<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: C4110-2 wrong role applied to wifi users in ExtremeWireless (General)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36878#M1807</link>
    <description>Sometimes Windows Servers do not log failed RADIUS login attempts, only successful logins.  To confirm, in a dos prompt CLI on the RADIUS Server, you may need to verify RADIUS failure are being logged with command:&lt;BR /&gt;
&lt;BR /&gt;
==========================================================&lt;BR /&gt;
c:\ auditpol /get /subcategory:"Network Policy Server"&lt;BR /&gt;
System audit policy&lt;BR /&gt;
 Category/Subcategory                      Setting&lt;BR /&gt;
 Logon/Logoff&lt;BR /&gt;
   Network Policy Server                  &lt;B&gt; Success&lt;/B&gt;&lt;BR /&gt;
c:\&lt;BR /&gt;
==========================================================&lt;BR /&gt;
&lt;BR /&gt;
If the output shows Network Policy Server showing "Success and Failure" it's enabled, but if it only shows "Success" like the example above you will need to use the following syntax to enable failure logging:&lt;BR /&gt;
&lt;BR /&gt;
auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable&lt;BR /&gt;
&lt;BR /&gt;
Ryan</description>
    <pubDate>Fri, 05 May 2017 00:59:00 GMT</pubDate>
    <dc:creator>Careno__Ryan</dc:creator>
    <dc:date>2017-05-05T00:59:00Z</dc:date>
    <item>
      <title>C4110-2 wrong role applied to wifi users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36874#M1803</link>
      <description>Hi everyone,&lt;BR /&gt;
&lt;BR /&gt;
We have a problem, which one appears randomly and we have many diffulcuties to identify the origin and how to resolve it.&lt;BR /&gt;
&lt;BR /&gt;
Here is the authentication chain:&lt;BR /&gt;
&lt;BR /&gt;
Client request to authenticate &amp;gt; Access point &amp;gt; C4110-2 Controller &amp;gt; RADIUS Server &amp;gt; Active Directory *here parsing to find user and access right related to him* after that it does the same reverse path.&lt;BR /&gt;
&lt;BR /&gt;
The problem here is the role applied to the client. Normally a specific role related to the client is setted after finding a match in AD. But in our situation the client take the "Default" role we made which deny all traffic.&lt;BR /&gt;
&lt;BR /&gt;
You'll find in attachement a screenshot related to the role:&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="e5101f4d37e94563aa0057340f5361c7_RackMultipart20170504-118520-1tfld8m-Clients_wrong_role_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/133iE7D67230409B0696/image-size/large?v=v2&amp;amp;px=999" role="button" title="e5101f4d37e94563aa0057340f5361c7_RackMultipart20170504-118520-1tfld8m-Clients_wrong_role_inline.png" alt="e5101f4d37e94563aa0057340f5361c7_RackMultipart20170504-118520-1tfld8m-Clients_wrong_role_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
The network has an open SSID and connectable by WPA2-Enterprise (EAP-PEAP)&lt;BR /&gt;
I can affirm it's linked to authentication because I try with a "test" network setup with WPA2-Personnal (with PSK) and it works perfectly.&lt;BR /&gt;
&lt;BR /&gt;
We also thought of a VPN tunnel problem between sites but we have the same case in a site direclty connected by MAN network.&lt;BR /&gt;
&lt;BR /&gt;
We check the logs: we can see the client PC trying to connect but didn't take an IP and the good Role (always the "Default"). We have no logs on RADIUS server.&lt;BR /&gt;
&lt;BR /&gt;
Last information, on those sites the same network had been working for years and we had this case on different types of AP (2610, 3825i). Controller is a C4110-2 running the software version 09.21.14.0005&lt;BR /&gt;
&lt;BR /&gt;
Please help me !!&lt;BR /&gt;
&lt;BR /&gt;
Thibault R.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 04 May 2017 14:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36874#M1803</guid>
      <dc:creator>Thibault_Rochet</dc:creator>
      <dc:date>2017-05-04T14:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: C4110-2 wrong role applied to wifi users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36875#M1804</link>
      <description>Hi Thibault,&lt;BR /&gt;
&lt;BR /&gt;
If you're not seeing any logs in your RADIUS server, it means that the RADIUS request is not making it to the RADIUS server at all. I would take a trace from your controller to see if it's leaving the controller destined to the radius server.&lt;BR /&gt;
&lt;BR /&gt;
It's not necessarily an answer, but it's the next step I would take towards troubleshooting.&lt;BR /&gt;
&lt;BR /&gt;
Tyler</description>
      <pubDate>Thu, 04 May 2017 18:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36875#M1804</guid>
      <dc:creator>TylerMarcotte</dc:creator>
      <dc:date>2017-05-04T18:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: C4110-2 wrong role applied to wifi users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36876#M1805</link>
      <description>On the client side, does it show that client connected at all? If it could not make to the radius , from the client perspective you should see something like 'Unable to connect' or similar (depends on the OS).   When client passes 'dot1X' stage, it concidered as 'port open now', the next step - to obtain IP.</description>
      <pubDate>Thu, 04 May 2017 20:07:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36876#M1805</guid>
      <dc:creator>Ostrovsky__Yury</dc:creator>
      <dc:date>2017-05-04T20:07:00Z</dc:date>
    </item>
    <item>
      <title>RE: C4110-2 wrong role applied to wifi users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36877#M1806</link>
      <description>Check the controller "station event" log = GUI &amp;gt; Logs &amp;gt; EWC: Station Events&lt;BR /&gt;
In the upper right field put in the MAC of the client and please provide a screenshot for us.&lt;BR /&gt;
&lt;BR /&gt;
Also check the RADIUS server log for the authentication events.</description>
      <pubDate>Thu, 04 May 2017 23:53:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36877#M1806</guid>
      <dc:creator>Ronald_Dvorak</dc:creator>
      <dc:date>2017-05-04T23:53:00Z</dc:date>
    </item>
    <item>
      <title>RE: C4110-2 wrong role applied to wifi users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36878#M1807</link>
      <description>Sometimes Windows Servers do not log failed RADIUS login attempts, only successful logins.  To confirm, in a dos prompt CLI on the RADIUS Server, you may need to verify RADIUS failure are being logged with command:&lt;BR /&gt;
&lt;BR /&gt;
==========================================================&lt;BR /&gt;
c:\ auditpol /get /subcategory:"Network Policy Server"&lt;BR /&gt;
System audit policy&lt;BR /&gt;
 Category/Subcategory                      Setting&lt;BR /&gt;
 Logon/Logoff&lt;BR /&gt;
   Network Policy Server                  &lt;B&gt; Success&lt;/B&gt;&lt;BR /&gt;
c:\&lt;BR /&gt;
==========================================================&lt;BR /&gt;
&lt;BR /&gt;
If the output shows Network Policy Server showing "Success and Failure" it's enabled, but if it only shows "Success" like the example above you will need to use the following syntax to enable failure logging:&lt;BR /&gt;
&lt;BR /&gt;
auditpol /set /subcategory:"Network Policy Server" /success:enable /failure:enable&lt;BR /&gt;
&lt;BR /&gt;
Ryan</description>
      <pubDate>Fri, 05 May 2017 00:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-general/c4110-2-wrong-role-applied-to-wifi-users/m-p/36878#M1807</guid>
      <dc:creator>Careno__Ryan</dc:creator>
      <dc:date>2017-05-05T00:59:00Z</dc:date>
    </item>
  </channel>
</rss>

