<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help identifying AD Lockouts from Proxy Auth via CHAP. in SmartZone and Virtual SmartZone</title>
    <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Help-identifying-AD-Lockouts-from-Proxy-Auth-via-CHAP/m-p/80798#M5121</link>
    <description>&lt;P&gt;We have 2 VIP users which are constantly locking out their AD accounts.&amp;nbsp; The lockouts are coming from the CHAP system via AD, and the Ruckus vSmartZone system is the only CHAP auth system we have.&amp;nbsp; We were able to correlate the AD timestamps with the "radius.log" file on the SmartZone controller, and are seeing the following:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Tue Jun 04 2024 20:37:08:763][CP][RADIUS][ERR][FID=1,ueMac=84:25:3F:6B:00:57,AID=131330,TID=-302008576][wsg_rad.c:1961]
AAA Proxy Authentication failed for UE
[Tue Jun 04 2024 20:37:08:763][CP][RADIUS][ERR][FID=1,ueMac=84:25:3F:6B:00:57,TID=-302008576][wsg_rad.c:1968]
Recvd Access-Reject from AAA Name:[REDACTED-Radius-Proxy] for UE MAC:[84-25-3F-6B-00-57]
[Tue Jun 04 2024 20:37:08:763][CP][RADIUS][WRN][FID=1,ueMac=84:25:3F:6B:00:57,TID=-302008576][memcached_wrapper.c:994]
MWL_FindEntry_StrKey - Could not find a key 84-25-3F-6B-00-57 entry&lt;/LI-CODE&gt;&lt;P&gt;In general, Radius auth is working fine.&amp;nbsp; My user and most other users connect successfully without issue.&amp;nbsp; We believe these 2 users left themselves logged into a device a long time ago, saved credentials, and it's trying to authenticate in the background, silently hammering the system, but I can't prove that.&amp;nbsp; Am I correct in my understanding that the ueMAC is the client mac for this connection attempt?&amp;nbsp; We did a MAC lookup and it wasn't very helpful, it suggests it could be like a hotspot or something but it's inconclusive.&lt;/P&gt;&lt;P&gt;That MAC is not in our device inventory, is not correlating with any AP or our Domain Controllers or Hypervisors.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using Ruckus virtual SmartZone Essentials 6.1.2.0.404, connecting to an Active Directory Domain Controller running NPS on Windows Server 2019.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jun 2024 22:03:00 GMT</pubDate>
    <dc:creator>josephgullo</dc:creator>
    <dc:date>2024-06-04T22:03:00Z</dc:date>
    <item>
      <title>Help identifying AD Lockouts from Proxy Auth via CHAP.</title>
      <link>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Help-identifying-AD-Lockouts-from-Proxy-Auth-via-CHAP/m-p/80798#M5121</link>
      <description>&lt;P&gt;We have 2 VIP users which are constantly locking out their AD accounts.&amp;nbsp; The lockouts are coming from the CHAP system via AD, and the Ruckus vSmartZone system is the only CHAP auth system we have.&amp;nbsp; We were able to correlate the AD timestamps with the "radius.log" file on the SmartZone controller, and are seeing the following:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Tue Jun 04 2024 20:37:08:763][CP][RADIUS][ERR][FID=1,ueMac=84:25:3F:6B:00:57,AID=131330,TID=-302008576][wsg_rad.c:1961]
AAA Proxy Authentication failed for UE
[Tue Jun 04 2024 20:37:08:763][CP][RADIUS][ERR][FID=1,ueMac=84:25:3F:6B:00:57,TID=-302008576][wsg_rad.c:1968]
Recvd Access-Reject from AAA Name:[REDACTED-Radius-Proxy] for UE MAC:[84-25-3F-6B-00-57]
[Tue Jun 04 2024 20:37:08:763][CP][RADIUS][WRN][FID=1,ueMac=84:25:3F:6B:00:57,TID=-302008576][memcached_wrapper.c:994]
MWL_FindEntry_StrKey - Could not find a key 84-25-3F-6B-00-57 entry&lt;/LI-CODE&gt;&lt;P&gt;In general, Radius auth is working fine.&amp;nbsp; My user and most other users connect successfully without issue.&amp;nbsp; We believe these 2 users left themselves logged into a device a long time ago, saved credentials, and it's trying to authenticate in the background, silently hammering the system, but I can't prove that.&amp;nbsp; Am I correct in my understanding that the ueMAC is the client mac for this connection attempt?&amp;nbsp; We did a MAC lookup and it wasn't very helpful, it suggests it could be like a hotspot or something but it's inconclusive.&lt;/P&gt;&lt;P&gt;That MAC is not in our device inventory, is not correlating with any AP or our Domain Controllers or Hypervisors.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using Ruckus virtual SmartZone Essentials 6.1.2.0.404, connecting to an Active Directory Domain Controller running NPS on Windows Server 2019.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 22:03:00 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/SmartZone-and-Virtual-SmartZone/Help-identifying-AD-Lockouts-from-Proxy-Auth-via-CHAP/m-p/80798#M5121</guid>
      <dc:creator>josephgullo</dc:creator>
      <dc:date>2024-06-04T22:03:00Z</dc:date>
    </item>
  </channel>
</rss>

