IPV6 on Aironet 1121

Hello, exist an upgrade to enable IPV6 on this AP?. I have denial of service on it. Thanks. Leo.

IPv6 is not supported on Cisco Aironet Access points. Thats the reason you are having trouble configuring Ipv6 on APs.

Similar Messages

  • Aironet 1121 Core dumps hang AP

    I have been having some serious issues with my 1121G APs over the past few days. I recently upgraded to 12.3-7 and for unknown reasons the AP's are creating r12-*****.rcore files. These files will fill the AP's flash memory and render them useless, you can ping them but not telnet. The only fix I have been able to get to work is power cycle the AP, login and delete the files, then run a fsck flash and do a wri erase and reboot the ap again. I have the command "no exception crashinfo" to take care of crash files doing the same thing. Is there any way to stop these .rcore files from being created? I would also like to know why they are created.
    I have uploaded my current config if you wish to view it.

    Did you try reloading the Access point firmware. I suspect that the AP upgradation caused the problem and feel that the APs image is corrupted. Try reloading the AP. This should work.

  • AP that will work across subnets?

    Hello,
    We currently have a few 2106 wireless controllers and a dozen Aironet 1121 access points at our main location. We have radius authentication as well as certificates etc. This setup works great and has for years. We have a few satellite offices that now need wireless access. They connect via an IPSec VPN but are on different subnets. If I remember correctly when setting this all up I read somewhere that the AP's that we currently have would not work on the different subnets...they would not be able to use the radius etc.  If this is correct, which access point would be the proper one to use out in the satellite offices?
    Thank you for your help.
    Michael

    Michael,
         Not exactly true.  You could have 1121 across the VPN at the remote site, but all the client traffic would backhaul through the LWAPP/CAPWAP tunnel and ingress/egress at the WLC.
         Now if you want all the local traffic to stay loca, then yes the 1121 would not work.  You would need to use HREAP, this is supported on teh 1130/1240/1250/1140 series of AP.

  • Ipv6 addresses on Aironet

    Hi, I read some previous posts indicating that it is not currently possible to add an ipv6 address on an Aironet access point in autonomous mode.  The most recent related post I found was from March 2011; is this still the case?  Can someone point me to to a link showing Cisco's ipv6 roadmap for aironet products?  If not already, when will this be supported?
    Thanks in advance,
    Mike

    Hi Mike,
    AFAIK IPv6 address is still can not be used in aironet APs.
    if you mention Vinay Sharma's document that metnioned no IPv6 support (it was in march 2011)  you better contact him and ask for the roadmap. he is a cisco employee and will possibly have an idea if Cisco intending to add this feature in the near future wtih aironet APs.
    Amjad

  • Does Aironet 1100/1120/1130 support for IPv6 ?

    Experts,
    I find much document, but not found information about whether those support for IPv6 e.g. dual-stack like newer series.
    Has anyone used to test on those?
    Thank you in advance for any info,
    Nipat.p

    Hi,
    When working with WLCs if you are running code 7.2 you will be able to support IPV6 but this code is only supported by the latest model of WLCs and the APs that are supported under this code.
    On previous WLCs models that support up to code 7.0, the WLC only handles IPV6 pass through after code 6.0 since it does not support native IPV6.

  • Aironet and Dell Latitude problems

    We have 3 access points, 2 1121s and a 350. All three are configured identically, using IOS and with 2 user vlans, one configured with WPA/WPA2 and LEAP, and the other with 128-bit WEP. Both VLANs are also doing MAC authentication to an ACS 3.3 server.
    Our Dell Latitude D610 laptops with Intel 2200BG wireless built-in can authenticate fine to both of the 1121 APs, but not to the 350. Has anyone seen anything like this, and do you have any suggestions for getting this to work with the 350? The 350 works fine when a client with a Cisco card connects. Thanks.

    I have a 600m which is the same chasis as the latitude d600. I also have the same wireless chipset. One of things I have found about the intel wireless is with droping connections both at work and home. Work we use 1200's wireless g cisco Aironets. Intel recognizes the problem and has resolved it with new drivers and software available at their site. since then I have not had any issues.

