         Num Of Supported Power Levels ............. 8
         Tx Power Level 1 .......................... 20 dBm
         Tx Power Level 2 .......................... 17 dBm
         Tx Power Level 3 .......................... 14 dBm
         Tx Power Level 4 .......................... 11 dBm
         Tx Power Level 5 .......................... 8 dBm
         Tx Power Level 6 .......................... 5 dBm
         Tx Power Level 7 .......................... 2 dBm
         Tx Power Level 8 .......................... -1 dBm
         Tx Power Configuration .................... AUTOMATIC
    --More or (q)uit current module or <ctrl-z> to abort
         Current Tx Power Level .................... 1
       Phy DSSS parameters
         Configuration ............................. AUTOMATIC
         Current Channel ........................... 1
         Extension Channel ......................... NONE
         Channel Width.............................. 20 Mhz
         Allowed Channel List....................... 1,2,3,4,5,6,7,8,9,10,11
         Current CCA Mode .......................... 0
         ED Threshold .............................. -50
         Antenna Type............................... INTERNAL_ANTENNA
         Internal Antenna Gain (in .5 dBi units).... 8
         Diversity.................................. DIVERSITY_ENABLED
       Performance Profile Parameters
         Configuration ............................. AUTOMATIC
         Interference threshold..................... 10 %
         Noise threshold............................ -70 dBm
         RF utilization threshold................... 80 %
         Data-rate threshold........................ 1000000 bps
         Client threshold........................... 12 clients
         Coverage SNR threshold..................... 12 dB
         Coverage exception level................... 25 %
    --More or (q)uit current module or <ctrl-z> to abort
         Client minimum exception level............. 3 clients
       Rogue Containment Information
       Containment Count............................ 0
       CleanAir Management Information
           CleanAir Capable......................... No
    Cisco AP Identifier.............................. 3
    Cisco AP Name.................................... KNOWLOGY_DC02
    Country code..................................... US - United States
    Regulatory Domain allowed by Country............. 802.11bg:-A     802.11a:-A
    AP Country code.................................. US - United States
    AP Regulatory Domain............................. -A
    Switch Port Number .............................. 1
    MAC Address...................................... 00:21:d8:36:c5:c4
    IP Address Configuration......................... DHCP
    IP Address....................................... 10.22.1.101
    Gateway IP Addr.................................. 10.22.1.1
    NAT External IP Address.......................... None
    CAPWAP Path MTU.................................. 1485
    Telnet State..................................... Disabled
    Ssh State........................................ Disabled
    Cisco AP Location................................ KNOWLOGY_DC_ServerRoom
    --More or (q)uit current module or <ctrl-z> to abort
    Cisco AP Group Name.............................. Knowlogy_DC
    Primary Cisco Switch Name........................
    Primary Cisco Switch IP Address.................. Not Configured
    Secondary Cisco Switch Name......................
    Secondary Cisco Switch IP Address................ Not Configured
    Tertiary Cisco Switch Name.......................
    Tertiary Cisco Switch IP Address................. Not Configured
    Administrative State ............................ ADMIN_ENABLED
    Operation State ................................. REGISTERED
    Mirroring Mode .................................. Disabled
    AP Mode ......................................... H-Reap
    Public Safety ................................... Disabled
    AP SubMode ...................................... Not Configured
    Remote AP Debug ................................. Disabled
    Logging trap severity level ..................... informational
    Logging syslog facility ......................... kern
    S/W Version .................................... 7.0.235.0
    Boot Version ................................... 12.3.8.0
    Mini IOS Version ................................ 3.0.51.0
    Stats Reporting Period .......................... 180
    LED State........................................ Enabled
    PoE Pre-Standard Switch.......................... Enabled
    PoE Power Injector MAC Addr...................... Disabled
