Cisco Bug: CSCvu80092 - 9800 - AireOS parity: RADIUS attribute  Message-Authenticator not included for AP authorization
Jul 21, 2020
- Cisco IOS
Known Affected Releases
17.3 17.3.1 Amsterdam-17.1.1 Amsterdam-17.2.1 Bengaluru-17.4.1 Gibraltar-16.10.1 Gibraltar-16.11.1 Gibraltar-16.12.1
Symptom: 9800 controllers do not include the RADIUS attribute  Message-Authenticator when preforming AP's MAC authorization with an external RADIUS server. Conditions: When configuring the 9800 WLC for AP's MAC authorization with an external RADIUS server, in the RADIUS access-request the 9800 does not include the attribute  Message-Authenticator. This attribute is not mandatory, but often used for integrity checks. AireOS is sending it by default. Customers migrating from AireOS to IOS-XE might experience AP authorization failing because of checks on the Message-Authenticator attribute on the RADIUS server side.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases