Troubleshooting Wireless Connectivity
Wireless connectivity failures are uniquely frustrating — the client shows signal bars, the AP is blinking, yet nothing works. Unlike wired faults where a bad cable is immediately obvious, wireless failures hide across five distinct layers: the RF environment (can the signal physically reach the client?), authentication (does the PSK or 802.1X credential match?), association (does the SSID exist and is the client allowed to join?), VLAN mapping (does the WLAN push the client into the correct VLAN on the wired side?), and DHCP (is there an IP address server reachable from that VLAN?). A fault at any one layer produces the same visible symptom — "connected but no internet" or "cannot connect at all" — but the fix is completely different for each.
This lab uses a Cisco Wireless LAN Controller (WLC) in a centralised architecture where all traffic is tunnelled through CAPWAP back to the WLC before hitting the wired network. For background on this architecture see Lightweight vs Autonomous APs and Access Points and WLC. For initial WLC setup see WLC Getting Started and for SSID-to-VLAN configuration see WLC SSID VLAN Mapping. For the DHCP server that wireless clients depend on see DHCP Server Configuration.
1. Wireless Association Process — End-to-End
The Six Stages a Client Must Pass Through
Every successful wireless connection traverses these stages in order. A failure at any stage prevents all subsequent stages — knowing which stage failed tells you exactly which failure category to investigate:
Stage 1 ── RF / Physical
Can the client hear the AP beacon?
Signal below -75 dBm, wrong channel, excessive interference?
FAIL → client never sees the SSID / "no networks found"
│
▼
Stage 2 ── SSID Discovery & Probe
Does the SSID name on the client match exactly what the AP broadcasts?
Hidden SSID? SSID disabled on WLC?
FAIL → client cannot find the network / "SSID not found"
│
▼
Stage 3 ── 802.11 Authentication
Open system (WPA2/3) or Shared Key? 802.11 auth frame exchange.
FAIL → "Authentication failed" before any credential check
│
▼
Stage 4 ── Security Authentication (PSK / 802.1X / Web Auth)
WPA2-PSK: does the client's passphrase produce the correct PMK?
802.1X: does RADIUS accept the credential?
FAIL → "Wrong password" / "Authentication timeout"
│
▼
Stage 5 ── Association & VLAN Mapping
Client associates to the AP. WLC maps the WLAN to a VLAN.
Is the WLAN-to-interface binding correct on the WLC?
Is the VLAN allowed on the trunk to the WLC?
FAIL → client associates but cannot get an IP / wrong subnet
│
▼
Stage 6 ── DHCP / IP Address Acquisition
Client broadcasts DHCPDISCOVER on the assigned VLAN.
Is a DHCP server reachable? Is the scope active with free leases?
FAIL → "Limited connectivity" / APIPA 169.254.x.x address
Five Failure Categories and Their Signatures
| # | Category | Stage | Client Symptom | Primary Diagnostic |
|---|---|---|---|---|
| 1 | RF / Interference | 1 | Weak signal, frequent drops, low throughput, cannot see SSID | WLC RF summary, AP channel/power, site survey |
| 2 | SSID Mismatch | 2 | Network not found; client connects to wrong SSID | show wlan summary, WLC WLAN status |
| 3 | PSK / Authentication Failure | 4 | "Incorrect password" / "Authentication failed" — client retries repeatedly | WLC client event log, show wireless client detail |
| 4 | VLAN Mapping Error | 5 | Client associates, shows connected, gets wrong IP or no IP | show wireless client detail, trunk verification |
| 5 | DHCP Failure | 6 | Connected to SSID, no IP address (169.254.x.x or 0.0.0.0) | show wireless client detail, show ip dhcp pool |
2. Lab Topology & Scenario
[Laptop — wireless client]
802.11ac
│
[NetsTuts_AP1 — CAPWAP]
│
NetsTuts_SW1 Gi0/2 (trunk — VLANs 10,20,99)
│
