IPad's Roaming Between Access Points

A company with 460 Cisco Access Points is using iPad Mini's to control lighting and other things, the iPad Mini's are roaming between access points VERY SLOW, they are dropping 45-50 packets between roams. iPad 2's and iPhone's are roaming just fine, if they drop any packets it's a max of 5.
Is there any differance in the NIC's that are in iPad 2's and iPad Mini's? Or is there a setting for fast roaming?

Hi,
It seems that these APs are not aware of each other, I would suggest you look into a controller based solution, that means you need some sort of controller base AP system to get this seamless roaming feature, I also suggest you check whether there's compatibility
issue for the device with product vender.
Yolanda Zhu
TechNet Community Support

Similar Messages

  • How do I set the transition between access points would be fine?

    Hello everyone,
    We have an organization Wirless controller 2504 with 20 aironet access-point (700 series)
    Once I defined  all the access points I noticed that the transition between them is not working fine...
    I mean that clients can not walk around in our organization without having to connect to any access point separately.
    How do I set the transition between access points would be fine?
    Thanks a lot (:

    HI Omri,
    which software version you have on WLC ?
    Is the site survey done propely ?
    Remember: It is the client that decides when to roam and which AP to connect to based on what it perceives the signal to be.
    If your site survey design is perfect and still have problems while roaming then:
    Disable your lower data rates on the 2.4ghz and or 5ghz radio and your clients will roam better. Try to disable everything below 11mbps. and give that a try.May be old device will work in this case.
    Regards
    Dont forget to rate helpful posts

  • When I connect my apple tv to my access point upstair and connect my ipad to the same access point i cant see my apple tv when i open up the airplay menu on my ipad. but i can see the apple tv in the living room downstair which connect to the main router

    when I connect my apple tv to my access point upstair and connect my ipad to the same access point i cant see my apple tv when i open up the airplay menu on my ipad. but i can see the apple tv in the living room downstair which connect to the main router.
    Below is some info i get about ports.
    I tried to set DMZ on my main router to have full access to ported to access point upstair which is in the ip of 192.168.1.2 and the main router in the living room is the gateway router with the 192.168.1.1 ip.
    I still cant see apple tv after i try the DMZ method.
    any suggestion ?
    These network ports are used by Apple TV for communications on your network.
    TCP port 123 is used to communicate with a network time server.
    TCP port 3689 is used to communicate with iTunes while using the iTunes Library Sharing feature.
    UDP port 5353 is used by Apple TV for automatically finding computers with iTunes on your network using Bonjour.
    TCP port 80 is used for communicating with podcast servers.
    TCP port 80 and 443 are used for basic and secure communications with the iTunes Store via the Internet.
    TCP port 53 is used for regular DNS.
    These are well-known ports used by Apple products, like iTunes. If you can use all the features of iTunes, these ports are likely already open on your firewall or NAT router. Note: These ports may also used by other services such as YouTube and Flickr.

    When the Apple TV is paired with a remote, it means only that remote can control it, when it's not paired any remote can control it. You will need a remote for each of your devices.

  • Trying to figure out difference between Access Point & Gateway

    Hello All,
    I am trying to figure out how to expand my home network and getting confused by the terms. The following is what I have for equipment"
    WRT 130N
    WRT 54GS
    4 hard wired assorted items hard wired to the 130N
    Here is what I want to do and not sure if I can do it:
    I would like to use the wireless side of the 54GS to connect to the wireless side of the 130N. By [lacing the 54GS on a different floor of our home  we will have four more hard wire ports to utilize for addition hardware we want to network.
    My questions are as follows:
    Is there a way that using the firmware in the 130N & 54GS to do this> The 54GS is V.7 and the 130N is only about six months old so it's the most current firmware. I am completely confused as to what the difference is between a gateway and an access point.
    Today was spent reading everything on the net about after market upgrades and in the end I am only more confused.
    Can anyone offer me some advise or guidance?
    Thanks,
    Ted