  • Aironet 2702i Autonomous - Web-Authentication with Radius Window 2008

    Hi Guys,
    I have a problems with case, i have diagrams sample like then : AD(Win2008) - Radius(Win2008) - Aironet 2702i => Use methods Web-Auth for EndUser  
    This is my Configure file on Aironet 2702i
    Aironet2702i#show run
    Building configuration...
    Current configuration : 8547 bytes
    ! Last configuration change at 05:08:25 +0700 Fri Oct 31 2014 by admin
    version 15.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname Aironet2702i
    logging rate-limit console 9
    aaa new-model
    aaa group server radius rad_mac
    aaa group server radius rad_acct
    aaa group server radius rad_admin
    aaa group server tacacs+ tac_admin
    aaa group server radius rad_pmip
    aaa group server radius dummy
    aaa authentication login default local
    aaa authentication login DTSGROUP group radius
    aaa authentication login webauth group radius
    aaa authentication login weblist group radius
    aaa authentication dot1x default group radius
    aaa authorization exec default local 
    aaa session-id common
    clock timezone +0700 7 0
    no ip source-route
    no ip cef 
    ip admission name webauth proxy http
    ip admission name webauth method-list authentication weblist 
    no ip domain lookup
    ip domain name dts.com.vn
    dot11 syslog
    dot11 activity-timeout unknown default 1000
    dot11 activity-timeout client default 1000
    dot11 activity-timeout repeater default 1000
    dot11 activity-timeout workgroup-bridge default 1000
    dot11 activity-timeout bridge default 1000
    dot11 vlan-name DTSGroup vlan 46
    dot11 vlan-name L6-Webauthen-test vlan 45
    dot11 vlan-name NetworkL7 vlan 43
    dot11 vlan-name SGCTT vlan 44
    dot11 ssid DTS-Group
       vlan 46
       authentication open eap DTSGROUP 
       authentication key-management wpa version 2
       mbssid guest-mode
    dot11 ssid DTS-Group-Floor7
       vlan 43
       authentication open 
       authentication key-management wpa version 2
       mbssid guest-mode
       wpa-psk ascii 7 013D03104C0414040D4D5B5E392559
    dot11 ssid L6-Webauthen-test
       vlan 45
       web-auth
       authentication open 
       dot1x eap profile DTSGROUP
       mbssid guest-mode
    dot11 ssid SaigonCTT-Public
       vlan 44
       authentication open 
       authentication key-management wpa version 2
       mbssid guest-mode
       wpa-psk ascii 7 04480A0F082E424D1D0D4B141D06421224
    dot11 arp-cache optional
    dot11 adjacent-ap age-timeout 3
    eap profile DTSGROUP
     description testwebauth-radius
     method peap
     method mschapv2
     method leap
    username TRIHM privilege 15 secret 5 $1$y1J9$3CeHRHUzbO.b6EPBmNlFZ/
    username ADMIN privilege 15 secret 5 $1$IvtF$EP6/9zsYgqthWqTyr.1FB0
    ip ssh version 2
    bridge irb
    interface Dot11Radio0
     no ip address
     encryption vlan 44 mode ciphers aes-ccm 
     encryption vlan 46 mode ciphers aes-ccm 
     encryption mode ciphers aes-ccm 
     encryption vlan 43 mode ciphers aes-ccm 
     encryption vlan 1 mode ciphers aes-ccm 
     ssid DTS-Group
     ssid DTS-Group-Floor7
     ssid L6-Webauthen-test
     ssid SaigonCTT-Public
     countermeasure tkip hold-time 0
     antenna gain 0
     stbc
     mbssid
     packet retries 128 drop-packet
     channel 2412
     station-role root
     rts threshold 2340
     rts retries 128
     ip admission webauth
    interface Dot11Radio0.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 spanning-disabled
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
    interface Dot11Radio0.43
     encapsulation dot1Q 43
     bridge-group 43
     bridge-group 43 subscriber-loop-control
     bridge-group 43 spanning-disabled
     bridge-group 43 block-unknown-source
     no bridge-group 43 source-learning
     no bridge-group 43 unicast-flooding
    interface Dot11Radio0.44
     encapsulation dot1Q 44
     bridge-group 44
     bridge-group 44 subscriber-loop-control
     bridge-group 44 spanning-disabled
     bridge-group 44 block-unknown-source
     no bridge-group 44 source-learning
     no bridge-group 44 unicast-flooding
     ip admission webauth
    interface Dot11Radio0.45
     encapsulation dot1Q 45
     bridge-group 45
     bridge-group 45 subscriber-loop-control
     bridge-group 45 spanning-disabled
     bridge-group 45 block-unknown-source
     no bridge-group 45 source-learning
     no bridge-group 45 unicast-flooding
     ip admission webauth
    interface Dot11Radio0.46
     encapsulation dot1Q 46
     bridge-group 46
     bridge-group 46 subscriber-loop-control
     bridge-group 46 spanning-disabled
     bridge-group 46 block-unknown-source
     no bridge-group 46 source-learning
     no bridge-group 46 unicast-flooding
    interface Dot11Radio1
     no ip address
     shutdown
     encryption vlan 46 mode ciphers aes-ccm 
     encryption vlan 44 mode ciphers aes-ccm 
     encryption vlan 1 mode ciphers aes-ccm 
     encryption vlan 43 mode ciphers aes-ccm 
     encryption vlan 45 mode ciphers ckip-cmic 
     ssid DTS-Group
     ssid DTS-Group-Floor7
     ssid SaigonCTT-Public
     countermeasure tkip hold-time 0
     antenna gain 0
     peakdetect
     dfs band 3 block
     stbc
     mbssid
     packet retries 128 drop-packet
     channel 5745
     station-role root
     rts threshold 2340
     rts retries 128
    interface Dot11Radio1.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 subscriber-loop-control
     bridge-group 1 spanning-disabled
     bridge-group 1 block-unknown-source
     no bridge-group 1 source-learning
     no bridge-group 1 unicast-flooding
    interface Dot11Radio1.43
     encapsulation dot1Q 43
     bridge-group 43
     bridge-group 43 subscriber-loop-control
     bridge-group 43 spanning-disabled
     bridge-group 43 block-unknown-source
     no bridge-group 43 source-learning
     no bridge-group 43 unicast-flooding
    interface Dot11Radio1.44
     encapsulation dot1Q 44
     bridge-group 44
     bridge-group 44 subscriber-loop-control
     bridge-group 44 spanning-disabled
     bridge-group 44 block-unknown-source
     no bridge-group 44 source-learning
     no bridge-group 44 unicast-flooding
     ip admission webauth
    interface Dot11Radio1.45
     encapsulation dot1Q 45
     bridge-group 45
     bridge-group 45 subscriber-loop-control
     bridge-group 45 spanning-disabled
     bridge-group 45 block-unknown-source
     no bridge-group 45 source-learning
     no bridge-group 45 unicast-flooding
     ip admission webauth
    interface Dot11Radio1.46
     encapsulation dot1Q 46
     bridge-group 46
     bridge-group 46 subscriber-loop-control
     bridge-group 46 spanning-disabled
     bridge-group 46 block-unknown-source
     no bridge-group 46 source-learning
     no bridge-group 46 unicast-flooding
    interface GigabitEthernet0
     no ip address
     duplex auto
     speed auto
     dot1x pae authenticator
     dot1x authenticator eap profile DTSGROUP
     dot1x supplicant eap profile DTSGROUP
    interface GigabitEthernet0.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 spanning-disabled
     no bridge-group 1 source-learning
    interface GigabitEthernet0.43
     encapsulation dot1Q 43
     bridge-group 43
     bridge-group 43 spanning-disabled
     no bridge-group 43 source-learning
    interface GigabitEthernet0.44
     encapsulation dot1Q 44
     bridge-group 44
     bridge-group 44 spanning-disabled
     no bridge-group 44 source-learning
    interface GigabitEthernet0.45
     encapsulation dot1Q 45
     bridge-group 45
     bridge-group 45 spanning-disabled
     no bridge-group 45 source-learning
    interface GigabitEthernet0.46
     encapsulation dot1Q 46
     bridge-group 46
     bridge-group 46 spanning-disabled
     no bridge-group 46 source-learning
    interface GigabitEthernet1
     no ip address
     shutdown
     duplex auto
     speed auto
    interface GigabitEthernet1.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 spanning-disabled
     no bridge-group 1 source-learning
    interface GigabitEthernet1.43
     encapsulation dot1Q 43
     bridge-group 43
     bridge-group 43 spanning-disabled
     no bridge-group 43 source-learning
    interface GigabitEthernet1.44
     encapsulation dot1Q 44
     bridge-group 44
     bridge-group 44 spanning-disabled
     no bridge-group 44 source-learning
    interface GigabitEthernet1.45
     encapsulation dot1Q 45
     bridge-group 45
     bridge-group 45 spanning-disabled
     no bridge-group 45 source-learning
    interface GigabitEthernet1.46
     encapsulation dot1Q 46
     bridge-group 46
     bridge-group 46 spanning-disabled
     no bridge-group 46 source-learning
    interface BVI1
     mac-address 58f3.9ce0.8038
     ip address 172.16.1.62 255.255.255.0
     ipv6 address dhcp
     ipv6 address autoconfig
     ipv6 enable
    ip forward-protocol nd
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip radius source-interface BVI1 
    radius-server attribute 32 include-in-access-req format %h
    radius server 172.16.50.99
     address ipv4 172.16.50.99 auth-port 1645 acct-port 1646
     key 7 104A1D0A4B141D06421224
    bridge 1 route ip
    line con 0
     logging synchronous
    line vty 0 4
     exec-timeout 0 0
     privilege level 15
     logging synchronous
     transport input ssh
    line vty 5 15
     exec-timeout 0 0
     privilege level 15
     logging synchronous
     transport input ssh
    end
    This is My Logfile on Radius Win 2008 : 
    Network Policy Server denied access to a user.
    Contact the Network Policy Server administrator for more information.
    User:
    Security ID: S-1-5-21-858235673-3059293199-2272579369-1162
    Account Name: xxxxxxxxxxxxxxxx
    Account Domain: xxxxxxxxxxx
    Fully Qualified Account Name: xxxxxxxxxxxxxxxxxxx
    Client Machine:
    Security ID: S-1-0-0
    Account Name: -
    Fully Qualified Account Name: -
    OS-Version: -
    Called Station Identifier: -
    Calling Station Identifier: -
    NAS:
    NAS IPv4 Address: 172.16.1.62
    NAS IPv6 Address: -
    NAS Identifier: Aironet2702i
    NAS Port-Type: Async
    NAS Port: -
    RADIUS Client:
    Client Friendly Name: Aironet2702i
    Client IP Address: 172.16.1.62
    Authentication Details:
    Connection Request Policy Name: Use Windows authentication for all users
    Network Policy Name: DTSWIRELESS
    Authentication Provider: Windows
    Authentication Server: xxxxxxxxxxxxxx
    Authentication Type: PAP
    EAP Type: -
    Account Session Identifier: -
    Logging Results: Accounting information was written to the local log file.
    Reason Code: 66
    Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.
    So i will explain problems what i have seen:
    SSID: DTS-Group using authentication EAP with RADIUS and it working great (Authentication Type from Aironet to RADIUS is PEAP)
    SSID:L6-Webauthen-test using web-auth and i had try to compare with RADIUS but ROOT CAUSE is AUTHENTICATION TYPE from Aironet to RADIUS default is PAP. (Reason Code : 66)
    => I had trying to find how to change Authentication Type of Web-Auth on Cisco Aironet from PAP to PEAP or sometime like that for combine with RADIUS.
    Any idea or recommend for me ?
    Thanks for see my case  

    Hi Dhiresh Yadav,
    Many thanks for your reply me,
    I will explain again for clear my problems.
    At this case, i had setup complete SSID DTS-Group use authentication with security as PEAP combine Radius Server running on Window 2008.
    I had login SSID by Account create in AD =>  It's work okay with me. Done
    Problems occurs when i try to use Web-authentication on Vlan45 With SSID :
    dot11 ssid L6-Webauthen-test
       vlan 45
       web-auth
       authentication open 
       dot1x eap profile DTSGROUP
       mbssid guest-mode
    After configured on Aironet and Window Radius , i had try to login with Account create in AD by WebBrowser but it Fail ( i have see mini popup said: Authentication Fail" . So i go to Radius Server and search log on EventViewer.
    This is My Logfile on Radius Win 2008 : 
    Network Policy Server denied access to a user.
    NAS:
    NAS IPv4 Address: 172.16.1.62
    NAS IPv6 Address: -
    NAS Identifier: Aironet2702i
    NAS Port-Type: Async
    NAS Port: -
    RADIUS Client:
    Client Friendly Name: Aironet2702i
    Client IP Address: 172.16.1.62
    Authentication Details:
    Connection Request Policy Name: Use Windows authentication for all users
    Network Policy Name: DTSWIRELESS
    Authentication Provider: Windows
    Authentication Server: xxxxxxxxxxxxxx
    Authentication Type: PAP
    EAP Type: -
    Account Session Identifier: -
    Logging Results: Accounting information was written to the local log file.
    Reason Code: 66
    Reason: The user attempted to use an authentication method that is not enabled on the matching network policy.
    Im  think ROOT CAUSE is :
    PAP is the default authentication type for web-auth users on Aironet 2702i, so it can't combine with Radius Window 2008 because they just support PEAP (CHAPv1,CHAPv2....) => Please give me a tip how to change Authentication Type from PAP to PEAP for Web Authentication on Aironet

  • 4 Aironet 1250's and a controller?

    Hi guys,
    I'm about to order a four Aironet 1250's and a 2106 Wireless LAN Controller. From what I've read, I'll need the controller to manage the APs if I want them all to offer the same broadcast domain and subnet, and offer roaming to the users. Often times what I read and understand turns out to have little to do with reality, so my question is, am I correct about this?
    Thanks in advance!
      Joe

    http://www.cisco.com/en/US/docs/wireless/controller/4.2/configuration/guide/c42ovrv.html#wp1133151
    These hardware features are not supported on 2000  and 2100 series controllers:
    •Power over Ethernet (PoE) [2000 series  controllers only]
    Note Ports 7 and 8 on 2100 series  controllers are PoE ports.
    •Service port (separate out-of-band  management 10/100-Mbps Ethernet interface)
    These software features are not supported on 2000 and 2100 series  controllers:
    •VPN termination (such as IPSec and  L2TP)
    •Termination of guest controller tunnels  (origination of guest controller tunnels is supported)
    •External web authentication web server  list
    •Layer 2 LWAPP
    •Spanning tree
    •Port mirroring
    •Cranite
    •Fortress
    •AppleTalk
    •QoS per-user bandwidth contracts
    •IPv6 pass-through
    •Link aggregation (LAG)

  • IPv6 address is not send over WLan

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Normale Tabelle";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin:0cm;
    mso-para-margin-bottom:.0001pt;
    mso-pagination:widow-orphan;
    font-size:10.0pt;
    font-family:"Times New Roman";
    mso-ansi-language:#0400;
    mso-fareast-language:#0400;
    mso-bidi-language:#0400;}
    Hi!
    My Cisco router is working fine with Ethernet and IPv6. There is a “little” problem concerning the promotion of IPv6 addresses under WLan. When I’m using WLan the router is not providing any IPv6 addresses, only IPv4. Do you have any clue why the router is not promoting the IPv6 addresses.
    btw. I will post the config later on, when I’m at home.
    Cheers