NetsTuts_WLC (management VLAN 99 — 192.168.99.2)
NetsTuts_R1 Gi0/1 → SW1 (router-on-a-stick)
WLANs configured on WLC:
WLAN 1 — SSID: "Corp-Staff" Security: WPA2-PSK Interface: VLAN 10 (192.168.10.0/24)
WLAN 2 — SSID: "Corp-Guest" Security: WPA2-PSK Interface: VLAN 20 (192.168.20.0/24)
DHCP servers:
VLAN 10 DHCP: 192.168.10.0/24 pool on NetsTuts_R1 sub-interface Gi0/1.10
VLAN 20 DHCP: 192.168.20.0/24 pool on NetsTuts_R1 sub-interface Gi0/1.20
Trunk to WLC: NetsTuts_SW1 Gi0/2 — must allow VLANs 10, 20, 99
Trunk to AP: NetsTuts_SW1 Gi0/3 — must allow VLANs 10, 20, 99
Scenario A — SSID name typo: WLC broadcasts "Corp-Staf" instead of "Corp-Staff"
Scenario B — Wrong PSK: WLC WLAN 1 PSK changed, client still uses old passphrase
Scenario C — VLAN mapping error: WLAN 1 bound to VLAN 20 interface instead of VLAN 10
Scenario D — DHCP failure: VLAN 10 pool exhausted / DHCP server unreachable
Scenario E — RF interference: AP1 and neighbour AP on same channel 6
3. Step 1 — Primary Diagnostic Commands
show wireless client summary (IOS-XE WLC)
NetsTuts_WLC#show wireless client summary Number of Local Clients: 2 MAC Address AP Name WLAN State Protocol Method ----------- ------- ---- ----- -------- ------ a4:c3:f0:11:22:33 NetsTuts_AP1 1 Associated 11ac WPA2 b8:27:eb:44:55:66 NetsTuts_AP1 2 Associated 11n WPA2
show wireless client detail mac-address [MAC]
NetsTuts_WLC#show wireless client detail mac-address a4:c3:f0:11:22:33 Client MAC Address : a4:c3:f0:11:22:33 Client Username : N/A AP Name : NetsTuts_AP1 AP MAC Address : 00:1a:2b:3c:4d:5e Client State : Associated Wireless LAN Id : 1 Wireless LAN Network Name (SSID) : Corp-Staff BSSID : 00:1a:2b:3c:4d:5f Connected For : 142 seconds Channel : 6 IP Address : 192.168.10.105 Gateway : 192.168.10.1 Netmask : 255.255.255.0 VLAN : 10 Association Id : 1 Authentication Algorithm : WPA2 PSK Security Policy : WPA2 Encryption Cipher : CCMP (AES) RSSI : -58 dBm SNR : 32 dB Data Rate : 300.0 Mb/s Tx Bytes : 124512 Rx Bytes : 89023
show wlan summary
NetsTuts_WLC#show wlan summary Number of WLANs: 2 WLAN ID WLAN Profile Name / SSID Status Interface Name ------- ------------------------------------- ------ -------------- 1 Corp-Staff / Corp-Staff Enabled vlan10-interface 2 Corp-Guest / Corp-Guest Enabled vlan20-interface
show wireless client detail — Key State Values
| Client State | Meaning | Likely Fault |
|---|---|---|
| Associated | Client completed 802.11 association — security exchange succeeded | If no IP: VLAN mapping or DHCP fault (Stage 5/6) |
| Authenticating | Client is stuck in the security handshake — PSK/802.1X exchange in progress or failing | Wrong PSK, RADIUS unreachable, EAP timeout (Stage 4) |
| Excluded | Client has been blacklisted by the WLC after repeated auth failures | Wrong PSK entered multiple times; check exclusion list |
| Probing | Client is sending probe requests but not attempting to associate | SSID not found by client; RF too weak; SSID disabled |
| IP Learn | Association succeeded but client has not yet obtained an IP address | DHCP failure — scope exhausted, server unreachable, VLAN wrong |
WLC Event Log (GUI and CLI)
! ── View recent client events ──────────────────────────── NetsTuts_WLC#show logging | include a4:c3:f0:11:22:33 %DOT11-6-ASSOC: Station a4:c3:f0:11:22:33 Associated Key Mgmt[WPA2 PSK] %DOT11-3-DISASSOC: Station a4:c3:f0:11:22:33 Disassociated Reason: Auth_Failed %CLIENT-3-EXCLUDED: Client a4:c3:f0:11:22:33 excluded Reason: Auth_Failure_Threshold
show logging | include [MAC]
to extract only the relevant client events. Log entries explicitly
state the reason code — Auth_Failed confirms a PSK
or credential fault, Disassoc_Leaving indicates
a clean client-initiated disconnect, and Excluded
means the WLC has blacklisted the client after repeated failures.