    access point:
    A device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network.
    gateway:
    A device that interconnects networks with different, incompatible communications protocols
    Analyzing the network environment that you want to create, is it?
    1. wrt130N )))))                                    (((((  wrt54gs  ))))                              ((((( 4 devices 
    2. wrt130N )))))                                    (((((  wrt54gs ----------------------------------------- 4 devices
    If it is figure 1. it is not possible, neither  figure 2. to  get it working that way, because wireless routers can only function as a wireless router, wired router and an access point.
    What you can do though is :
     wrt54gs- at least fw: 7.50.5   ))))))             ((((( wap54g - in repeater mode -  ))))))            (((((( pc
     wrt54gs- at least fw: 7.50.5   ))))))             ((((( wap54g - access point client mode- wrt130n - dhcp disabled  --------------------- 4 devices
    Take note though that wrt54gs has not been know to work with wpa54g access access point client mode
    Your best bet is to just wire wrt130n to wrt54gs and change the ip address of the latter to i.e. 192.168.5.1.
    " I can do all things through Christ which strengthens me. "

  • Can i use ipad as a mobile access point

    I have a ipad 3g model and wondering if i can use is as a mobile access point or is that only possible with an ipad2?

    It's not possible on either iPad - currently only the iPhone 4 and 3GS models can be used as mobile hotspots

  • Difference between "access point solution" and "hot spot solution"

    Hi to all, i'm Fabio.
    My customer has a bookshop and wants to allow to his customers access to the internet using wifi connection.
    Here in Italy there are a lot of laws and is very hard to create this type of solution without legal permission, authorization and so on.
    However, i'm reading some technical website, and lot of them propose solution based on hot spot and not access point.
    Now my question my doubts:
    -Is there some difference (technical and "conceptual") between hot spot and access point?
    -How are the law outside Italy, in order to satisfy this type of request?
    You have to think that here, based on the Italy rules, my customer should become a telecommunication operator to allow him to install ten access point for public use!!!!!!!!
    Thanks, Fabio Marino.

    Ok Surendrea, in this case i post here what you have to translate from my link
    (source: http://www.cdaweb.it/Articoli_Vista/tabid/94/articleid/305/Default.aspx?dnnprintmode=true&mid=421&SkinSrc=[G]Skins%2F_default%2FNo+Skin&ContainerSrc=[G]Containers%2F_default%2FNo+Container):
    "Quali soluzioni tecnologiche possono essere  adottate per tutelarsi in questo senso? Una esaustiva risposta a tale  domanda viene data in questo articolo di 01Net.it. Possiamo sintetizzarne i concetti. I gestori dovrebbero preferire soluzioni di tipo hotspot, invece che access point.  Questi ultimi infatti hanno la funzionalità basilare di diffusione del  segnale, senza però poter tracciare l'autore di eventuali attività  illecite, in quanto non esiste distinzione tra gli utenti collegati e  non rimane traccia del traffico prodotto. Gli hotspot, invece, permettono di far autenticare con username e password univoci ciascun utente, e quindi rintracciarlo in caso di necessità, gestire  ticket di navigazione, gestire la banda in modo che un singolo utente  non la monopolizzi rallentando o intasando la navigazione altrui,  separare la rete personale/aziendale da quella del Wi-Fi pubblico, e  mantenere traccia di tutto il traffico attraverso i file di log (i  registri degli accessi). Ecco la soluzione ideale che consente  all'esercente di dimostrare di non essere l'autore di attività illecite."
    English version:
    "What technological solutions can be adopted to protect themselves in this way? An exhaustive answer to this question is given in this article 01Net.it. We can summarize the concepts. managers should prefer solutions like hotspots, rather than access point. These in fact have the basic functionality of spreading the signal, without being able to trace the perpetrators of any illegal activities, as there is no distinction between connected users, and no trace of the traffic generated. hotspots, however, allow to authenticate with username and passwords each user, and then track it down if needed, manage navigation tickets, manage bandwidth so that a single user does not monopolize the slowing or clogging the navigation of another, separate network and personal business than that of Wi-Fi public, and keep track of all traffic through the log files (access logs). This is the perfect solution that allows operator to demonstrate that it is not the author of any illegal activity."
    May be based on this information you can learn something new