    It´s an integrated AP!
    Here is the Code:
    gateway#sh ver
    Cisco IOS Software, C870 Software (C870-ADVIPSERVICESK9-M), Version 12.4(15)T11, RELEASE SOFTWARE (fc2)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2009 by Cisco Systems, Inc.
    Compiled Thu 29-Oct-09 12:35 by prod_rel_team
    ROM: System Bootstrap, Version 12.3(8r)YI2, RELEASE SOFTWARE
    gateway uptime is 8 weeks, 13 hours, 17 minutes
    System returned to ROM by power-on
    System restarted at 20:04:22 MET Thu Apr 29 2010
    System image file is "flash:c870-advipservicesk9-mz.124-15.T11.bin"
    bridge irb
    dot11 ssid v6gregor
       vlan 2
       authentication open
       authentication key-management wpa
       wpa-psk ascii 7 1407051D5A03382E232721
    ip dhcp pool wlan_v6
       network 10.11.60.0 255.255.255.0
       default-router 10.11.60.1
       domain-name ipv4.at
       dns-server 195.70.224.45 62.218.28.35
    interface Dot11Radio0
    description Provisioned by CSM (private interface)
    no ip address
    load-interval 30
    no dot11 extension aironet
    encryption vlan 2 mode ciphers tkip
    encryption vlan 3 mode ciphers tkip
    encryption vlan 1 mode wep optional
    ssid daham
    ssid open
    ssid v6gregor
    mbssid
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    power local cck 17
    power local ofdm 17
    power client 17
    channel 2432
    station-role root
    rts threshold 2312
    antenna receive right
    interface Dot11Radio0.1
    encapsulation dot1Q 1 native
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 spanning-disabled
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    interface Dot11Radio0.2
    encapsulation dot1Q 2
    bridge-group 2
    bridge-group 2 subscriber-loop-control
    bridge-group 2 spanning-disabled
    bridge-group 2 block-unknown-source
    no bridge-group 2 source-learning
    no bridge-group 2 unicast-flooding
    interface BVI1
    ip address 10.10.10.1 255.255.255.0
    ip nbar protocol-discovery
    ip nat inside
    ip virtual-reassembly
    ip tcp adjust-mss 1300
    ipv6 address 2001:938:DAD:400::1/64
    ipv6 enable
    ipv6 nd prefix 2001:938:DAD:400::/64
    ipv6 nd router-preference High
    interface BVI2
    ip address 10.11.60.1 255.255.255.0
    ip nbar protocol-discovery
    ip nat inside
    ip virtual-reassembly
    ipv6 address 2001:938:DAD:800::1/64
    ipv6 enable
    ipv6 mtu 1300
    ipv6 nd prefix 2001:938:DAD:800::/64
    ipv6 nd managed-config-flag
    ipv6 nd router-preference High
    ipv6 nd ra interval 60

  • Cisco Aironet 702 - Transmitter Power: error

    hi,
      I have problem with setup Cisco Aironet 702. I set all properties. Interfaces gigaEthernet and Radio0 are UP. I don't see my SSID in network. On properties for Radio0 I see error in section Transmitter Power. How can I troubleshooting this issue?
    Here I uploaded screens from configuration pages
    https://onedrive.live.com/?gologin=1&mkt=en-US#cid=0AE7867F90F4DB32&id=AE7867F90F4DB32!257
    regards,
    Jacek

    running config
    Current configuration : 1838 bytes
    ! Last configuration change at 01:23:01 UTC Mon Mar 1 1993
    version 15.2
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname apOpenSpace
    logging rate-limit console 9
    enable secret 5 $1$AL/C$ZkBchBuZ9hGtztdUacBmO/
    no aaa new-model
    no ip cef
    dot11 syslog
    dot11 ssid Artim_Wifi
       authentication open
       authentication key-management wpa version 2
       wpa-psk ascii 7 096D5C1D1008464B525C
    dot11 guest
    username Cisco password 7 096F471A1A0A
    bridge irb
    interface Dot11Radio0
    no ip address
    encryption mode ciphers aes-ccm
    ssid Artim_Wifi
    antenna gain 0
    power local 5
    packet retries 64 drop-packet
    station-role root
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 spanning-disabled
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    interface Dot11Radio1
    no ip address
    shutdown
    antenna gain 0
    peakdetect
    no dfs band block
    packet retries 64 drop-packet
    channel dfs
    station-role root
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 spanning-disabled
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    interface GigabitEthernet0
    ip address 10.6.11.54 255.255.255.0
    duplex auto
    speed auto
    bridge-group 1
    bridge-group 1 spanning-disabled
    no bridge-group 1 source-learning
    interface BVI1
    ip address 10.6.11.54 255.255.255.0
    ipv6 address dhcp
    ipv6 address autoconfig
    ip default-gateway 10.6.11.1
    ip forward-protocol nd
    ip http server
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    bridge 1 route ip
    line con 0
    line vty 0 4
    login local
    transport input all
    end

  • ACS 1121 error 5411 EAP session timed out w/Peap Wireless logins

    I am having issues that came up in the last month where all of my wireless client devices (using 4400 WLC and AC 1121 Appliance w/Active Directory integration) using PEAP MSCHAP2 are being prompted multiple times one after another for their userid/password. 
    This is very intermitant with clients sometimes being able to authenticate on the first try and later in the day getting prompted 20 times for authentication before it works.  This affects all brands of laptops/tablets/smartphones and other devices. 
    My ACS log files show an error of 5411 EAP session timed out. 
    I have had a TAC case open for over a month but they still haven't found a solution.
    Has anyone run into this and have any thoughts?  I have already increased my timeout on the controller from the default 2 seconds to 8 seconds but the delay between prompts asking for authentication credentials on clients is less than a second.
    What do you think? 
    Jim

