无线认证请求过多造成WLC-Radius拥堵崩溃现象就及解决方法

Logging现象:

RADIUS server 10.200.1.X:1812 deactivated on WLAN 1

RADIUS auth-server 10.200.1.X:1812 unavailable

RADIUS auth-server 10.200.1.X:1812 available

RADIUS server 10.200.1.X:1812 activated on WLAN 1

……

RADIUS server 10.200.1.X:1812 activated on WLAN 1

RADIUS server 10.200.1.X:1812 deactivated on WLAN 1

RADIUS auth-server 10.200.1.X:1812 unavailable

RADIUS server 10.200.1.X:1812 failed to respond to request

RADIUS auth-server 10.200.1.X:1812 available

RADIUS server 10.200.1.X:1812 activated on WLAN 1

RADIUS server 10.200.1.X:1812 deactivated on WLAN 1

RADIUS auth-server 10.200.1.X:1812 unavailable

RADIUS server 10.200.1.103:1812 failed to respond to request

RADIUS auth-server 10.200.1.103:1812 available

RADIUS server 10.200.1.X:1812 activated on WLAN 1

RADIUS server 10.200.1.X:1812 deactivated on WLAN 1

RADIUS auth-server 10.200.1.X:1812 unavailable

RADIUS server 10.200.1.X:1812 failed to respond to request

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

AAA Authentication Failure for UserName:xxxxxx\sap_pm User Type: WLAN USER

……<<<<大量重复出现traps logs;

*Dot1x_NW_MsgTask_2:  18:15:30.003: #DOT1X-3-INVALID_WPA_KEY_MSG_STATE: 1x_eapkey.c:861 Received invalid EAPOL-key M2 msg in START  state - invalid secure bit; KeyLen 40, Key type 1, client 28:b2:bd:b7:01:42  <<<<大量重复出现Message Logs;

235934jg85wgk4llpr7nk7.png

Look for:

  • High Retry: First Request ratio (should be no more than 10%)

  • High Reject: Accept ratio

  • High Timeout: First Request ratio (should be no more than 5%)

解决方法:

·      "Excessive 802.1X Authentication Failures" is selected in the WLC's global Client Exclusion Policies.

·         Client exclusion is enabled in the WLAN's advanced settings.

·         Client exclusion timeout is set to at least 120 seconds.60 to 300 seconds

235755hcfr9wzfu77w7bga.png

235807s88ufa1iuf58e38l.png

000507pl5xfjfy74hyy5yc.png

000644f11f3c8mr8w2088w.png

④ Disable Aggressive Failover, which does not allow a single misbehaving supplicant to cause the WLC to fail between the RADIUS servers.

  Use the CLI command:  “config radius aggressive-failover disable”

To see the current state, use:  “show radius summary”

and look for the line "Aggressive Failover" near the top of the output. There is no GUI option for this setting.

Configure Fast Secure Roaming for your clients.


·         Make sure that Microsoft Windows EAP clients use Wi-Fi Protected Access 2 (WPA2)/Advanced Encryption Standard (AES) so they can use Opportunistic Key Caching (OKC).

·         If you can segregate Apple iOS clients to their own WLAN, then you can enable 802.11r on that WLAN.

·         Enable Cisco Centralized Key Management (CCKM) for any WLAN that supports 792x phones (but do not enable CCKM on any Service Set Identifier (SSID) that supports Microsoft Windows or Android clients, because they tend to have problematic CCKM implementations).

·         Enable Sticky Key Caching (SKC) for any EAP WLAN that supports the Macintosh Operating System (MAC OS) X and/or Android clients.
Refer to 
802.11 WLAN Roaming and Fast-Secure Roaming on CUWN for more information.                  http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/116493-technote-technology-00.html

Note:  Monitor your WLC Pairwise Master Key (PMK) cache usage at peak times with the show pmk-cache all command. If you reach your maximum PMK-cache size, or get close to it, then you will probably have to disable SKC.

 

参考链接:

https://supportforums.cisco.com/discussion/11702421/getting-disconnected-randomly-5508-controller-3300-series-laps

http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/118703-technote-wlc-00.html

https://supportforums.cisco.com/discussion/11827081/radius-server-failed-respond-request 


转载自小伙伴鱼排饭的博客











本文转自Grodd51CTO博客,原文链接:http://blog.51cto.com/juispan/2066738,如需转载请自行联系原作者

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值