Went back onsite yesterday to troubleshoot this with 2 guys walking the space, me doing air capture using Kali linux with an Alfa AWUS036CH high gain wifi NIC adapter listening/sniffing on channel 44 homed to a specific AP. And we did this along with both Cisco and Portnox on the phone. We actually could no longer reproduce the issue. Cisco performed the following captures to make sure that the RADIUS packets are making all the through from the remote site via the SD-WAN IPSEC tunnel/over the internet to our headend in our data center where the Portnox auth caching server sits:
- packet capture on the LAN interface of the remote network Meraki MX84
- packet capture on the SD-WAN virtual interface of the remote network Meraki MX84
- packet capture on the SD-WAN virtual interface of the headend network Meraki MX450 active node
All Radius packets accounted for. This is why I asking what type of packet captures were performed. We did captures at 4 different points.
Using the air capture of 802.11 packets via Kali Linux, I saw all 4 802.1X packets during authentication.
Conclusion of the underlying problems at this remote site that caused 802.1X issues were:
- co-channel sharing when originally using 80MHz channel width among 9 different AP units.
- serious wifi interference caused by this location next to residential area, had to turn on DFS channels for AP's to self adjust into those channels.
- client balancing was turned on, caused proactive rejection of client re-association requests
- 802.11r had to be turned off, Portnox' NAC solution is not so ready to work with 802.11r yet