    We are running 5.2.0.26.11 on the ACS engine and 7.0.240.0 on the WLC's.  The certificate on the ACS was expired, but for over a year without issues prior to about a month ago (our clients do have the verify certificate box unchecked).  I did renew the certificate on the ACS (self signed, just told it to renew) but that didn't help. 
    The only thing the clients get are multiple prompts for authentication usually a second or 2 apart even though my timeout on the WLC is set to 8 seconds.  A debug on the WLC shows the following.  Any ideas on what could be the issue? 
    (Cisco Controller) >*dot1xMsgTask: Jun 18 11:07:16.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 8)
    *osapiBsnTimer: Jun 18 11:07:17.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:17.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:17.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 9)
    *osapiBsnTimer: Jun 18 11:07:18.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:18.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:18.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 10)
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy AP LOCP - mode:0 slotId:1, apMac 0x0:1c:b1:6:ee:a0
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy WLAN LOCP EssIndex:2 aid:1 ssid:NPT-SECURE
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy Security LOCP ecypher:0x0 ptype:0x2, p:0x1, eaptype:0x6 w:0x1 aalg:0x0, PMState: 8021X_REQD
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy 802.11 LOCP a:0x0 b:0x0 c:0x0 d:0x0 e:0x0 protocol2:0x1 statuscode 0, reasoncode 99, status 3
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy CCX LOCP 4
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy e2e LOCP 0x1
    *apfLbsTask: Jun 18 11:07:18.319: 00:27:10:c9:91:2c Copy MobilityData LOCP status:0, anchorip:0x0
    *osapiBsnTimer: Jun 18 11:07:19.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:19.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:19.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 11)
    *osapiBsnTimer: Jun 18 11:07:20.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:20.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:20.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 12)
    *osapiBsnTimer: Jun 18 11:07:21.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:21.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:21.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 13)
    *osapiBsnTimer: Jun 18 11:07:22.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:22.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:22.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 14)
    *osapiBsnTimer: Jun 18 11:07:23.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:23.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:23.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 15)
    *osapiBsnTimer: Jun 18 11:07:24.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:24.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:24.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 16)
    *osapiBsnTimer: Jun 18 11:07:25.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:25.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:25.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 17)
    *osapiBsnTimer: Jun 18 11:07:26.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:26.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:26.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 18)
    *osapiBsnTimer: Jun 18 11:07:27.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:27.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:27.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 19)
    *osapiBsnTimer: Jun 18 11:07:28.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:28.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:28.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 20)
    *osapiBsnTimer: Jun 18 11:07:29.317: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:29.318: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:29.318: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 21)
    *dot1xMsgTask: Jun 18 11:07:29.318: 00:27:10:c9:91:2c Reached Max EAP-Identity Request retries (21) for STA 00:27:10:c9:91:2c
    *dot1xMsgTask: Jun 18 11:07:29.318: 00:27:10:c9:91:2c Sent Deauthenticate to mobile on BSSID 00:1c:b1:06:ee:a0 slot 1(caller 1x_auth_pae.c:3121)
    *dot1xMsgTask: Jun 18 11:07:29.319: 00:27:10:c9:91:2c Scheduling deletion of Mobile Station:  (callerId: 6) in 10 seconds
    *dot1xMsgTask: Jun 18 11:07:29.319: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Disconnected state
    *dot1xMsgTask: Jun 18 11:07:29.319: 00:27:10:c9:91:2c Not sending EAP-Failure for STA 00:27:10:c9:91:2c
    *spamReceiveTask: Jun 18 11:07:29.979: 00:27:10:c9:91:2c Received Idle-Timeout from AP 00:1d:71:0a:de:70, slot 1 for STA 00:27:10:c9:91:2c
    *spamReceiveTask: Jun 18 11:07:29.979: 00:27:10:c9:91:2c Warning, ignore the DELETE_MOBILE_PAYLOAD from AP: 00:1d:71:0a:de:70, slot 1. STA connecting AP: 00:1c:b1:06:ee:a0, slot 1
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Association received from mobile on AP 00:1d:71:0a:de:70
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c 0.0.0.0 8021X_REQD (3) Changing ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:1633)
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Applying site-specific IPv6 override for station 00:27:10:c9:91:2c - vapId 2, site 'none', interface 'management'
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Applying IPv6 Interface Policy for station 00:27:10:c9:91:2c - vlan 0, interface id 0, interface 'management'
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Processing RSN IE type 48, length 22 for mobile 00:27:10:c9:91:2c
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Received RSN IE with 0 PMKIDs from mobile 00:27:10:c9:91:2c
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [00:1c:b1:06:ee:a0]
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Updated location for station old AP 00:1c:b1:06:ee:a0-1, new AP 00:1d:71:0a:de:70-1
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c 0.0.0.0 8021X_REQD (3) Initializing policy
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3)
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state 8021X_REQD (3)
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c 0.0.0.0 8021X_REQD (3) DHCP Not required on AP 00:1d:71:0a:de:70 vapId 2 apVapId 2for this client
    *apfMsConnTask_0: Jun 18 11:07:30.834: 00:27:10:c9:91:2c Not Using WMM Compliance code qosCap 00
    *apfMsConnTask_0: Jun 18 11:07:30.835: 00:27:10:c9:91:2c 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:1d:71:0a:de:70 vapId 2 apVapId 2
    *apfMsConnTask_0: Jun 18 11:07:30.835: 00:27:10:c9:91:2c apfPemAddUser2 (apf_policy.c:223) Changing state for mobile 00:27:10:c9:91:2c on AP 00:1d:71:0a:de:70 from Associated to Associated
    *apfMsConnTask_0: Jun 18 11:07:30.835: 00:27:10:c9:91:2c Stopping deletion of Mobile Station: (callerId: 48)
    *apfMsConnTask_0: Jun 18 11:07:30.835: 00:27:10:c9:91:2c Sending Assoc Response to station on BSSID 00:1d:71:0a:de:70 (status 0) ApVapId 2 Slot 1
    *apfMsConnTask_0: Jun 18 11:07:30.835: 00:27:10:c9:91:2c apfProcessAssocReq (apf_80211.c:5276) Changing state for mobile 00:27:10:c9:91:2c on AP 00:1d:71:0a:de:70 from Associated to Associated
    *dot1xMsgTask: Jun 18 11:07:30.838: 00:27:10:c9:91:2c Disable re-auth, use PMK lifetime.
    *dot1xMsgTask: Jun 18 11:07:30.838: 00:27:10:c9:91:2c Station 00:27:10:c9:91:2c setting dot1x reauth timeout = 0
    *dot1xMsgTask: Jun 18 11:07:30.838: 00:27:10:c9:91:2c Stopping reauth timeout for 00:27:10:c9:91:2c
    *dot1xMsgTask: Jun 18 11:07:30.838: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:30.838: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 1)
    *osapiBsnTimer: Jun 18 11:07:31.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:31.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:31.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 2)
    *osapiBsnTimer: Jun 18 11:07:32.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:32.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:32.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 3)
    *osapiBsnTimer: Jun 18 11:07:33.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:33.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:33.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 4)
    *apfLbsTask: Jun 18 11:07:34.318: 00:27:10:c9:91:2c Copy AP LOCP - mode:0 slotId:1, apMac 0x0:1d:71:a:de:70
    *apfLbsTask: Jun 18 11:07:34.319: 00:27:10:c9:91:2c Copy WLAN LOCP EssIndex:2 aid:1 ssid:NPT-SECURE
    *apfLbsTask: Jun 18 11:07:34.319: 00:27:10:c9:91:2c Copy Security LOCP ecypher:0x0 ptype:0x2, p:0x1, eaptype:0x6 w:0x1 aalg:0x0, PMState: 8021X_REQD
    *apfLbsTask: Jun 18 11:07:34.319: 00:27:10:c9:91:2c Copy 802.11 LOCP a:0x0 b:0x0 c:0x0 d:0x0 e:0x0 protocol2:0x1 statuscode 0, reasoncode 99, status 3
    *apfLbsTask: Jun 18 11:07:34.320: 00:27:10:c9:91:2c Copy CCX LOCP 4
    *apfLbsTask: Jun 18 11:07:34.320: 00:27:10:c9:91:2c Copy e2e LOCP 0x1
    *apfLbsTask: Jun 18 11:07:34.320: 00:27:10:c9:91:2c Copy MobilityData LOCP status:0, anchorip:0x0
    *osapiBsnTimer: Jun 18 11:07:34.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:34.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:34.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 5)
    *osapiBsnTimer: Jun 18 11:07:35.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:35.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:35.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 6)
    *osapiBsnTimer: Jun 18 11:07:36.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:36.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:36.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 7)
    *osapiBsnTimer: Jun 18 11:07:37.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:37.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:37.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 8)
    *osapiBsnTimer: Jun 18 11:07:38.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:38.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state
    *dot1xMsgTask: Jun 18 11:07:38.718: 00:27:10:c9:91:2c Sending EAP-Request/Identity to mobile 00:27:10:c9:91:2c (EAP Id 9)
    *osapiBsnTimer: Jun 18 11:07:39.717: 00:27:10:c9:91:2c 802.1x 'txWhen' Timer expired for station 00:27:10:c9:91:2c and for message = M0
    *dot1xMsgTask: Jun 18 11:07:39.718: 00:27:10:c9:91:2c dot1x - moving mobile 00:27:10:c9:91:2c into Connecting state

  • Upgrade 1121 autonomous to LWAPP

    I have some access-points AIR-AP-1121G-TO-K9 and it would like to use them with a WLAN Controller. Is possible to change IOS for the software LWAPP to use with the WLAN Controller?
    I know that that is possible in another models of access-points, but I don't know if the 1121 support that upgrade.
    Regards.

    Hi Andre,
    Just to add a note to the good tips from Ankur. These AP's can be converted to LWAPP. We did this exact conversion last summer on about 30 1121G's with the **LWAPP upgrade tool**.
    Support for the 1121 was added in WLC version 4.0.155.0 Have a look at these related docs;
    Software release 4.0.155.0 New Features
    LWAPP for Cisco Aironet 1100 Series Access Points (802.11g radio only) Allows the Cisco Aironet 1100 Series Access Point to be upgraded from autonomous access point mode to lightweight mode using the autonomous to lightweight mode upgrade tool.
    Note You must install software release 4.0.155.0 on the controller before connecting 1100 series access points to the controller.
    http://www.cisco.com/en/US/products/ps6366/prod_release_note09186a00806e8989.html#wp147320
    LWAPP Upgrade Tool Troubleshoot Tips
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008072d9a1.shtml
    Access points must run Cisco IOS Release 12.3(7)JA or later before you use the upgrade tool.
    System Requirements
    You can use the Autonomous to Lightweight Mode upgrade tool to install Cisco IOS Release 12.3(11)JX on these access points:
    **All 1100 series access points containing MP21G (802.11g) radios
    All 1130, 1230, and 1240 series access points
    All modular 1200 series access points running Cisco IOS software and containing these supported radios:
    802.11g: MP21G, MP31G
    802.11a: AIR-RM21A-x-K9, AIR-RM22A-x-K9
    All 1300 series access points in access point mode
    http://www.cisco.com/en/US/docs/wireless/access_point/ios/release/notes/b311jx1.html
    Cisco has released a free tool called the "Autonomous to Lightweight Mode Upgrade Tool" that allows selected Cisco Aironet autonomous access point models to be configured for lightweight mode operation.
    The Autonomous to Lightweight Mode Upgrade Tool supports the following models:
    Cisco Aironet 1240AG Series access points
    Cisco Aironet 1230AG Series access points
    Cisco Aironet 1200 Series access points that contain 802.11g (AIR-MP21G-x-K9) and/or second-generation 802.11a radios (AIR-RM21A-x-K9 or AIR-RM22A-x-K9)
    Cisco Aironet 1130AG Series access points
    **Cisco Aironet 1100 Series Access Points that contain 802.11g radios (AIR-AP1121G-x-K9)
    Cisco Aironet 1300 Series Access Points/Bridges (AIR-BR1310G-x-K9 or AIR-BR1310G-x-K9-R). A Cisco Aironet 1300 Series operating in Lightweight Access Point Protocol (LWAPP) mode only operates as an access point. This series does not support LWAPP bridging mode.
    The Autonomous to Lightweight Mode Upgrade Tool supports a process to migrate an autonomous access point from autonomous mode to lightweight mode. Unlike a VxWorks to Cisco IOS Software upgrade, this process is a Cisco IOS Software upgrade to the existing Cisco IOS Software image-not an operating system "swapout". In converted access points operating in lightweight mode, Cisco IOS Software continues to run on the access point, while LWAPP is used to communicate with a wireless LAN controller. Since LWAPP supports automatic access point configuration, there is no need to retain or convert the original autonomous Cisco IOS Software access point configuration.
    http://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns337/networking_solutions_white_paper0900aecd804f1a23.shtml
    Cisco Aironet Access Point Support for Lightweight Access Point Protocol
    http://www.cisco.com/en/US/products/ps6521/prod_bulletin0900aecd80321a2c.html
    Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode
    http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_technical_reference09186a00804fc3dc.html#wp157147
    Hope this helps!
    Rob