For full logging output see show logging.
Diagnostic Command Summary
| Command | What It Shows | Best Used For |
|---|---|---|
show wireless client summary |
All associated clients — MAC, AP, WLAN, state, protocol, security | First check — is the client visible to the WLC at all? |
show wireless client detail mac-address [MAC] |
Full client record — state, SSID, VLAN, IP, RSSI, SNR, data rates | Deep per-client diagnosis — confirm IP, VLAN, signal quality |
show wlan summary |
All WLANs — SSID name, enabled/disabled, interface/VLAN mapping | SSID and VLAN mapping verification |
show wlan id [n] |
Full configuration of a single WLAN — security, VLAN, radio policy, QoS | Detailed WLAN config audit when summary output is insufficient |
show ap summary |
All APs — name, model, state (registered/unregistered), IP, channel | Verify all APs are registered with the WLC before client troubleshooting |
show ap dot11 5ghz summary |
5 GHz radio status — channel, power, clients per AP | RF channel and power audit for 5 GHz band |
show logging | include [MAC] |
All log events for a specific client MAC address | Auth failure reason codes, exclusion events, association history |
show vlan brief (on switch) |
VLAN database — confirm VLAN exists and is active | Verify the VLAN the WLC maps clients to actually exists on the switch |
show interfaces trunk (on switch) |
Trunk VLAN allowed list — verify WLC and AP VLANs are carried | VLAN mapping and DHCP fault isolation — is the VLAN reaching the switch? |
4. Scenario A — SSID Mismatch
An SSID is just a text string — a single character difference makes it a completely different network. The client's saved profile will never match the AP beacon, and the client either shows "network not found" or connects to a different (possibly unsecured) SSID of similar name. This is commonly caused by a typo during WLC configuration or a profile copy error on the client.
Introducing the Fault
! ── On IOS-XE WLC — WLAN profile name typo ────────────── NetsTuts_WLC(config)#wlan Corp-Staf 1 Corp-Staf ! ── SSID now broadcasts as "Corp-Staf" — client profile has "Corp-Staff"
Symptom — Client Cannot Find the Network
NetsTuts_WLC#show wireless client summary Number of Local Clients: 0 ! ── Client does not appear at all — never sent a probe response match
Diagnosis — show wlan summary
NetsTuts_WLC#show wlan summary WLAN ID WLAN Profile Name / SSID Status Interface Name ------- ---------------------------- ------ -------------- 1 Corp-Staf / Corp-Staf Enabled vlan10-interface 2 Corp-Guest / Corp-Guest Enabled vlan20-interface
Fix — Correct the SSID
! ── On IOS-XE WLC ──────────────────────────────────────── NetsTuts_WLC(config)#no wlan Corp-Staf 1 Corp-Staf NetsTuts_WLC(config)#wlan Corp-Staff 1 Corp-Staff NetsTuts_WLC(config-wlan)#security wpa psk set-key ascii 0 C0rpP@ssw0rd! NetsTuts_WLC(config-wlan)#no shutdown NetsTuts_WLC(config-wlan)#exit
wlan [profile-name] [wlan-id] [ssid]. Correcting the
profile name and SSID restores the beacon. The client's existing
saved profile for "Corp-Staff" will now find the beacon and attempt
to associate using the saved PSK. Always verify with
show wlan summary after any SSID change.
show wlan
summary, check whether broadcast is suppressed with
show wlan id [n] — look for "Broadcast SSID: Disabled."
Enable broadcast for troubleshooting, then re-disable if security
policy requires it.
5. Scenario B — Wrong PSK (Authentication Failure)
A PSK mismatch causes a WPA2 four-way handshake failure. The client sees the SSID, sends a probe request, receives a probe response, completes 802.11 open authentication — and then the four-way handshake fails silently because the PMK (Pairwise Master Key) derived from the client's passphrase does not match the PMK the WLC expects. From the client's perspective this appears as "Authentication failed" or simply an infinite retry loop. For WPA2/WPA3 security fundamentals see Wi-Fi Security.
