Port Access Client Status Details:
RADIUS overridden user roles are suffixed with '*'
Client 68:f7:28:50:01:eb, host/[redacted]
==========================================================
Session Details
---------------
Port : 4/1/2
Session Time : 116s
IPv4 Address :
IPv6 Address :
Device Type :
VLAN Details
------------
VLAN Group Name :
VLANs Assigned : 11
Access : 11
Native Untagged :
Allowed Trunk :
Authentication Details
----------------------
Status : dot1x Authenticated
Auth Precedence : dot1x - Authenticated, mac-auth - Not attempted
Auth History : dot1x - Authenticated, 116s ago
MACsec Details
--------------
MKA Session Status :
MACsec Status :
Authorization Details
----------------------
Status : Applied
RADIUS Attributes
------------------
User-Name : host/[redacted]
Framed-MTU : 994 bytes
Session-Timeout : 57600 seconds
Tunnel-Type : 13
Tunnel-Medium-Type : 6
Tunnel-Private-Group-ID : 11
RADIUS Role Name : RADIUS_535804960
Oh, that's interesting, Framed-MTU attribute is being set, despite it not being in my radius config. I'll go do some further digging.
Interface 4/1/2 is up
Admin state is up
Link state: up for 16 hours (since Fri Aug 08 12:47:57 UTC 2025)
Link transitions: 43
Description: [redacted]
Persona:
Hardware: Ethernet, MAC Address: 34:c5:15:6f:99:00
MTU 994
Type 1GbT
Full-duplex
qos trust none
Speed 1000 Mb/s
Auto-negotiation is on
Energy-Efficient Ethernet is disabled
Flow-control: off
Error-control: off
MDI mode: MDI
VLAN Mode: access
Access VLAN: 11
Rate collection interval: 300 seconds
Rate RX TX Total (RX+TX)
---------------- -------------------- -------------------- --------------------
Mbits / sec 0.00 0.00 0.00
KPkts / sec 0.00 0.00 0.00
Unicast 0.00 0.00 0.00
Multicast 0.00 0.00 0.00
Broadcast 0.00 0.00 0.00
Utilization % 0.00 0.00 0.00
Statistic RX TX Total
---------------- -------------------- -------------------- --------------------
Packets 65758272 9383196 75141468
Unicast 65749849 8099242 73849091
Multicast 2104 714679 716783
Broadcast 6319 569275 575594
Bytes 40833840428 1555192746 42389033174
Jumbos 0 0 0
Dropped 0 0 0
Pause Frames 0 0 0
Errors 159689 0 159689
CRC/FCS 0 n/a 0
Collision n/a 0 0
Runts 0 n/a 0
Giants 159689 n/a 159689
Disable authentication and MTU then becomes the default 1500. So, thank you, that's the answer, given that 994 is 24+970, header size and the payload at which ping fails. It was my understanding that radius attribute Framed-MTU was applied to the communication between the switch and the radius server, but it appears that it's being applied to the port. Now my only problem is in figuring out how/why/where, because although I did experiment with the attribute a while back it's no longer in my radius configs. I also need to figure out why I don't see this issue with 3810m switches - perhaps they don't support this attribute.
-------------------------------------------
Original Message:
Sent: Aug 08, 2025 10:10 AM
From: willembargeman
Subject: 6200M - port authentication influences MTU/fragmentation
Please share the output of the following command.
show port-access clients interface <client-interface> detail
------------------------------
Willem Bargeman
Systems Engineer Aruba
ACEX #125
Original Message:
Sent: Aug 08, 2025 10:05 AM
From: stephenmellor
Subject: 6200M - port authentication influences MTU/fragmentation
Hi, authentication is successful, there isn't a problem between the switch and the radius servers, but there's a problem with the clients that are authenticated and everything else.
Disable authentication on the port and the client can ping other devices with a payload in of 972 bytes or greater.
Enable authentication on the port, the client authenticates, the client can not ping other devices when the payload is 972 bytes or greater.
The giants count for the port is static when the port is configured to not use authentication, then immediately begins to increment when authentication is enabled.
So far as I can tell framed-MTU only relates to communication between the switch and the radius server, so no, it won' t have an impact on traffic through the authenticated port (I was clutching at straws).
Original Message:
Sent: Aug 08, 2025 09:52 AM
From: willembargeman
Subject: 6200M - port authentication influences MTU/fragmentation
Can you explain the reliability issues? What do you notice?