  • RRAS Authentication and Aironet 1600

    Hello
    I'm having trouble configuring my Cisco Aironet 1600 to forward to my windows server for Authenticaiton.
    when i attempt to connect to the access point. I get a responce in my windows event id 6272 stating
    Network Policy Server granted access to a user
    but when i look at the cisco event id i see an authentication error. I ran a trace on the ap when i attempted the communiction. here is the results.
    any help would be greatly appreciated.
    WAP>
    Jan  6 14:20:31.313: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:20:31.313: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:20:31.353: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:20:31.353: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:20:31.353: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.
    WAP>319c timer started for 30 seconds
    WAP>
    Jan  6 14:20:48.877: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 0023.142b.319c
    Jan  6 14:20:48.877: dot11_auth_dot1x_send_response_to_server: Sending client 0023.142b.319c data to server
    Jan  6 14:20:48.877: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jan  6 14:20:48.877: RADIUS/ENCODE(00001477):Orig. component type = DOT11
    Jan  6 14:20:48.877: RADIUS:  AAA Unsupported Attr: ssid              [347] 8
    Jan  6 14:20:48.877: RADIUS:
    WAP>   50 48 41 4E 54 4F            [ PHANTO]
    Jan  6 14:20:48.877: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    Jan  6 14:20:48.877: RADIUS:  AAA Unsupported Attr: interface         [222] 4
    Jan  6 14:20:48.877: RADIUS:   31 36                [ 16]
    Jan  6 14:20:48.877: RADIUS(00001477): Config NAS IP: 192.168.0.222
    Jan  6 14:20:48.877: RADIUS(00001477): Config NAS IPv6:
    Jan  6 14:20:48.877: RADIUS/ENCODE(00001477): acct_session_id: 5229
    Jan  6 14:20:48.877: RADIUS(00001477): Config NA
    WAP>S IP: 192.168.0.222
    Jan  6 14:20:48.877: RADIUS(00001477): sending
    Jan  6 14:20:48.877: RADIUS(00001477): Send Access-Request to 192.168.0.19:1645 id 1645/70, len 187
    Jan  6 14:20:48.877: RADIUS:  authenticator C4 49 1B CE FC 2F 22 6F - 16 46 8F 44 3B 10 48 AC
    Jan  6 14:20:48.877: RADIUS:  User-Name           [1]   25  "domain\user"
    Jan  6 14:20:48.877: RADIUS:  Framed-MTU          [12]  6   1400
    Jan  6 14:20:48.877: RADIUS:  Called-Station-Id   [30]  28  "34-A8-4E-B
    WAP>D-F3-50:PHANTOM5"
    Jan  6 14:20:48.877: RADIUS:  Calling-Station-Id  [31]  16  "0023.142b.319c"
    Jan  6 14:20:48.877: RADIUS:  Service-Type        [6]   6   Login                     [1]
    Jan  6 14:20:48.877: RADIUS:  Message-Authenticato[80]  18
    Jan  6 14:20:48.877: RADIUS:   17 BE 54 D2 40 4E 08 DF 55 50 47 54 22 FF 5C 23        [ T@NUPGT"\#]
    Jan  6 14:20:48.877: RADIUS:  EAP-Message         [79]  30
    Jan  6 14:20:48.877: RADIUS:   02 02 00 1C 01 65 78 71 75 61 64 72 75 6D 5C 61 64 6D 69 6E 69  [ex
    WAP>quadrum\admini]
    Jan  6 14:20:48.877: RADIUS:   73 74 72 61 74 6F 72           [ strator]
    Jan  6 14:20:48.877: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jan  6 14:20:48.877: RADIUS:  NAS-Port            [5]   6   1610
    Jan  6 14:20:48.877: RADIUS:  NAS-Port-Id         [87]  6   "1610"
    Jan  6 14:20:48.877: RADIUS:  NAS-IP-Address      [4]   6   192.168.0.222
    Jan  6 14:20:48.877: RADIUS:  Nas-Identifier      [32]  14  "WAP"
    Jan  6 1
    WAP>4:20:48.877: RADIUS(00001477): Sending a IPv4 Radius Packet
    Jan  6 14:20:48.877: RADIUS(00001477): Started 5 sec timeout
    Jan  6 14:20:48.881: RADIUS: Received from id 1645/70 192.168.0.19:1645, Access-Accept, len 66
    Jan  6 14:20:48.881: RADIUS:  authenticator 4D AA 3F 3F C5 78 F4 DB - B2 04 AF 4E 0A DC A5 6D
    Jan  6 14:20:48.881: RADIUS:  Class               [25]  46
    Jan  6 14:20:48.881: RADIUS:   B2 3C 09 FD 00 00 01 37 00 01 02 00 C0 A8 00 13 00 00 00 00 5D 7B 6B 09 AC 82 24 A3 01 CE FC 72 A7 8E 51
    WAP> DC 00 00 00 00 00 00 02 64         [ <7]{k$rQd]
    Jan  6 14:20:48.881: RADIUS(00001477): Received from id 1645/70
    Jan  6 14:20:48.881: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0023.142b.319c
    Jan  6 14:20:48.881: dot11_auth_dot1x_send_client_fail: Authentication failed for 0023.142b.319c
    Jan  6 14:20:48.881: %DOT11-7-AUTH_FAILED: Station 0023.142b.319c Authentication failed
    Jan  6 14:20:49.101: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.
    WAP>319c
    Jan  6 14:20:49.105: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:20:49.141: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:20:49.141: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:20:49.141: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    WAP>
    Jan  6 14:21:03.649: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 0023.142b.319c
    Jan  6 14:21:03.649: dot11_auth_dot1x_send_response_to_server: Sending client 0023.142b.319c data to server
    Jan  6 14:21:03.649: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jan  6 14:21:03.649: RADIUS/ENCODE(00001478):Orig. component type = DOT11
    Jan  6 14:21:03.649: RADIUS:  AAA Unsupported Attr: ssid              [347] 8
    Jan  6 14:21:03.649: RADIUS:
    WAP>   50 48 41 4E 54 4F            [ PHANTO]
    Jan  6 14:21:03.649: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    Jan  6 14:21:03.649: RADIUS:  AAA Unsupported Attr: interface         [222] 4
    Jan  6 14:21:03.649: RADIUS:   31 36                [ 16]
    Jan  6 14:21:03.649: RADIUS(00001478): Config NAS IP: 192.168.0.222
    Jan  6 14:21:03.649: RADIUS(00001478): Config NAS IPv6:
    Jan  6 14:21:03.649: RADIUS/ENCODE(00001478): acct_session_id: 5230
    Jan  6 14:21:03.649: RADIUS(00001478): Config NA
    WAP>S IP: 192.168.0.222
    Jan  6 14:21:03.649: RADIUS(00001478): sending
    Jan  6 14:21:03.649: RADIUS(00001478): Send Access-Request to 192.168.0.19:1645 id 1645/71, len 187
    Jan  6 14:21:03.649: RADIUS:  authenticator D5 2A B3 D5 B2 29 56 EC - 29 FB 47 F1 5C F1 10 0B
    Jan  6 14:21:03.649: RADIUS:  User-Name           [1]   25  "domain\user"
    Jan  6 14:21:03.649: RADIUS:  Framed-MTU          [12]  6   1400
    Jan  6 14:21:03.649: RADIUS:  Called-Station-Id   [30]  28  "34-A8-4E-B
    WAP>D-F3-50:PHANTOM5"
    Jan  6 14:21:03.649: RADIUS:  Calling-Station-Id  [31]  16  "0023.142b.319c"
    Jan  6 14:21:03.649: RADIUS:  Service-Type        [6]   6   Login                     [1]
    Jan  6 14:21:03.649: RADIUS:  Message-Authenticato[80]  18
    Jan  6 14:21:03.649: RADIUS:   CD CF 69 D6 E4 E5 B3 6E F5 1F 5B 78 E4 49 D1 61            [ in[xIa]
    Jan  6 14:21:03.649: RADIUS:  EAP-Message         [79]  30
    Jan  6 14:21:03.649: RADIUS:   02 02 00 1C 01 65 78 71 75 61 64 72 75 6D 5C 61 64 6D 69 6E 69  [ex
    WAP>quadrum\admini]
    Jan  6 14:21:03.649: RADIUS:   73 74 72 61 74 6F 72           [ strator]
    Jan  6 14:21:03.649: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jan  6 14:21:03.649: RADIUS:  NAS-Port            [5]   6   1611
    Jan  6 14:21:03.649: RADIUS:  NAS-Port-Id         [87]  6   "1611"
    Jan  6 14:21:03.649: RADIUS:  NAS-IP-Address      [4]   6   192.168.0.222
    Jan  6 14:21:03.649: RADIUS:  Nas-Identifier      [32]  14  "WAP"
    Jan  6 1
    WAP>4:21:03.649: RADIUS(00001478): Sending a IPv4 Radius Packet
    Jan  6 14:21:03.649: RADIUS(00001478): Started 5 sec timeout
    Jan  6 14:21:03.649: RADIUS: Received from id 1645/71 192.168.0.19:1645, Access-Accept, len 66
    Jan  6 14:21:03.649: RADIUS:  authenticator D1 A3 D7 6C DC 7E C6 D1 - A2 DB 6E 13 94 F4 D3 AE
    Jan  6 14:21:03.649: RADIUS:  Class               [25]  46
    Jan  6 14:21:03.649: RADIUS:   B2 3D 09 FE 00 00 01 37 00 01 02 00 C0 A8 00 13 00 00 00 00 5D 7B 6B 09 AC 82 24 A3 01 CE FC 72 A7 8E 51
    WAP> DC 00 00 00 00 00 00 02 65         [ =7]{k$rQe]
    Jan  6 14:21:03.653: RADIUS(00001478): Received from id 1645/71
    Jan  6 14:21:03.653: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0023.142b.319c
    Jan  6 14:21:03.653: dot11_auth_dot1x_send_client_fail: Authentication failed for 0023.142b.319c
    Jan  6 14:21:03.653: %DOT11-7-AUTH_FAILED: Station 0023.142b.319c Authentication failed
    WAP>
