Got it

[Troubleshooting Series] Case 16 STAs Fail to Associate with a WLAN (802.1X Authentication)

Latest reply: Jan 20, 2022 17:08:24 1167 2 1 0 0

STAs Fail to Associate with a WLAN (802.1X Authentication)

Network Topology

Physical Network Topology

Figure 1-1 Network where STAs fail to associate with a WLAN (802.1X Authentication)

085932vennt8te17ex4xta.png

 

Fault Description

STAs fail to associate with the SSID figo, and an error message indicating Authorization data error is reported.

Configuration File


 http secure-server ssl-policy default_policy
 http server enable
authentication-profile name figo
 dot1x-access-profile figo
 authentication-scheme figo
 accounting-scheme figo
 radius-server figo
#
radius-server template default
radius-server template radius
radius-server template figo
 radius-server authentication 10.220.7.129 1812 weight 80
 radius-server accounting 10.220.7.129 1813 weight 80
#
interface Vlanif220
 ip address 10.220.7.26 255.255.254.0
#
interface GigabitEthernet0/0/1
 port link-type trunk
 port trunk pvid vlan 220
 undo port trunk allow-pass vlan 1
 port trunk allow-pass vlan 95 220
#
ip route-static 0.0.0.0 0.0.0.0 10.220.6.1
#
capwap source interface vlanif95
capwap echo interval 20
#
wlan
 ac protect enable protect-ac 192.168.95.2 priority 2
 traffic-profile name default
 security-profile name HR
 security-profile name NOC
  security wpa2 psk pass-phrase %^%#R/`*<=`b9&q*IE3~RMl+]o4`U"S8d6M#}^@`mdCM%^%# aes
 security-profile name TAC
  security wpa-wpa2 psk pass-phrase %^%#amhD<!7|CH~q=NPoQCwMy@{3%M[c8(5t[A+-b,w"%^%# aes
 security-profile name figo
  security wpa2 dot1x aes
#
device-profile profile-name @default_device_profile
 device-type default_type_phone
 enable
 rule 0 user-agent sub-match Android
 rule 1 user-agent sub-match iPhone
 rule 2 user-agent sub-match iPad
 if-match rule 0 or rule 1 or rule 2
#
dot1x-access-profile name dot1x_access_profile
dot1x-access-profile name figo
#
mac-access-profile name mac_access_profile
mac-access-profile name test
mac-access-profile name HR
 mac-authen username macaddress format with-hyphen password cipher %^%#PbW@=jkQFP.wN\L+a)1NyU}F+,%o/;wOX&T`5V}U%^%#
mac-access-profile name figo
#

Troubleshooting Location


Step 1      Check the authentication profile in the VAP profile.

Run the display current-configuration to check the authentication profile in the VAP profile mapping the SSID figo, and check the authentication mode in the authentication profile.

#
wlan
 vap-profile name figo
   forward-mode tunnel
   service-vlan vlan-id 201
   ssid-profile figo
   security-profile figo
   authentication-profile figo
#
authentication-profile name figo
 dot1x-access-profile figo
 authentication-scheme figo
 accounting-scheme figo
 radius-server figo

As a result, wo can find the authentication mode is 802.1X authentication. Based on the displayed authentication mode (802.1X authentication), search the product documentation for the configuration example: Example for Configuring 802.1X Authentication (AAA in RADIUS Mode).


Step 2      Check the reason for a STA's failure to go online.

Run the display station online-fail-record command to displays STA online failure records.

<R1U38-AC6005> display station online-fail-record sta-mac 5068-0a10-46f6
Rf/WLAN: Radio ID/WLAN ID
------------------------------------------------------------------------------
STA MAC         AP ID Ap name  Rf/WLAN    Last record time
                Reason
------------------------------------------------------------------------------
5068-0a10-46f6  1     d4c8-b02b-5220 0/1  2018-01-09/04:42:56
                Authorization data error
                0     d4c8-b02b-5b80 0/1  2018-01-09/01:02:52
                Authorization data error
------------------------------------------------------------------------------
Total stations: 1 Total records: 2

                               Step 3      Trace the STA that failed to go online.

Enable the trace-aaa test to test the connectivity to the RADIUS server, and run the trace object command to trace the STA that failed to go online.

[R1U38-AC6005] trace enable
[R1U38-AC6005] trace object mac-address 5068-0a10-46f6

085959kein7izxx7wxn4sa.png


According to trace information, the authentication data verification error is caused by the authorization VLAN 10 delivered by the server.

Solution: Create VLAN 10 on the AC.

[R1U38-AC6005] vlan batch 10
[R1U38-AC6005] interface Vlanif10
[R1U38-AC6005-Vlanif10] ip address 192.168.10.1 255.255.255.0
[R1U38-AC6005-Vlanif10] dhcp select interface

Associate the STA with the SSID again and check the status of the STA.

<R1U38-AC6005> display access-user
 ----------------------------------------------------------------------------------------
 UserID Username                       IP address                MAC            Status 
 ----------------------------------------------------------------------------------------
 255    figo                           192.168.10.199            5068-0a10-46f6 Success
 ----------------------------------------------------------------------------------------
 Total: 1, printed: 1

The STA is online on the AC, and the fault is rectified. Disable the trace function on the AC.

[R1U38-AC6005] undo trace enable
[R1U38-AC6005] undo trace object all


Root Cause

The authorization VLAN 10 is configured on the RADIUS server, but VLAN 10 is not configured on the AC. As a result, the AC fails to verify the authorization VLAN delivered by the RADIUS server. Authentication fails, and STAs fail to associate with the WLAN.


hi author , good example
we can use trace information get the error and get the root cause .
The authorization VLAN 10 is configured on the RADIUS server, but VLAN 10 is not configured on the AC. As a result, the AC fails to verify the authorization VLAN delivered by the RADIUS server. Authentication fails, and STAs fail to associate with the WLAN.
View more
  • x
  • convention:

Thanks, its very helpful
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.