Introducing the Fault
! ── PSK changed on WLC to new value, client still uses old key ── NetsTuts_WLC(config)#wlan Corp-Staff 1 Corp-Staff NetsTuts_WLC(config-wlan)#security wpa psk set-key ascii 0 N3wP@ssw0rd! NetsTuts_WLC(config-wlan)#exit ! ── Client's saved profile still has "C0rpP@ssw0rd!" ────────────
Symptom — show wireless client summary
NetsTuts_WLC#show wireless client summary Number of Local Clients: 0 ! ── Client not present — failed before association completed
Symptom — WLC Event Log
NetsTuts_WLC#show logging | include a4:c3:f0:11:22:33
%DOT11-6-AUTH_START: Client a4:c3:f0:11:22:33 starting authentication
%DOT11-3-AUTH_FAILED: Client a4:c3:f0:11:22:33 Authentication Failed
Reason: MIC Failure in 4-way handshake
%DOT11-6-AUTH_START: Client a4:c3:f0:11:22:33 starting authentication
%DOT11-3-AUTH_FAILED: Client a4:c3:f0:11:22:33 Authentication Failed
Reason: MIC Failure in 4-way handshake
%CLIENT-3-EXCLUDED: Client a4:c3:f0:11:22:33 excluded
Reason: Auth_Failure_Threshold (3 consecutive failures)
Check Exclusion List
NetsTuts_WLC#show wireless exclusionlist
Excluded Clients
MAC Address Exclusion Reason Time Remaining
----------- ---------------- --------------
a4:c3:f0:11:22:33 Auth failure 00:00:47
wireless client mac-address [MAC] deauthenticate followed
by clearing the exclusion if needed. On the GUI: Security → Wireless
Protection Policies → Client Exclusion Policies.
Fix — Correct the PSK
! ── Option 1: Reset WLC PSK back to the value all clients expect ─ NetsTuts_WLC(config)#wlan Corp-Staff 1 Corp-Staff NetsTuts_WLC(config-wlan)#security wpa psk set-key ascii 0 C0rpP@ssw0rd! NetsTuts_WLC(config-wlan)#exit ! ── Option 2: Update the client's saved network profile with the new PSK ── ! (Done on the client OS — forget network and reconnect with N3wP@ssw0rd!) ! ── Clear exclusion so client can retry immediately ────── NetsTuts_WLC#wireless client mac-address a4:c3:f0:11:22:33 deauthenticate
aaa authentication mismatch produces the same
client symptom — authentication failure — but the fix is entirely
different from a PSK correction.
6. Scenario C — VLAN Mapping Error
The client fully authenticates and associates — from the wireless perspective everything is fine — but the WLC pushes the client into the wrong VLAN on the wired side. The client gets an IP address from the wrong subnet (or no IP at all if the wrong VLAN has no DHCP server), cannot reach its intended gateway, and appears "connected" with no internet access. This is one of the most deceptive wireless faults because the client OS reports full connectivity.
Introducing the Fault
! ── WLAN 1 (Corp-Staff) accidentally mapped to VLAN 20 interface ── NetsTuts_WLC(config)#wlan Corp-Staff 1 Corp-Staff NetsTuts_WLC(config-wlan)#client-vlan vlan20-interface ! ── Staff clients now land in Guest VLAN (192.168.20.0/24) ────────
Symptom — show wireless client detail
NetsTuts_WLC#show wireless client detail mac-address a4:c3:f0:11:22:33 Client State : Associated Wireless LAN Network Name (SSID) : Corp-Staff VLAN : 20 ← should be 10 IP Address : 192.168.20.156 ← Guest subnet — wrong Gateway : 192.168.20.1
Diagnosis — show wlan id 1
NetsTuts_WLC#show wlan id 1
WLAN Profile Name : Corp-Staff
================================================
SSID : Corp-Staff
Status : Enabled
Interface/Interface Group(G) : vlan20-interface ← WRONG — should be vlan10
Security
802.11 Authentication : Open System
Static WEP Keys : Disabled
WPA : Enabled
WPA2 : Enabled
WPA2 Encryption : CCMP (AES)
Authentication Key Mgmt : PSK
Diagnosis — Verify the Trunk (on NetsTuts_SW1)
NetsTuts_SW1#show interfaces GigabitEthernet0/2 trunk Port Mode Encapsulation Status Native vlan Gi0/2 on 802.1q trunking 99 Port Vlans allowed on trunk Gi0/2 10,20,99 Port Vlans allowed and active in management domain Gi0/2 10,20,99
Fix — Correct the WLAN Interface Mapping
! ── Re-map WLAN 1 to the correct VLAN 10 interface ────── NetsTuts_WLC(config)#wlan Corp-Staff 1 Corp-Staff NetsTuts_WLC(config-wlan)#client-vlan vlan10-interface NetsTuts_WLC(config-wlan)#exit ! ── Verify fix ─────────────────────────────────────────── NetsTuts_WLC#show wlan id 1 | include Interface Interface/Interface Group(G) : vlan10-interface
wireless client mac-address [MAC] deauthenticate.
