<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Radius Authentication failure in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120547#M17107</link>
    <description>&lt;P&gt;My guess is the length of the packet reported by the IP headers versus the actual length are...somehow different.&lt;BR /&gt;Which suggests the packet is getting corrupted somehow in transit, or the Meraki is sending a corrupted packet.&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jun 2021 22:20:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-06-07T22:20:56Z</dc:date>
    <item>
      <title>Radius Authentication failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120416#M17071</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;we have an issue on one of our DC gateways where 1812 traffic is being dropped with below error.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF9900"&gt;;[cpu_7];[fw4_0];fw_log_drop_ex: Packet proto=17 172.20.96.205:48118 -&amp;gt; 10.129.0.30:1812 dropped by asm_stateless_verifier Reason: UDP length error;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;172.20.96.205 is behind another on site checkpoint gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;strangely even with the above drop on core gateway, the return traffic is being captured on the on site gateway as a reply from Radius. as per below tcpdump.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF9900"&gt;NAS ID Attribute (32), length: 24, Value: [|radius] [|radius]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;15:33:39.394338 IP (tos 0x0, ttl 126, id 56172, offset 0, flags [none], proto: UDP (17), length: 1 18) 10.129.0.30.radius &amp;gt; 172.20.96.205.53058: RADIUS, length: 90&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;Access Challenge (11), id: 0x93, Authenticator: 7eda7b24c401acd95f9380277e0d94ae&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;Session Timeout Attribute (27), length: 6, Value: 30 secs&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;0x0000: 0000 001e&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;EAP Message Attribute (79), length: 8, Value: ..&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;0x0000: 011d 0006 0d20&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;State Attribute (24), length: 38, Value: [|radius]&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;0x0000: 61ba 086a 0000 0137 0001 1700 fe80 0000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF9900"&gt;0x0010: 0000 [|radius]&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Users cannot authenticate and the Meraki displays multiple reasons for authentication failure as a default, rather than giving a definitive reason.&lt;/P&gt;&lt;P&gt;If onsite users connect via LAN, then the authentication works fine. but its only via one corp SSID that it does not work.&lt;/P&gt;&lt;P&gt;Now i know its pointing to the Meraki settings, but we have other sites with exactly the same scenario and going through the same core gateway without any issues. MTU, Radius, etc all settings match on all sites.&lt;/P&gt;&lt;P&gt;any one seen this issue or the drop reason above from core gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Attiq&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jun 2021 20:48:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120416#M17071</guid>
      <dc:creator>Attiq786</dc:creator>
      <dc:date>2021-06-05T20:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120547#M17107</link>
      <description>&lt;P&gt;My guess is the length of the packet reported by the IP headers versus the actual length are...somehow different.&lt;BR /&gt;Which suggests the packet is getting corrupted somehow in transit, or the Meraki is sending a corrupted packet.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 22:20:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120547#M17107</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-07T22:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Radius Authentication failure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120594#M17115</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Thanks for the reply. I have been thinking the same about Meraki. I am capturing the packets when LAN clients authenticate and are successful then compare both captures. will share the output.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jun 2021 09:05:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Radius-Authentication-failure/m-p/120594#M17115</guid>
      <dc:creator>Attiq786</dc:creator>
      <dc:date>2021-06-08T09:05:38Z</dc:date>
    </item>
  </channel>
</rss>