    --More or (q)uit current module or <ctrl-z> to abort
    Power Type/Mode.................................. Power injector / Normal mode
    Number Of Slots.................................. 2
    AP Model......................................... AIR-LAP1131AG-A-K9
    AP Image......................................... C1130-K9W8-M
    IOS Version...................................... 12.4(23c)JA5
    Reset Button..................................... Enabled
    AP Serial Number................................. FTX1230T24F
    AP Certificate Type.............................. Manufacture Installed
    H-REAP Vlan mode :............................... Enabled
          Native ID :..................................... 22
          WLAN 2 :........................................ 21
          WLAN 4 :........................................ 25
          WLAN 3 :........................................ 25
    H-REAP Backup Auth Radius Servers :
    Static Primary Radius Server.................... Disabled
    Static Secondary Radius Server.................. Disabled
    Group Primary Radius Server..................... Disabled
    Group Secondary Radius Server................... Disabled
    AP User Mode..................................... AUTOMATIC
    AP User Name..................................... Not Configured
    AP Dot1x User Mode............................... Not Configured
    AP Dot1x User Name............................... Not Configured
    Cisco AP system logging host..................... 255.255.255.255
    --More or (q)uit current module or <ctrl-z> to abort
    AP Up Time....................................... 48 days, 20 h 24 m 41 s
    AP LWAPP Up Time................................. 40 days, 13 h 58 m 18 s
    Join Date and Time............................... Tue Sep 24 21:24:35 2013
    Join Taken Time.................................. 0 days, 00 h 10 m 48 s
    Attributes for Slot 1
       Radio Type................................... RADIO_TYPE_80211a
       Radio Subband................................ RADIO_SUBBAND_ALL
       Administrative State ........................ ADMIN_ENABLED
       Operation State ............................. UP
       Radio Role .................................. ACCESS
       CellId ...................................... 0
       Station Configuration
         Configuration ............................. AUTOMATIC
         Number Of WLANs ........................... 3
         Medium Occupancy Limit .................... 100
         CFP Period ................................ 4
         CFP MaxDuration ........................... 60
         BSSID ..................................... 00:22:55:a5:0c:30
         Operation Rate Set
           6000 Kilo Bits........................... MANDATORY
    --More or (q)uit current module or <ctrl-z> to abort
           9000 Kilo Bits........................... SUPPORTED
           12000 Kilo Bits.......................... MANDATORY
           18000 Kilo Bits.......................... SUPPORTED
           24000 Kilo Bits.......................... MANDATORY
           36000 Kilo Bits.......................... SUPPORTED
           48000 Kilo Bits.......................... SUPPORTED
           54000 Kilo Bits.......................... SUPPORTED
         Beacon Period ............................. 100
         Fragmentation Threshold ................... 2346
         Multi Domain Capability Implemented ....... TRUE
         Multi Domain Capability Enabled ........... TRUE
         Country String ............................ US
       Multi Domain Capability
         Configuration ............................. AUTOMATIC
         First Chan Num ............................ 36
         Number Of Channels ........................ 20
       MAC Operation Parameters
         Configuration ............................. AUTOMATIC
         Fragmentation Threshold ................... 2346
         Packet Retry Limit ........................ 64
    --More or (q)uit current module or <ctrl-z> to abort
       Tx Power
         Num Of Supported Power Levels ............. 7
         Tx Power Level 1 .......................... 15 dBm
        Tx Power Level 2 .......................... 14 dBm
         Tx Power Level 3 .......................... 11 dBm
         Tx Power Level 4 .......................... 8 dBm
         Tx Power Level 5 .......................... 5 dBm
         Tx Power Level 6 .......................... 2 dBm
         Tx Power Level 7 .......................... -1 dBm
         Tx Power Configuration .................... AUTOMATIC
         Current Tx Power Level .................... 1
       Phy OFDM parameters
         Configuration ............................. AUTOMATIC
