Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Community Member

EAP Authentication fails with Windows 2000 clients!!!

Here is the debug log from my 350AP when a Windows 2000 client tries to do EAP-TLS authentication. I've installed the 802.1x hotfix and have installed a user certificate. Thanks

1 day, 02:13:33 (Info): Station [Windows2K#1]000bfd63b771 Associated

RADIUS: Sending EAP-Request/Identity(id=15) packet to client Windows2K#1

EAP: Received EAPOL-Start from client Windows2K#1

RADIUS: Sending EAP-Request/Identity(id=16) packet to client Windows2K#1

EAP: Received EAP-Response/Identity(id=16) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Sending EAP-Request/EAP-TLS(id=17) packet to client Windows2K#1

EAP: Received EAP-Response/EAP-TLS(id=17) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 133

RADIUS: Sending EAP-code=104/type=116(id=111) packet to client Windows2K#1

EAP: Received EAP-Response/EAP-TLS(id=18) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 133

RADIUS: Sending EAP-code=111/type=26(id=119) packet to client Windows2K#1

EAP: Received EAP-Response/EAP-TLS(id=19) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 136

RADIUS: Sending EAP-code=103/type=114(id=110) packet to client Windows2K#1

EAP: Received EAPOL-Start from client Windows2K#1

RADIUS: Sending EAP-Request/Identity(id=21) packet to client Windows2K#1

EAP: Received EAP-Response/Identity(id=21) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Sending EAP-Request/EAP-TLS(id=22) packet to client Windows2K#1

EAP: Received EAP-Response/EAP-TLS(id=22) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 133

RADIUS: Sending EAP-code=104/type=116(id=111) packet to client Windows2K#1

EAP: Received EAP-Response/EAP-TLS(id=23) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 133

RADIUS: Sending EAP-code=111/type=26(id=119) packet to client Windows2K#1

EAP: Received EAP-Response/EAP-TLS(id=24) packet from client Windows2K#1

EAP: Forwarding packet to RADIUS server

RADIUS: Received packet for client Windows2K#1

RADIUS: Received Challenge Request

RADIUS: Server's state attribute was saved

RADIUS: Received session timeout request of 30 seconds

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 255

RADIUS: Appending EAP attribute value of length 136

RADIUS: Sending EAP-code=103/type=114(id=110) packet to client Windows2K#1

Session-timeout for station 000bfd63b771

1 day, 02:14:34 (Warning): EAP retry limit reached for Station [Windows2K#1]000b

fd63b771

1 day, 02:14:34 (Info): Deauthenticating [Windows2K#1]000bfd63b771, reason "Prev

ious Authentication No Longer Valid"

It would seem that it is trying a couple of times and then failing. Yet, my setup works fine on a WXP machine. Thanks

3 REPLIES
Cisco Employee

Re: EAP Authentication fails with Windows 2000 clients!!!

What version ACU NDIS and firmware on the win 2k client ?

Community Member

Re: EAP Authentication fails with Windows 2000 clients!!!

The ACU is 6.00.23. Thanks

Cisco Employee

Re: EAP Authentication fails with Windows 2000 clients!!!

Jason what about NDIS and firmware versions???

184
Views
0
Helpful
3
Replies
CreatePlease to create content