    Jan  6 14:21:13.881: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:13.881: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:13.897: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:21:13.897: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:13.897: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.
    WAP>319c timer started for 30 seconds
    Jan  6 14:21:14.629: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:14.629: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:14.645: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:21:14.645: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:14.645: dot11_auth_dot1x_send_id
    WAP>_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:14.653: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 0023.142b.319c
    Jan  6 14:21:14.653: dot11_auth_dot1x_send_response_to_server: Sending client 0023.142b.319c data to server
    Jan  6 14:21:14.653: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jan  6 14:21:14.653: RADIUS/ENCODE(0000147A):Orig. component type = DOT11
    Jan  6 14:21:14.653: RADIUS:  AAA Unsupporte
    WAP>d Attr: ssid              [347] 8
    Jan  6 14:21:14.657: RADIUS:   50 48 41 4E 54 4F            [ PHANTO]
    Jan  6 14:21:14.657: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    Jan  6 14:21:14.657: RADIUS:  AAA Unsupported Attr: interface         [222] 4
    Jan  6 14:21:14.657: RADIUS:   31 36                [ 16]
    Jan  6 14:21:14.657: RADIUS(0000147A): Config NAS IP: 192.168.0.222
    Jan  6 14:21:14.657: RADIUS(0000147A): Config NAS IPv6:
    Jan  6 14:21:14.657: RADIUS/ENCODE(0000147A): acct_
    WAP>session_id: 5232
    Jan  6 14:21:14.657: RADIUS(0000147A): Config NAS IP: 192.168.0.222
    Jan  6 14:21:14.657: RADIUS(0000147A): sending
    Jan  6 14:21:14.657: RADIUS(0000147A): Send Access-Request to 192.168.0.19:1645 id 1645/72, len 151
    Jan  6 14:21:14.657: RADIUS:  authenticator 75 D4 9B 2B 54 28 E0 85 - E1 CE 15 71 98 01 6D 92
    Jan  6 14:21:14.657: RADIUS:  User-Name           [1]   7   "Brian"
    Jan  6 14:21:14.657: RADIUS:  Framed-MTU          [12]  6   1400
    Jan  6 14:21:14.657: RA
    WAP>DIUS:  Called-Station-Id   [30]  28  "34-A8-4E-BD-F3-50:PHANTOM5"
    Jan  6 14:21:14.657: RADIUS:  Calling-Station-Id  [31]  16  "0023.142b.319c"
    Jan  6 14:21:14.657: RADIUS:  Service-Type        [6]   6   Login                     [1]
    Jan  6 14:21:14.657: RADIUS:  Message-Authenticato[80]  18
    Jan  6 14:21:14.657: RADIUS:   5E FF D3 31 9E E4 E8 B0 74 65 DA 64 E3 DC 75 53           [ ^1teduS]
    Jan  6 14:21:14.657: RADIUS:  EAP-Message         [79]  12
    Jan  6 14:21:14.657: RADIUS:   02 02 00 0A 01 42 7
    WAP>2 69 61 6E             [ Brian]
    Jan  6 14:21:14.657: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jan  6 14:21:14.657: RADIUS:  NAS-Port            [5]   6   1613
    Jan  6 14:21:14.657: RADIUS:  NAS-Port-Id         [87]  6   "1613"
    Jan  6 14:21:14.657: RADIUS:  NAS-IP-Address      [4]   6   192.168.0.222
    Jan  6 14:21:14.657: RADIUS:  Nas-Identifier      [32]  14  "WAP"
    Jan  6 14:21:14.657: RADIUS(0000147A): Sending a IPv4 Radius Packe
    WAP>t
    Jan  6 14:21:14.657: RADIUS(0000147A): Started 5 sec timeout
    Jan  6 14:21:14.657: RADIUS: Received from id 1645/72 192.168.0.19:1645, Access-Accept, len 66
    Jan  6 14:21:14.657: RADIUS:  authenticator F1 9F 29 38 10 39 E1 0A - FD 73 87 03 D3 5D 34 02
    Jan  6 14:21:14.657: RADIUS:  Class               [25]  46
    Jan  6 14:21:14.657: RADIUS:   B2 3E 09 FF 00 00 01 37 00 01 02 00 C0 A8 00 13 00 00 00 00 5D 7B 6B 09 AC 82 24 A3 01 CE FC 72 A7 8E 51 DC 00 00 00 00 00 00 02 66         [ >7]{k$rQf]
    Jan  6 1
    WAP>4:21:14.657: RADIUS(0000147A): Received from id 1645/72
    Jan  6 14:21:14.657: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0023.142b.319c
    Jan  6 14:21:14.657: dot11_auth_dot1x_send_client_fail: Authentication failed for 0023.142b.319c
    Jan  6 14:21:14.657: %DOT11-7-AUTH_FAILED: Station 0023.142b.319c Authentication failed
    Jan  6 14:21:14.877: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:14.877: dot11_auth_dot1x_send_id_req_to
    WAP>_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:14.889: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:21:14.889: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:14.889: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:14.897: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 0023.142b.319c
    Jan  6 14:21:
    WAP>14.897: dot11_auth_dot1x_send_response_to_server: Sending client 0023.142b.319c data to server
    Jan  6 14:21:14.897: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jan  6 14:21:14.897: RADIUS/ENCODE(0000147B):Orig. component type = DOT11
    Jan  6 14:21:14.897: RADIUS:  AAA Unsupported Attr: ssid              [347] 8
    Jan  6 14:21:14.897: RADIUS:   50 48 41 4E 54 4F            [ PHANTO]
    Jan  6 14:21:14.897: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    WAP>Jan  6 14:21:14.897: RADIUS:  AAA Unsupported Attr: interface         [222] 4
    Jan  6 14:21:14.897: RADIUS:   31 36                [ 16]
    Jan  6 14:21:14.897: RADIUS(0000147B): Config NAS IP: 192.168.0.222
    Jan  6 14:21:14.897: RADIUS(0000147B): Config NAS IPv6:
    Jan  6 14:21:14.897: RADIUS/ENCODE(0000147B): acct_session_id: 5233
    Jan  6 14:21:14.897: RADIUS(0000147B): Config NAS IP: 192.168.0.222
    Jan  6 14:21:14.897: RADIUS(0000147B): sending
    Jan  6 14:21:14.897: RADIUS(0000147B): Send Access-Reques
    WAP>t to 192.168.0.19:1645 id 1645/73, len 151
    Jan  6 14:21:14.897: RADIUS:  authenticator 78 C3 13 8A 04 95 E5 FF - 75 6B 15 A8 A3 04 8E 8B
    Jan  6 14:21:14.897: RADIUS:  User-Name           [1]   7   "Brian"
    Jan  6 14:21:14.897: RADIUS:  Framed-MTU          [12]  6   1400
    Jan  6 14:21:14.897: RADIUS:  Called-Station-Id   [30]  28  "34-A8-4E-BD-F3-50:PHANTOM5"
    Jan  6 14:21:14.897: RADIUS:  Calling-Station-Id  [31]  16  "0023.142b.319c"
    Jan  6 14:21:14.897: RADIUS:  Service-Type
    WAP>   [6]   6   Login                     [1]
    Jan  6 14:21:14.897: RADIUS:  Message-Authenticato[80]  18
    Jan  6 14:21:14.897: RADIUS:   DA 6E C2 AD 8B 41 1C 2F 28 6A D9 2B 0A BD 8B 76           [ nA/(j+v]
    Jan  6 14:21:14.897: RADIUS:  EAP-Message         [79]  12
    Jan  6 14:21:14.897: RADIUS:   02 02 00 0A 01 42 72 69 61 6E             [ Brian]
    Jan  6 14:21:14.897: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jan  6 14:21:14.897: RADIUS:  NAS-Port            [5]   6   1614
    WAP>
    Jan  6 14:21:14.897: RADIUS:  NAS-Port-Id         [87]  6   "1614"
    Jan  6 14:21:14.897: RADIUS:  NAS-IP-Address      [4]   6   192.168.0.222
    Jan  6 14:21:14.897: RADIUS:  Nas-Identifier      [32]  14  "WAP"
    Jan  6 14:21:14.897: RADIUS(0000147B): Sending a IPv4 Radius Packet
    Jan  6 14:21:14.897: RADIUS(0000147B): Started 5 sec timeout
    Jan  6 14:21:14.901: RADIUS: Received from id 1645/73 192.168.0.19:1645, Access-Accept, len 66
    Jan  6 14:21:14.901: RADIUS:  a
    WAP>uthenticator 4A AA 91 09 C1 0C 05 25 - 59 17 27 0C 4C 1B 29 2D
    Jan  6 14:21:14.901: RADIUS:  Class               [25]  46
    Jan  6 14:21:14.901: RADIUS:   B2 3F 0A 00 00 00 01 37 00 01 02 00 C0 A8 00 13 00 00 00 00 5D 7B 6B 09 AC 82 24 A3 01 CE FC 72 A7 8E 51 DC 00 00 00 00 00 00 02 67         [ ?7]{k$rQg]
    Jan  6 14:21:14.901: RADIUS(0000147B): Received from id 1645/73
    Jan  6 14:21:14.901: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 0023.142b.319c
    Jan  6 14:21:14.901: dot1
    WAP>1_auth_dot1x_send_client_fail: Authentication failed for 0023.142b.319c
    Jan  6 14:21:25.129: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:25.129: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:25.149: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:21:25.149: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6
    WAP>14:21:25.149: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:25.881: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 0023.142b.319c
    Jan  6 14:21:25.881: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    Jan  6 14:21:25.897: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 0023.142b.319c
    Jan  6 14:21:25.897: dot11_auth_dot1x_send_id_req_to_client: Sending identity r
    WAP>equest to 0023.142b.319c
    Jan  6 14:21:25.897: dot11_auth_dot1x_send_id_req_to_client: Client 0023.142b.319c timer started for 30 seconds
    WAP>