         Current Channel ........................... 36
         Extension Channel ......................... NONE
         Channel Width.............................. 20 Mhz
         Allowed Channel List....................... 36,40,44,48,52,56,60,64,100,
           ......................................... 104,108,112,116,132,136,140,
           ......................................... 149,153,157,161
         TI Threshold .............................. -50
         Antenna Type............................... INTERNAL_ANTENNA
         Internal Antenna Gain (in .5 dBi units).... 8
    --More or (q)uit current module or <ctrl-z> to abort
         Diversity.................................. DIVERSITY_ENABLED
       Performance Profile Parameters
          Configuration ............................. AUTOMATIC
         Interference threshold..................... 10 %
         Noise threshold............................ -70 dBm
         RF utilization threshold................... 80 %
         Data-rate threshold........................ 1000000 bps
         Client threshold........................... 12 clients
         Coverage SNR threshold..................... 16 dB
         Coverage exception level................... 25 %
         Client minimum exception level............. 3 clients
       Rogue Containment Information
       Containment Count............................ 0
       CleanAir Management Information
           CleanAir Capable......................... No
    Press Enter to continue or <ctrl-z> to abort
    Cisco AP Identifier.............................. 5
    Cisco AP Name.................................... KN1252_AP01
    Country code..................................... US - United States
    Regulatory Domain allowed by Country............. 802.11bg:-A     802.11a:-A
    AP Country code.................................. US - United States
    AP Regulatory Domain............................. -A
    Switch Port Number .............................. 1
    MAC Address...................................... 00:21:d8:ef:06:50
    IP Address Configuration......................... DHCP
    IP Address....................................... 10.125.18.101
    IP NetMask....................................... 255.255.255.0
    Gateway IP Addr.................................. 10.125.18.1
    NAT External IP Address.......................... None
    CAPWAP Path MTU.................................. 1485
    Telnet State..................................... Enabled
    Ssh State........................................ Disabled
    Cisco AP Location................................ Knowlogy Conference Rooms Side
    Cisco AP Group Name.............................. OGR
    Primary Cisco Switch Name........................
    Primary Cisco Switch IP Address.................. Not Configured
    Secondary Cisco Switch Name......................
    Secondary Cisco Switch IP Address................ Not Configured
    --More or (q)uit current module or <ctrl-z> to abort
    Tertiary Cisco Switch Name.......................
    Tertiary Cisco Switch IP Address................. Not Configured
    Administrative State ............................ ADMIN_ENABLED
    Operation State ................................. REGISTERED
    Mirroring Mode .................................. Disabled
    AP Mode ......................................... H-Reap
    Public Safety ................................... Disabled
    AP SubMode ...................................... Not Configured
    Remote AP Debug ................................. Disabled
    Logging trap severity level ..................... informational
    Logging syslog facility ......................... kern
    S/W Version .................................... 7.0.235.0
    Boot Version ................................... 12.4.10.0
    Mini IOS Version ................................ 3.0.51.0
    Stats Reporting Period .......................... 180
    LED State........................................ Enabled
    PoE Pre-Standard Switch.......................... Disabled
    PoE Power Injector MAC Addr...................... Disabled
    Power Type/Mode.................................. PoE/Medium Power (15.4 W)
    Number Of Slots.................................. 2
    AP Model......................................... AIR-LAP1252AG-A-K9
    AP Image......................................... C1250-K9W8-M
    IOS Version...................................... 12.4(23c)JA5
    --More or (q)uit current module or <ctrl-z> to abort
    Reset Button..................................... Enabled
    AP Serial Number................................. FTX122990L5