On the next association, they will be mapped to the correct VLAN and
receive a DHCP address from the correct scope.
7. Scenario D — DHCP Failure
The client authenticates, associates, and is placed on the correct VLAN — but no DHCP server responds to its DHCPDISCOVER broadcast. The client either self-assigns an APIPA address (169.254.x.x) after the DHCP timeout, or shows IP address 0.0.0.0 with "Limited Connectivity." DHCP failures have several root causes that must be diagnosed in order: Is the DHCP server reachable? Does a scope exist for this VLAN? Is the scope active and does it have free addresses? Is the DHCP relay configured if the server is on a different subnet?
Symptom — show wireless client detail (DHCP Failure)
NetsTuts_WLC#show wireless client detail mac-address a4:c3:f0:11:22:33 Client State : IP Learn ← stuck here — no IP yet Wireless LAN Network Name (SSID) : Corp-Staff VLAN : 10 ← correct VLAN IP Address : 0.0.0.0 ← no address obtained Gateway : 0.0.0.0 DHCP Status : DHCP Required DHCP Server IP : 0.0.0.0 ← no DHCP server seen
Check DHCP Pool on the Router
! ── On NetsTuts_R1 (DHCP server for VLAN 10) ──────────── NetsTuts_R1#show ip dhcp pool Pool VLAN10-POOL : Network : 192.168.10.0/24 Broadcast : 192.168.10.255 Lease time (secs) : 86400 (1 day) Utilization mark (high/low) : 100 / 0 Subnet size (first/next) : 0 / 0 Total addresses : 253 Leased addresses : 253 Pending event : none NetsTuts_R1#show ip dhcp pool VLAN10-POOL | include leased Leased addresses : 253
Check for Stale Leases
NetsTuts_R1#show ip dhcp binding | include 192.168.10 IP address Client-ID Lease expiration Type 192.168.10.101 0100.1a2b.3c4d.5e Mar 12 2026 09:14:22 Automatic 192.168.10.102 0100.aabb.ccdd.eeff Mar 11 2026 09:14:22 Automatic ... ! ── Clear all stale bindings to free the pool ──────────── NetsTuts_R1#clear ip dhcp binding * ! ── Or clear a single expired binding ──────────────────── NetsTuts_R1#clear ip dhcp binding 192.168.10.102
Fix — Expand the Scope or Reduce Lease Time
! ── Option 1: Reduce lease time so addresses recycle faster ── NetsTuts_R1(config)#ip dhcp pool VLAN10-POOL NetsTuts_R1(dhcp-config)#lease 0 4 ! 4-hour lease instead of 24-hour NetsTuts_R1(dhcp-config)#exit ! ── Option 2: Expand the DHCP scope to a larger subnet ─── ! Requires re-addressing VLAN 10 to use /23 (510 addresses) NetsTuts_R1(config)#no ip dhcp pool VLAN10-POOL NetsTuts_R1(config)#ip dhcp pool VLAN10-POOL NetsTuts_R1(dhcp-config)#network 192.168.10.0 255.255.254.0 NetsTuts_R1(dhcp-config)#default-router 192.168.10.1 NetsTuts_R1(dhcp-config)#dns-server 8.8.8.8 NetsTuts_R1(dhcp-config)#exit
DHCP Relay — Server on a Different Subnet
! ── If DHCP server is on a separate subnet from the client VLAN ── ! ── A relay (ip helper-address) is required on the VLAN SVI ────── NetsTuts_R1(config)#interface GigabitEthernet0/1.10 NetsTuts_R1(config-subif)#ip helper-address 192.168.99.10 ! ── 192.168.99.10 is the DHCP server address ───────────── ! ── Verify relay is configured ─────────────────────────── NetsTuts_R1#show ip interface GigabitEthernet0/1.10 | include Helper Helper address is 192.168.99.10
ip helper-address pointing to the
DHCP server. Without it, broadcasts are absorbed at the router and
never reach the DHCP server. Verify the sub-interface IP is correct
with show ip interface brief
and test reachability with ping.