  • L3 connections between Access points and WLC

    hi,
    we have a customer asking us to configure wireless system as per attached drawing.
     WLC is in Data Center which is connected to Data Center Switch ( Cisco 3850), then this DC-Switch is connected to DC-Core ( Cisco Nexus-7K).
    this Nexus-7K is connected to many campus Networks. in all campuses there is Cisco 4507 Campus Core which is connected to Nexus-7K.
    then from Campus core many distribution switches are connected.
    all Vlans for data and wifi is created in Distribution Switches. Distribution Switches are VTP Servers and many access switches with connected APs are connected back to this Distribution Switch.
    All Access Points are registered at WLC in Data Center, but wifi clients are not getting ip address from DHCP Server, as well as even if we configured static ip address at wifi clients they are not able to communicate correctly.
    please correct me if there is a mistake in this design , or we have a solution to solve this problem please let me know.
    attached topology diagram 
    thanks,
    anvar

    Hey Anvar,
    Too much details about network, to make it simple:
    1- APs and WLC can be in separate VLANs (Not a problem)
    2- As APs have joined, these two VLANs look fine for me
    If your clients can't communicate probably with static IP address
    1- From the WLC, ping default gateway for that VLAN
    2- If the WLC can reach the gateway, its wired VLAN issue that you need to investigate in the path (maybe using wired device in the same VLAN as the clients in the switch where the APs are connected)
    Now, about why the clients are not taking IP:
    1- What is your DHCP, where its located? Is it the same one for all clients?
    2- Do you have local APs or FlexConnect ?
    3- When you run the debugs for DHCP where the process breaks?
    Cheers,
    Nour

  • Certificate between Access point and Wireless client

    Hi;
    is there anyway to configure a certificate between the wireless AP and clients to secure my username and the password.
    my setup is WLC5508/AP1142/ACS5.4
    I need the client to trust  the certifcate before entering the UN/PW

    Hello,
    As per your query i can suggest you the following solution-
    LAP authorization can be performed in two ways:
    Using the Internal Authorization list on the WLC
    Using the MAC address database on an AAA server
    The behaviors of the LAPs differ based on the certificate used:
    LAPs with SSCs—The WLC will only use the Internal Authorization list and will not forward a request to a RADIUS server for these LAPs.
    LAPs with MICs—WLC can use either the Internal Authorization list configured on the WLC or use a RADIUS server to authorize the LAPs
    This document discusses LAP authorization using both the Internal Authorization list and the AAA server.
    For more information refer to the link-
    http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a00808c7234.shtml
    http://technet.microsoft.com/en-us/library/cc759077(v=ws.10).aspx
    Hope this will help you.

  • Minimum distance between access points

    Is it possible to locate 2 ap's (1200s) so close that they desense each other? I'm having some performance issues in an area where the 1200s are pretty close to each other.
    Thanks for any help on this.
    Mark

    Hi Mark,
    It is possible to locate AP's so close that they cause each other problems. Here is a link to a good document for the 1200 AP.
    http://www.cisco.com/en/US/products/hw/wireless/ps430/products_tech_note09186a00805190f1.shtml#topic4
    Here is an excerpt from the actual doc:
    Position the APs Optimally
    "The placement of the APs at the correct places is an important factor that accounts in the extension of the coverage area of the AP. Too many APs in the same vicinity can create radio congestion and interference, and reduce the throughput.
    A careful site survey can determine the best placement of APs for maximum radio coverage and throughput."
    Hope this helps!
    Rob
    Please remember to rate helpful posts...........