    AP Certificate Type.............................. Manufacture Installed
    H-REAP Vlan mode :............................... Enabled
          Native ID :..................................... 118
          WLAN 1 :........................................ 111
          WLAN 2 :........................................ 111
          WLAN 4 :........................................ 112
          WLAN 6 :........................................ 112
          WLAN 7 :........................................ 111
          WLAN 9 :........................................ 112
          WLAN 8 :........................................ 112
    H-REAP Backup Auth Radius Servers :
    Static Primary Radius Server.................... Disabled
    Static Secondary Radius Server.................. Disabled
    Group Primary Radius Server..................... Disabled
    Group Secondary Radius Server................... Disabled
    AP User Mode..................................... AUTOMATIC
    AP User Name..................................... Not Configured
    AP Dot1x User Mode............................... Not Configured
    AP Dot1x User Name............................... Not Configured
    Cisco AP system logging host..................... 255.255.255.255
    AP Up Time....................................... 26 days, 00 h 24 m 39 s
    --More or (q)uit current module or <ctrl-z> to abort
    AP LWAPP Up Time................................. 26 days, 00 h 23 m 48 s
    Join Date and Time............................... Wed Oct 9 10:59:07 2013
    Join Taken Time.................................. 0 days, 00 h 00 m 50 s
    Attributes for Slot 0
       Radio Type................................... RADIO_TYPE_80211n-2.4
       Administrative State ........................ ADMIN_ENABLED
       Operation State ............................. UP
       Radio Role .................................. ACCESS
       CellId ...................................... 0
       Station Configuration
         Configuration ............................. AUTOMATIC
         Number Of WLANs ........................... 7
         Medium Occupancy Limit .................... 100
         CFP Period ................................ 4
         CFP MaxDuration ........................... 60
         BSSID ..................................... 00:22:55:df:a5:90
         Operation Rate Set
           1000 Kilo Bits........................... MANDATORY
           2000 Kilo Bits........................... MANDATORY
           5500 Kilo Bits........................... MANDATORY
    --More or (q)uit current module or <ctrl-z> to abort
           11000 Kilo Bits.......................... MANDATORY
         MCS Set
           MCS 0.................................... SUPPORTED
           MCS 1.................................... SUPPORTED
           MCS 2.................................... SUPPORTED
           MCS 3.................................... SUPPORTED
           MCS 4.................................... SUPPORTED
           MCS 5.................................... SUPPORTED
           MCS 6.................................... SUPPORTED
           MCS 7.................................... SUPPORTED
           MCS 8.................................... SUPPORTED
            MCS 9.................................... SUPPORTED
           MCS 10................................... SUPPORTED
           MCS 11................................... SUPPORTED
           MCS 12................................... SUPPORTED
           MCS 13................................... SUPPORTED
           MCS 14................................... SUPPORTED
           MCS 15................................... SUPPORTED
         Beacon Period ............................. 100
         Fragmentation Threshold ................... 2346
         Multi Domain Capability Implemented ....... TRUE
         Multi Domain Capability Enabled ........... TRUE
         Country String ............................ US
    --More or (q)uit current module or <ctrl-z> to abort
       Multi Domain Capability
         Configuration ............................. AUTOMATIC
         First Chan Num ............................ 1
         Number Of Channels ........................ 11
       MAC Operation Parameters
         Configuration ............................. AUTOMATIC
         Fragmentation Threshold ................... 2346
         Packet Retry Limit ........................ 64
       Tx Power
         Num Of Supported Power Levels ............. 8
         Tx Power Level 1 .......................... 20 dBm
         Tx Power Level 2 .......................... 17 dBm
         Tx Power Level 3 .......................... 14 dBm
         Tx Power Level 4 ..........