For a full walkthrough see
DHCP Relay Agent Configuration.
8. Scenario E — RF Interference and Channel Overlap
RF interference is the only wireless fault category that cannot be fixed purely through IOS or WLC configuration — it requires physical or radio parameter changes. A client experiencing interference can associate successfully, get an IP address, and still suffer near-zero throughput, constant retransmissions, and intermittent disconnections. The symptoms mimic application-level faults, making RF issues the hardest category to identify without the right tools.
RF Signal Quality Thresholds
| RSSI (dBm) | SNR (dB) | Quality | Expected Behaviour |
|---|---|---|---|
| -30 to -55 | > 40 | Excellent | Maximum throughput, very reliable, full rate selection |
| -55 to -65 | 25–40 | Good | High throughput, reliable for voice and video |
| -65 to -75 | 15–25 | Fair | Reduced throughput, occasional retransmissions |
| -75 to -85 | 10–15 | Poor | Low throughput, frequent retransmissions, VoIP unusable |
| Below -85 | < 10 | Unusable | Association may succeed but effective throughput near zero |
Check RSSI and SNR — show wireless client detail
NetsTuts_WLC#show wireless client detail mac-address a4:c3:f0:11:22:33 ... RSSI : -78 dBm ← Poor — below -75 threshold SNR : 11 dB ← Poor — below 15 dB threshold Data Rate : 6.0 Mb/s ← Client fell back to lowest rate Tx Retries : 847 Rx Retries : 1203
Check AP Channel and Co-Channel Interference
NetsTuts_WLC#show ap dot11 24ghz summary AP Name Oper State Channel TxPower Clients ----------- ---------- ------- ------- ------- NetsTuts_AP1 Up 6 17 dBm 8 NeighbourAP Up 6 20 dBm 4 ! ── Both APs on channel 6 — co-channel interference ───── ! ── Move NetsTuts_AP1 to a non-overlapping channel ─────── NetsTuts_WLC#show ap dot11 24ghz summary ! ── Non-overlapping 2.4 GHz channels: 1, 6, 11 ──────────
Fix — Change AP Channel
! ── Manually assign channel 11 to AP1 (IOS-XE WLC) ────── NetsTuts_WLC(config)#ap name NetsTuts_AP1 NetsTuts_WLC(config-ap)#dot11 24ghz channel 11 NetsTuts_WLC(config-ap)#exit ! ── Or enable RRM (Radio Resource Management) — auto channel ── NetsTuts_WLC(config)#ap dot11 24ghz rrm channel cleanair-event NetsTuts_WLC(config)#ap dot11 24ghz rrm channel dca
Common RF Interference Sources
| Source | Frequency | Symptom | Mitigation |
|---|---|---|---|
| Neighbouring APs (same channel) | 2.4 or 5 GHz | High retransmissions, low throughput across all clients on that channel | Use non-overlapping channels; enable RRM/DCA |
| Microwave ovens | 2.45 GHz (2.4 GHz band) | Intermittent drops near kitchen/break room during microwave use | Move WLAN to 5 GHz band; increase channel width to 40 MHz in 5 GHz |
| Bluetooth devices | 2.4 GHz (frequency hopping) | Slightly elevated noise floor; minor throughput impact | Use 5 GHz for latency-sensitive applications |
| Rogue APs (same channel) | 2.4 or 5 GHz | Unexpected interference pattern; client deauthentication if rogue sends deauth frames | Enable rogue AP detection on WLC; investigate with site survey tools |
| Physical obstructions | All frequencies | Low RSSI, high path loss in certain areas | Reposition APs; use 2.4 GHz (longer range) for distant clients; add APs |
9. Structured Troubleshooting Workflow
| Step | Command | What to Check | If Found |
|---|---|---|---|
| 1 | show ap summary |
Are all APs registered and in "Registered" state? | Unregistered AP → CAPWAP tunnel down. Check AP IP, WLC IP, and CAPWAP UDP 5246/5247 reachability first — client issues cannot be fixed if the AP is not connected to the WLC |