    Hello Steve,
    May you help me?
    I have the same problem. I use NPS (2008R2) with EAP authentication type Microsoft Protected EAP (PEAP)
    ap#
    Jun 13 2014 09:09:54.626 UTC: AAA/BIND(000000CF): Bind i/f  
    Jun 13 2014 09:09:54.626 UTC: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
    Jun 13 2014 09:09:54.626 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:09:54.626 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:09:54.678 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:09:54.678 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b
    Jun 13 2014 09:09:54.678 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:09:54.678 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:09:54.722 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:09:54.722 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b
    Jun 13 2014 09:09:54.722 UTC: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server
    Jun 13 2014 09:09:54.722 UTC: AAA/AUTHEN/PPP (000000CF): Pick method list 'eap_methods1'
    Jun 13 2014 09:09:54.722 UTC: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jun 13 2014 09:09:54.722 UTC: RADIUS/ENCODE(000000CF):Orig. component type = DOT11
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  AAA Unsupported Attr: ssid              [347] 2   
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  AAA Unsupported Attr: interface         [222] 3   
    Jun 13 2014 09:09:54.722 UTC: RADIUS:   33                 [ 3]
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): Config NAS IP: 172.16.254.116
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): Config NAS IPv6:
    Jun 13 2014 09:09:54.722 UTC: RADIUS/ENCODE(000000CF): acct_session_id: 196
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): Config NAS IP: 172.16.254.116
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): sending
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): Send Access-Request to 172.16.0.32:1812 id 1645/31, len 176
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  authenticator ED 3E CB D4 84 55 33 F0 - 86 6C DF 99 16 BA EB AA
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  User-Name           [1]   28  "host/WM-WSUS-998.empresa.local"
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  Framed-MTU          [12]  6   1400                      
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  Called-Station-Id   [30]  22  "2C-3E-CF-0B-BF-60:1A"
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  Calling-Station-Id  [31]  16  "001e.58a2.ba4b"
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  Service-Type        [6]   6   Login                     [1]
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  Message-Authenticato[80]  18  
    Jun 13 2014 09:09:54.722 UTC: RADIUS:   59 93 3E 54 FB 36 B1 66 AB 37 0B 2C 1F F1 EC F6           [ Y>T6f7,]
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  EAP-Message         [79]  33  
    Jun 13 2014 09:09:54.722 UTC: RADIUS:   02 02 00 1F 01 68 6F 73 74 2F 57 4D 2D 57 53 55 53 2D 39 39 38  [host/WM-WSUS-998]
    Jun 13 2014 09:09:54.722 UTC: RADIUS:   2E 63 62 61 2E 6C 6F 63 61 6C        [ .empresa.local]
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  NAS-Port            [5]   6   300                       
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  NAS-Port-Id         [87]  5   "300"
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  NAS-IP-Address      [4]   6   172.16.254.116            
    Jun 13 2014 09:09:54.722 UTC: RADIUS:  Nas-Identifier      [32]  4   "ap"
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): Sending a IPv4 Radius Packet
    Jun 13 2014 09:09:54.722 UTC: RADIUS(000000CF): Started 5 sec timeout
    Jun 13 2014 09:09:54.726 UTC: RADIUS: Received from id 1645/31 172.16.0.32:1812, Access-Reject, len 44
    Jun 13 2014 09:09:54.726 UTC: RADIUS:  authenticator 47 24 C1 77 82 B3 F0 03 - 07 10 27 E8 AB 13 3C A5
    Jun 13 2014 09:09:54.726 UTC: RADIUS:  EAP-Message         [79]  6   
    Jun 13 2014 09:09:54.726 UTC: RADIUS:   04 02 00 04
    Jun 13 2014 09:09:54.726 UTC: RADIUS:  Message-Authenticato[80]  18  
    Jun 13 2014 09:09:54.726 UTC: RADIUS:   CB EA D6 A6 38 03 A3 26 6B 7C 32 FA 83 3C 49 0D           [ 8&k|2<I]
    Jun 13 2014 09:09:54.726 UTC: RADIUS(000000CF): Received from id 1645/31
    Jun 13 2014 09:09:54.726 UTC: RADIUS/DECODE: EAP-Message fragments, 4, total 4 bytes
    Jun 13 2014 09:09:54.726 UTC: dot11_auth_dot1x_parse_aaa_resp: Received server response: FAIL
    Jun 13 2014 09:09:54.726 UTC: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
    Jun 13 2014 09:09:54.726 UTC: Client 001e.58a2.ba4b failed: by EAP authentication server
    Jun 13 2014 09:09:54.726 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_FAIL) for 001e.58a2.ba4b
    Jun 13 2014 09:09:54.726 UTC: dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 001e.58a2.ba4b
    Jun 13 2014 09:09:54.726 UTC: dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds
    Jun 13 2014 09:09:54.726 UTC: dot11_auth_dot1x_send_client_fail: Authentication failed for 001e.58a2.ba4b
    Jun 13 2014 09:09:54.726 UTC: %DOT11-7-AUTH_FAILED: Station 001e.58a2.ba4b Authentication failed
    Jun 13 2014 09:09:55.654 UTC: AAA/BIND(000000D0): Bind i/f  
    Jun 13 2014 09:09:55.654 UTC: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
    Jun 13 2014 09:09:55.654 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:09:55.654 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:09:55.706 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:09:55.706 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b
    Jun 13 2014 09:09:55.710 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:09:55.710 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:09:55.750 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:09:55.750 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b
    Jun 13 2014 09:09:55.754 UTC: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server
    Jun 13 2014 09:09:55.754 UTC: AAA/AUTHEN/PPP (000000D0): Pick method list 'eap_methods1'
    Jun 13 2014 09:09:55.754 UTC: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jun 13 2014 09:09:55.754 UTC: RADIUS/ENCODE(000000D0):Orig. component type = DOT11
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  AAA Unsupported Attr: ssid              [347] 2   
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  AAA Unsupported Attr: interface         [222] 3   
    Jun 13 2014 09:09:55.754 UTC: RADIUS:   33                 [ 3]
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): Config NAS IP: 172.16.254.116
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): Config NAS IPv6:
    Jun 13 2014 09:09:55.754 UTC: RADIUS/ENCODE(000000D0): acct_session_id: 197
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): Config NAS IP: 172.16.254.116
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): sending
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): Send Access-Request to 172.16.0.32:1812 id 1645/32, len 158
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  authenticator F7 DD 10 96 F1 8E 11 29 - A2 FC 7A 8D B9 A0 D3 02
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  User-Name           [1]   19  "Empresa\Roberto.Carlos"
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  Framed-MTU          [12]  6   1400                      
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  Called-Station-Id   [30]  22  "2C-3E-CF-0B-BF-60:1A"
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  Calling-Station-Id  [31]  16  "001e.58a2.ba4b"
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  Service-Type        [6]   6   Login                     [1]
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  Message-Authenticato[80]  18  
    Jun 13 2014 09:09:55.754 UTC: RADIUS:   69 B6 AA D3 A4 FD 65 CF 65 31 50 A1 1E 05 77 0C            [ iee1Pw]
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  EAP-Message         [79]  24  
    Jun 13 2014 09:09:55.754 UTC: RADIUS:   02 02 00 16 01 43 42 41 5C 50 65 64 72 6F 2E 41 6C 6D 65 69 64  [Empresa\Roberto.Carlos]
    Jun 13 2014 09:09:55.754 UTC: RADIUS:   61                 [ a]
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  NAS-Port            [5]   6   301                       
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  NAS-Port-Id         [87]  5   "301"
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  NAS-IP-Address      [4]   6   172.16.254.116            
    Jun 13 2014 09:09:55.754 UTC: RADIUS:  Nas-Identifier      [32]  4   "ap"
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): Sending a IPv4 Radius Packet
    Jun 13 2014 09:09:55.754 UTC: RADIUS(000000D0): Started 5 sec timeout
    Jun 13 2014 09:09:55.758 UTC: RADIUS: Received from id 1645/32 172.16.0.32:1812, Access-Challenge, len 90
    Jun 13 2014 09:09:55.758 UTC: RADIUS:  authenticator 32 B7 0B BA 04 5D 6F C5 - B7 63 1A 6D CF 69 E7 50
    Jun 13 2014 09:09:55.758 UTC: RADIUS:  Session-Timeout     [27]  6   30                        
    Jun 13 2014 09:09:55.758 UTC: RADIUS:  EAP-Message         [79]  8   
    Jun 13 2014 09:09:55.758 UTC: RADIUS:   01 03 00 06 19 20                 [  ]
    Jun 13 2014 09:09:55.758 UTC: RADIUS:  State               [24]  38  
    Jun 13 2014 09:09:55.758 UTC: RADIUS:   1E 94 02 C3 00 00 01 37 00 01 02 00 AC 10 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 25 26 56 D2            [ 7 8?&V]
    Jun 13 2014 09:09:55.758 UTC: RADIUS:  Message-Authenticato[80]  18  
    Jun 13 2014 09:09:55.758 UTC: RADIUS:   9C A4 5C 09 68 3C 77 A4 1A 3A 73 6C CA A3 29 88          [ \h<w:sl)]
    Jun 13 2014 09:09:55.758 UTC: RADIUS(000000D0): Received from id 1645/32
    Jun 13 2014 09:09:55.758 UTC: RADIUS/DECODE: EAP-Message fragments, 6, total 6 bytes
    Jun 13 2014 09:09:55.758 UTC: dot11_auth_dot1x_parse_aaa_resp: Received server response: GET_CHALLENGE_RESPONSE
    Jun 13 2014 09:09:55.758 UTC: dot11_auth_dot1x_parse_aaa_resp: found session timeout 30 sec
    Jun 13 2014 09:09:55.758 UTC: dot11_auth_dot1x_parse_aaa_resp: found eap pak in server response
    Jun 13 2014 09:09:55.758 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,SERVER_REPLY) for 001e.58a2.ba4b
    Jun 13 2014 09:09:55.758 UTC: dot11_auth_dot1x_send_response_to_client: Forwarding server message to client 001e.58a2.ba4b
    Jun 13 2014 09:09:55.762 UTC: dot11_auth_dot1x_send_response_to_client: Started timer client_timeout 30 seconds
    Jun 13 2014 09:09:55.770 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:09:55.770 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,CLIENT_REPLY) for 001e.58a2.ba4b
    Jun 13 2014 09:09:55.770 UTC: dot11_auth_dot1x_send_response_to_server: Sending client 001e.58a2.ba4b data to server
    Jun 13 2014 09:09:55.770 UTC: AAA/AUTHEN/PPP (000000D0): Pick method list 'eap_methods1'
    Jun 13 2014 09:09:55.770 UTC: dot11_auth_dot1x_send_response_to_server: Started timer server_timeout 60 seconds
    Jun 13 2014 09:09:55.770 UTC: RADIUS/ENCODE(000000D0):Orig. component type = DOT11
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  AAA Unsupported Attr: ssid              [347] 2   
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  AAA Unsupported Attr: service-type      [345] 4   1
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  AAA Unsupported Attr: interface         [222] 3   
    Jun 13 2014 09:09:55.770 UTC: RADIUS:   33                 [ 3]
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): Config NAS IP: 172.16.254.116
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): Config NAS IPv6:
    Jun 13 2014 09:09:55.770 UTC: RADIUS/ENCODE(000000D0): acct_session_id: 197
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): Config NAS IP: 172.16.254.116
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): sending
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): Send Access-Request to 172.16.0.32:1812 id 1645/33, len 279
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  authenticator 9C D8 E3 47 46 9C A3 8F - BE 1E 5F AF 42 CA 3C 70
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  User-Name           [1]   19  "Empresa\Roberto.Carlos"
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  Framed-MTU          [12]  6   1400                      
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  Called-Station-Id   [30]  22  "2C-3E-CF-0B-BF-60:1A"
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  Calling-Station-Id  [31]  16  "001e.58a2.ba4b"
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  Service-Type        [6]   6   Login                     [1]
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  Message-Authenticato[80]  18  
    Jun 13 2014 09:09:55.770 UTC: RADIUS:   12 97 DB 9A 4E F2 6C 8A F2 69 FB 27 61 8D 95 9F             [ Nli'a]
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  EAP-Message         [79]  107
    Jun 13 2014 09:09:55.770 UTC: RADIUS:   02 03 00 69 19 80 00 00 00 5F 16 03 01 00 5A 01 00 00 56 03 01 53 9A E9 E5 2A 3B 9E C8 C1 69 42 EA C9 79 B6 2D 2B 4C 18 63 5D A3 DA B8 89 53  [i_ZVS*;iBy-+Lc]S]
    Jun 13 2014 09:09:55.770 UTC: RADIUS:   B8 8E C3 F7 79 03 00 00 18 00 2F 00 35 00 05 00 0A C0 13 C0 14 C0 09 C0 0A 00 32 00 38 00 13 00 04 01 00 00 15 FF 01 00 01 00 00 0A 00 06 00 04 00 17 00 18 00 0B 00 02 01 00             [ y/528]
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  NAS-Port-Type       [61]  6   802.11 wireless           [19]
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  NAS-Port            [5]   6   301                       
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  NAS-Port-Id         [87]  5   "301"
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  State               [24]  38  
    Jun 13 2014 09:09:55.770 UTC: RADIUS:   1E 94 02 C3 00 00 01 37 00 01 02 00 AC 10 00 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 25 26 56 D2            [ 7 8?&V]
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  NAS-IP-Address      [4]   6   172.16.254.116            
    Jun 13 2014 09:09:55.770 UTC: RADIUS:  Nas-Identifier      [32]  4   "ap"
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): Sending a IPv4 Radius Packet
    Jun 13 2014 09:09:55.770 UTC: RADIUS(000000D0): Started 5 sec timeout
    Jun 13 2014 09:10:00.766 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:10:00.766 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b
    Jun 13 2014 09:10:00.766 UTC: dot11_auth_dot1x_ignore_event: Ignore event: do nothing
    Jun 13 2014 09:10:00.794 UTC: RADIUS(000000D0): Request timed out
    Jun 13 2014 09:10:00.794 UTC: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/33
    Jun 13 2014 09:10:00.794 UTC: RADIUS(000000D0): Started 5 sec timeout
    Jun 13 2014 09:10:01.782 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:10:01.782 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b
    Jun 13 2014 09:10:01.782 UTC: dot11_auth_dot1x_ignore_event: Ignore event: do nothing
    Jun 13 2014 09:10:02.794 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:10:02.794 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(SERVER_WAIT,EAP_START) for 001e.58a2.ba4b
    Jun 13 2014 09:10:02.794 UTC: dot11_auth_dot1x_ignore_event: Ignore event: do nothing
    Jun 13 2014 09:10:04.690 UTC: AAA/BIND(000000D1): Bind i/f  
    Jun 13 2014 09:10:04.690 UTC: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
    Jun 13 2014 09:10:04.690 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:10:04.690 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:10:05.146 UTC: RADIUS(000000D0): Request timed out
    Jun 13 2014 09:10:05.146 UTC: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/33
    Jun 13 2014 09:10:05.146 UTC: RADIUS(000000D0): Started 5 sec timeout
    Jun 13 2014 09:10:05.874 UTC: AAA/BIND(000000D2): Bind i/f  
    Jun 13 2014 09:10:05.874 UTC: dot11_auth_dot1x_start: in the dot11_auth_dot1x_start
    Jun 13 2014 09:10:05.874 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:10:05.874 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:10:05.922 UTC: dot11_auth_parse_client_pak: Received EAPOL packet from 001e.58a2.ba4b
    Jun 13 2014 09:10:05.922 UTC: dot11_auth_dot1x_run_rfsm: Executing Action(CLIENT_WAIT,EAP_START) for 001e.58a2.ba4b
    Jun 13 2014 09:10:05.922 UTC: dot11_auth_dot1x_send_id_req_to_client: Sending identity request to 001e.58a2.ba4b
    Jun 13 2014 09:10:05.922 UTC: dot11_auth_dot1x_send_id_req_to_client: Client 001e.58a2.ba4b timer started for 30 seconds
    Jun 13 2014 09:10:09.818 UTC: RADIUS(000000D0): Request timed out
    Jun 13 2014 09:10:09.818 UTC: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/33
    Jun 13 2014 09:10:09.818 UTC: RADIUS(000000D0): Started 5 sec timeout
    Jun 13 2014 09:10:14.746 UTC: RADIUS(000000D0): Request timed out
    Jun 13 2014 09:10:14.746 UTC: RADIUS: Retransmit to (172.16.0.32:1812,1813) for id 1645/33
    Jun 13 2014 09:10:14.746 UTC: RADIUS(000000D0): Started 5 sec timeout
    Jun 13 2014 09:10:19.034 UTC: RADIUS(000000D0): Request timed out
    Jun 13 2014 09:10:19.034 UTC: RADIUS: Fail-over denied to  (172.16.0.32:1812,1813) for id 1645/33
    Jun 13 2014 09:10:19.034 UTC: RADIUS: No response from (172.16.0.32:1812,1813) for id 1645/33
    Jun 13 2014 09:10:19.034 UTC: RADIUS/DECODE: No response from radius-server; parse response; FAIL
    Jun 13 2014 09:10:19.034 UTC: RADIUS/DECODE: Case error(no response/ bad packet/ op decode);parse response; FAIL