    Well you need to understand the behavior of h-reap or what it's called now, FlexConnect. In this mode, the clients are still remembers on the WLC until the session timer/idle timer expires. So switching between SSID's in h-reap will not be the same when switching when the AP's are in local mode.
    Take a look at the client when connected in FlexConnect in the WLC GUI monitor tab. Thus will show you what ssid and vlan the client is on. Now switch to a different ssid and compare this. It's probably the same because the client has not timed out. Now go back to the other ssid and look again. Now on the WLC, remove or delete the client and then switch to the other ssid at the same time. Or switch SSID's and then remove the client. The client will join the new ssid and in the monitor tab, you should see the info.
    There is no need to have clients have multiple SSID's unless your testing. Devices should only have one ssid profile configured to eliminate any connectivity issues from the device wanting to switch SSID's.
    Sent from Cisco Technical Support iPhone App

  • Windows 7 client won't connect with 802.1x security

    Having issues connecting a windows 7 dell laptop with cisco unified wireless infrastructure.  Currently running 4 4402 WLCs and 1 wism.  The client in question is trying to connect to an AP that sits on one of the controllers on the wism.  WLC code running is 6.0.199.  If I configure the windows 7 client to an ssid with wpa2 with preshared key it works with no issue.  It's really problematic with 802.1x, wondering if there is addition settings on the adapter in win 7 that I'm missing or have overlooked.
    Thank you in advance for any suggestions to a solution to my problem
    Regards,
    izzy

    Windows is going to want to use the credentials that you login to the machine.  SO if you logged is as "administrator" but you need to authenticated as domain\John.Smith  you need to manipulate the credentials.
    If you are logging in to the machine with valid domain credentiasl though, it becomes a bit more difficult.
    So, is this the only type of machine having an issue?  What is the driver version and chipset type?
    you can run debug client < cliet ma address > and watch what is happening from the controllers persepctive. You can also see what username is being sent to the AAA server.
    Cheers,
    Steve
    If  this helps you and/or answers  your question please mark the question as "answered" and/or rate it, so  other users can easily find it.

  • WPA with 802.1x authentication

    Hi experts,
    I need clarification in a fundamental concept.
    Is it possible to configure WPA with 802.1x authentication without external AAA / ACS server.
    If the username and password is configured in local device, is it possible to create 802.1x authentication without RADIUS server
    Thanks in advance
    regards,RB

    You can't do 802.1x without RADIUS. But you can use Local EAP on an Autonomous AP or on a LAP Controller. They can both act as RADIUS servers. Here's an example config for an autonomous AP:
    aaa group server radius rad_eap
    server 192.168.0.1 auth-port 1812 acct-port 1813
    aaa authentication login eap_methods group rad_eap
    dot11 ssid ccie
    authentication open eap eap_methods
    authentication network-eap eap_methods
    guest-mode
    radius-server local
    nas 192.168.0.1 key cisco
    user test password test
    radius-server host 192.168.0.1 auth-port 1812 acct-port 1813 key cisco
    LAP Controller local EAP is configurable through GUI

  • Sg300 - 802.1x NPS - mac authentication not working

    I configured 802.1x on a sg300 switch. It is working very well with some Windows 7 machines and a Windows Server 2008 NPS server.
    Now I tried to get the MAC authentication running, on a 3850X it is working without problems, but every access request sent from the SG300 is declined.
    My current port configuration on the SG300:
    interface fastethernet1
     dot1x guest-vlan enable
     dot1x max-req 1
     dot1x reauthentication
     dot1x timeout quiet-period 10
     dot1x authentication 802.1x mac
     dot1x radius-attributes vlan static
     dot1x port-control auto
     switchport mode access
    On the Windows NPS server there is following error to see:
    Authentication Details:
        Connection Request Policy Name:    Secure Wire
        Network Policy Name:        -
        Authentication Provider:        Windows
        Authentication Server:        myradius.local
        Authentication Type:        -
        EAP Type:            -
        Account Session Identifier:        30353030399999
        Reason Code:            1
        Reason:                An internal error occurred. Check the system event log for additional information.
    There is compared to the message from the 3850 the authentication type missing (PAP) and a not very helpful error message displayed...

    Still not working.
    I tried different settings and (also older) software versions on the SF302-08P.
    Also started to change the settings on the NPS (though it is working with the 3850X!), without success.
    The NPS reports following error:
    Schannel:
    The following fatal alert was received: 40.
    EventID 36887
    If I search for this error, every source is pointing to certificate errors, but there should not be any certificate involved?!
    ... is this a bug on the SF302-08P?