| 2 | show wlan summary |
Does the SSID name match exactly? Is the WLAN enabled? | SSID typo → fix WLAN profile name. WLAN disabled → no shutdown in WLAN config |
| 3 | show wireless client summary |
Is the client MAC visible? What state is it in? | Not visible → RF or SSID fault. "Authenticating" stuck → PSK/802.1X fault. "IP Learn" stuck → DHCP fault |
| 4 | show logging | include [MAC] |
What reason codes appear? Auth_Failed? MIC Failure? Excluded? | MIC Failure → PSK mismatch on client or WLC. RADIUS rejected → 802.1X credential or shared secret fault. Excluded → clear exclusion list after fixing root cause |
| 5 | show wireless client detail mac-address [MAC] |
Is VLAN correct? Is IP address correct subnet? RSSI/SNR acceptable? | Wrong VLAN → fix WLAN interface mapping on WLC. IP 0.0.0.0 → DHCP fault. RSSI below -75 dBm → RF fault |
| 6 | show interfaces trunk (on switch) |
Is the client's VLAN in the allowed and active list on the WLC uplink trunk? | VLAN missing → switchport trunk allowed vlan add [vlan-id] on both ends |
| 7 | show ip dhcp pool (on DHCP server) |
Is the scope active? Are leases available (not 100% allocated)? | Pool exhausted → clear stale bindings, reduce lease time, or expand scope. No pool → create DHCP pool for the VLAN subnet |
| 8 | show ap dot11 24ghz summary |
Are multiple APs on the same channel within range of each other? | Co-channel interference → reassign to non-overlapping channels (1, 6, 11 for 2.4 GHz) or enable RRM/DCA |
Key Points & Exam Tips
- Wireless faults span six stages — RF, SSID discovery, 802.11 authentication, security authentication (PSK/802.1X), VLAN mapping, and DHCP. Identify which stage is failing before applying a fix.
show wireless client summaryis the first command — it tells you whether the client is visible to the WLC at all and what state it is stuck in (Associated, Authenticating, IP Learn, Excluded, Probing).show wireless client detail mac-address [MAC]is the deepest single-client command — always check Client State, VLAN, IP Address, RSSI, and SNR.- A client in "IP Learn" state has completed wireless authentication successfully — the problem is DHCP (scope exhausted, relay missing, server unreachable) or VLAN (VLAN not on trunk).
- "MIC Failure in 4-way handshake" in the WLC log is the definitive PSK mismatch indicator — the passphrase on the client does not match the WLC. After fixing the PSK, clear the exclusion list so the client can retry immediately.
- A client showing the correct "Associated" state but an IP address on the wrong subnet indicates a VLAN mapping error — the WLAN is bound to the wrong WLC interface. Fix with
client-vlan [interface-name]in the WLAN config, then deauthenticate existing clients to force re-association. - The trunk between the switch and WLC must allow every VLAN that WLANs map clients into — a VLAN missing from the trunk's allowed list causes DHCP failures even when every other configuration is correct.
- RSSI should be better than -70 dBm and SNR above 20 dB for reliable operation. Below -75 dBm RSSI or below 15 dB SNR causes rate reduction, high retransmission counts, and VoIP failure.
- In 2.4 GHz there are only three non-overlapping channels: 1, 6, and 11. Co-channel interference from overlapping channel assignments is the single most common RF performance problem.
- On the CCNA exam: know the five WLAN failure categories, the meaning of Client State values (especially "IP Learn" and "Excluded"), what "MIC Failure" means for PSK troubleshooting, and the role of the WLC interface in VLAN mapping.