AAA doesn't have direct impact on the MTU (unless you lower the MTU using a VSA). There is not reason to set the framed MTU value.
The Giants you see must have another reason. Are you using Aruba controllers/gateways in the setup. If yes, AP's will do MTU discovery which can results in giants on the switch interface where APs are connected.
Regarding authentication. If the clients are doing doing certificate based authentication, that could result in fragmentation issues. But you're using EAP-PEAP MSCHAP so that is username/password based.
Regarding EAP-TLS. It's recommended to lower the eap fragment size using the configuration. This will fragment the client certificate on the EAP layer. I believe freeradius does the same by default with the MTU set to 1024.
aaa authentication port-access dot1x authenticator eap-tls-fragment towards-server 1024
------------------------------
Willem Bargeman
Systems Engineer Aruba
ACEX #125
Original Message:
Sent: Aug 08, 2025 06:44 AM
From: stephenmellor
Subject: 6200M - port authentication influences MTU/fragmentation
We're using PEAP-MS-CHAP v2, but I think I know what you're referring to, and that's the packet size issue with EAP wanting the entire certificate in one packet. Correct me if I'm wrong, but that prevents authentication? In this case authentication is actually successful, it's the resulting connection that has issues. There is a radius variable, framed-MTU, but I'm not specifically setting that (for any sites), and I don't know if AOS-CX pays any attention to it.
The radius servers... one is local, one is remote (there are two for failover). We do also have EAP-TLS for printers, and MAC authentication for some small infrastructure such as door security controllers. I'll see if I can test the issue against those things this weekend (I have to be careful as this is now a live site, though I'm awaiting delivery of a spare switch for me to use at my base location for dev/test.
Original Message:
Sent: Aug 08, 2025 06:07 AM
From: ariyap
Subject: 6200M - port authentication influences MTU/fragmentation
are you using EAP-TLS authentication? and is your freeRadius in the same campus or across the WAN?
I don't know about freeRadius, but see if it has a way to perform/enable eap-tls fragmentation .
------------------------------
If my post was useful accept solution and/or give kudos.
Any opinions expressed here are solely my own and not necessarily that of HPE or Aruba.
Original Message:
Sent: Aug 08, 2025 05:44 AM
From: stephenmellor
Subject: 6200M - port authentication influences MTU/fragmentation
Bear with me please, I'm a "Jack of all IT", broad of knowledge, but shallow. And I'm new to AOS-CX.
Most of our sites use 3810M switches, 802.1x port authentication and VLAN switching via freeradius3. We have a new site, and this site uses 6200M switches, same freeradius3 servers. But there are significant network reliability issues for the users, to the point where they're all now using wifi (Aruba 615, connected to the same 6200M switches).
User hardware, OS, NIC drivers, cabling faults: all ruled out as a cause. It turns out that the reliability issues are only seen by users connected to ports with 802.1x authentication enabled. Dig a little deeper, and the 6200M port statistics show RX giants errors. There's no MTU settings changed for the switch stack, VLAN, or individual ports.
Set up a test laptop, running 6 ping tests as follows -
ping -t 8.8.8.8
ping -t -f -l 970 8.8.8.8
ping -t -l 972 8.8.8.8
ping -t -f -l 972 8.8.8.8
ping -t -f -l 972 subnet-gateway
ping -t -f -l 972 stack-ip
The first two test always work, and the rest work if authentication for the port is disabled, but fail if authentication is enabled. I can toggle between authentication enabled/disabled with aaa authentication port-access dot1x authenticator enable and aaa authentication port-access dot1x authenticator disabled, no other changes, and the last four ping tests change from fail to pass pretty much instantly (and vise versa).
Why would 802.1x port authentication be having such an impact? Note that I'm using the same VLAN for ports without authentication and for ports that are authenticated. The freeradius post-auth configuration contains only the following -
update reply {
Tunnel-Type := VLAN
Tunnel-Medium-Type := IEEE-802
Tunnel-Private-Group-Id = "11"
}
An example switch port setting is -
interface 4/1/2
description test laptop NDTR5035
no shutdown
no routing
vlan access 11
aaa authentication port-access dot1x authenticator
cached-reauth
The same setup is working at other sites, where we use Aruba 3810M switches (of course the config statements differ but so far as radius/auth is concerned they're pretty much out of the box).
So what on earth is going on? How can I debug this? How can I fix this?!
OS version: ArubaOS-CX ML.10.13.1120
-------------------------------------------