  • How many NPS server can be registered as radius server in AD

    Hi
    We are using 2x Microsoft (2008 R2 Ent) NPS radius servers for our Wifi authentication for two different SSID on Aerohive WLAN network. 
    Trying to setup radius authentication for our Cisco Network devices and trying to use one of the radius server which we are using for our wifi auth. Followed all the steps but auth keep failing and now I am getting to the point where I am ready to deploy
    new NPS server for this.
    Before I go ahead and complete the install and register the new radius server in our AD, I would like to know if there is a limit for how many radius servers can be registered in Microsoft Active Directory.
    Thanks Heaps
    Sid

    I believe from the older versions, that the limit was 256? But of course, we wouldn't want to go that far.
    If you are trying to configure a Cisco device and you have a Cisco 24/7 Gold Support contract, they will help you and step you through it on both the Cisco side and the Windows side. I've used them before for a Cisco AP 1231 a few years back, and their support
    was phenomenal and well worth the price of the contract.
    Ace Fekay
    MVP, MCT, MCSE 2012, MCITP EA & MCTS Windows 2008/R2, Exchange 2013, 2010 EA & 2007, MCSE & MCSA 2003/2000, MCSA Messaging 2003
    Microsoft Certified Trainer
    Microsoft MVP - Directory Services
    Complete List of Technical Blogs: http://www.delawarecountycomputerconsulting.com/technicalblogs.php
    This posting is provided AS-IS with no warranties or guarantees and confers no rights.

  • WLC+SSID with PSK/no PSK and ISE with User Banner

    We force users connected with PSK to land on Agreement page with click OK to continue option. Nomadix appliance is used for the agreement page.  How can we do this using ISE?
    The communication with ISE and WLC looks like is through Radius(old NAC was using SNMP) so videos show using 802.1x on SSID and enable NAC.
    Quetsion is doesn't this force SSID to use Certs? so how can PSK can come into play?

    you're mixing a lot of concepts. ISE is both a Radius authetnication server and a posture-assessment center (on radius and not snmp anymore indeed).
    Radius is often linked with 802.1x on a WLC, it achieves higher security. It does not necessarily involve certificate if using PEAP for example.
    However, if you want to keep your SSID with PSK, it's a different story. What you just need is a login page with an acceptance button right ?
    The WLC can do it on its own.
    Add a layer-3 security "web policy" of type "passthrough" on your SSID config. It will display a page with an acceptance. You can customize the text or also customize the page and load it on the WLC as well. (WLC config guide for mroe info on those steps)

Maybe you are looking for

  • Why does Itunes no longer plays Trailers or bought/rent Movies ?

    Hi all, since yesterday, I have the problem that I can't play neither rent movies nor trailers anymore. I get into the player window and I can see all controls, but there is no video or sound playback. With some videos the time counter starts, with s

  • Help Problem Automatic TO Creation for GR PO (Mvt. 101)

    Hi Experts, I have a problem creating TO automatically when material is received from PO using movement type 101. The requirement is to receive material from PO with status QI, create and confirm TO automatically into default storage bin. But when ma

  • IPOD  VIDEO WITH NO VIDEOS!!!!!!!!

    I AM AT WITS END WITH TRYING TO GET VIDEOS ON MY IPOD I CANNOT FIGURE IT OUT. MP4, MPG, .AVI, I CANNOT ADD ANYTHING TO MY LIBRARY OR TRANSFER TO IPOD. PLEASE HELPP!!!!!!   Mac OS X (10.4.5)  

  • Labview, ActiveX, and ThorLabs Piezo controller

    Grettings, We recently purchased some 6-axis piezo positioners, and 3-channel APT controllers from ThorLabs. The main goal of this was to created a Labview program that can automate the positoners and have them move in sync with other measurement har

  • Multihome 10.2.0.4.0 upgrade.

    We have a server running 5 instances at version 10.2.0.1.0, all sharing the same /oracle/product/10.2.0.1.0 directory. One of the clients want to upgrade their database to patch 10.2.0.4.0. But if I upgrade one database, and they all share the same p