  • Nokia E65 connected to a Aironet 1250

    Hello, I have problems to connect my Nokia E65 to the new Cisco Aironet 1250 (draft N). I have tested the same cell phone with a 1121 and it works properly, but I can't associate it with the new AP. What can I do to check if the cell phone is compatible with 1250 AP series?
    Thank you.

    Hi, I have configured properly the nokia E65 with WPA2-PSK + AES-CCMP and it works. Also I have configured some Nokia E51 and N95 and both are working well. But now I have another problems with the E65. When I try to transfer a call to the E65 the phone restarts automatically. It can make and receives call, but it cannot receive a transfer call. I have the updated to the last version and no changes. The E51 and N95 work perfectly and receive the call without any problem. Has anyone the same problem?
    Thank you.
    Best regards.

  • How can I disable 1142N from providing IPv6 access ?

    subject says it all, I failed to find the command in configuration..

    Hi Andre,
    As per my knowledge, you cant disable from ur AP.
    Ipv6 is currently not support on any of the Cisco AP's in autonomous mode. However, they will be able to pass ipv6 traffic.
    May be newer IOS version like : Cisco IOS Release 15.2(4)JA supports IPv6 protocols
    Regards

Maybe you are looking for

  • How can I set the language when sending an e-mail with attachment - 'Html'?

    "Character Broken" I made an ALV program, and this convert to "HTML',  and send an e-mail with this. Used Process is: DATA: gt_abaplist LIKE TABLE OF abaplist,       gt_html LIKE TABLE OF w3html,       doc_chng LIKE sodocchgi1,       objpack LIKE TAB

  • RC1 Task Manager - Users - Connect

    I am not able to connect to a user account from within Task Manager like I could in XP SP2. Step: Open task manager Select Users tab Select a different user currently running on machine Right-click and select connect Enter password. I get the error m

  • How to run a bulk turn on\turn off of the physical machines from UCS?

    Hi, all: I'm a newbie using UCS 2.0(1.x)  and would like to reset multiple servers in a single command instead that doing one by one? Regards, Alberto.

  • IPad 2 sound issues

    I seem to only have sound on my iPad 2 via headphones. I have tried turning it off completely (attached and detached to my charger); I've checked all volume options, including the mute switch, but to no avail. The only thing I have not yet tried is h

  • Data truncation with oracle.toplink.internal.databaseaccess.OraclePlatform

    Hello everyone I use Toplink 10g(9.0.4.5) with Oracle Lite database. I use the oracle.toplink.internal.databaseaccess.OraclePlatform and everything seems to be fine, except that when I pass a String more than the length defined in the Database, data