  • Roaming between two WiFi access points fails

    Hi...
    I just bought a Hawking WiFi range extender...a device that acts like a second wireless access point for rooms that are far from your wireless router. It's also known as a repeater. It has the same SSID (network name) as the one set up by the router.
    You are supposed to be able to move about the house and you will connect to whichever device has the higher signal strength, transparently, with no hiccups, like moving your cell phone from one cell antenna to another.
    The setup works fine with my Dell laptop, but not with my MacBook Pro or my iPad. When I change "zones", the Network locks up. This is repeatable and consistent.
    I've heard rumors about Apple product difficulties with this "WiFi roaming."
    Can anyone help?
    Thx
    Steve

    I've been using a roaming setup in my home for years.  The company I work for has building wide WiFi roaming setup with multiple WiFi access points on each floor.  At home and at work, I frequently move my MacBook between access points without loosing things like my VPN, Screen Sharing, File Sharing, ssh terminal sessions, etc....
    But 3rd party networking hardware has not always been well tested against Apple products.  Many times 3rd party networking vendors test against some version of Windows and then ship it.  Sometimes the 3rd party vendor offers a firmware update that corrects issues with Apple products.
    At home I have Apple Airport Extreme base stations for my roaming setup.  At work, the company is using Cisco commercial WiFi access points.
    A roaming setup needs to have all WiFi devices on the same network "Subnet".  That means a 2nd WiFi base station cannot act as a router, but must be just a bridge on the existing router's subnet (generally that means it cannot be offering DHCP services nor NAT services).
    The 2nd WiFi base station must have the same SSID (as you said you setup).
    And it must have the same security password using the same encryption algorithm (WPA2 preferred from a security stand point).  You did not mention this, but I'll assume you did this as well.

  • Connection between lightweight access point and switch?

    Hello everybody,
    I am a bit confused about cisco 1000 series access point connection. On wireless lan controller and lightweight access point basic configuration example document id 69719 (http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a0080665cdf.shtml), I understood the access point has two vlans associated with (vlan 3 and 4). Am I correct?
    Why is connection between access point and catalyst port just access port rather 802.1q trunk? How vlan traffic can traverse from the access point to controller?
    Please advice.
    Many thanks,
    Nitass

    Nitass,
    The AP itself does not need to be a trunked port, but the uplink to the controller does. When using a Lightweight enviroment, all the traffic passes thru an encrypted LWAPP tunnel from the AP to the controller, and then gets sent out the correct VLAN interface on the controller.

  • How to improve client handover and roaming between AP's

    Improving client Handover and roaming between APs
    There are a few standards and methodologies available to use to improve handover of clients between APs. Most are focused on VOIP technologies, but it must always be remembered that we cannot control the client Handover (especially with legacy clients) we can only encourage them. Some Standards and methods work well for some environments and some do not - test the recommendations extensively before implementing in a live Production environment. It must also be noted that all settings take effect immediately once applied, however from a client perspective it might need to re-associate for the changes to take effect client side.
    As with everything else in IT, if a perfect method/solution existed there would only be one - try them all and keep the best.
    The Standards and Definitions
    802.11k
    IEEE 802.11k allows a device to quickly identify nearby APs that are available for roaming. When the signal strength of the current AP weakens and the device needs to roam to a new AP, it will already know the best candidate AP with which to connect to.
    802.11r
    IEEE 802.11r specifies fast Basic Service Set (BSS) transitions between access points by redefining the security key negotiation protocol, allowing both the negotiation and requests for wireless resources to occur in parallel.
    When a device roams from one AP to another on the same network, 802.11r streamlines the authentication process. BSS allows a devices to associate with APs more quickly. Coupled with 802.11k's ability to quickly identify the target AP, BSS's faster association method may enhance application performance.
    Handoff Assist
    The AP monitors the RSSI for every associated client. If the RSSI for a specific client falls below "low-rssi-threshold" and continues to fall for the "rssi-falloff-wait-time", then the AP will send a de-auth to the client. 
    The de-auth is meant to kick the client away from the current AP and get it to re-authenticate to a nearby AP. This will have the effect of helping a client handover between 2 APs.
    BUT (Big But), if the client gets de-authed and takes a while to re-authenticate (if it even does re-authenticate automatically after a de-auth), then this will have the effect of destroying communication instead of helping it -- mostly found with legacy clients. 
    Remove Lower Transmit Rates
    Removing lower transmit rates is a way to promote better roaming, BUT not all clients respond well, or even respond to it. 
    The practice is that the basic rates are a subset of the transmit rates. If you only want to allow speeds 9 and up, you would select only the transmit rates of 9 and up, and the basic rates of 9 and 11. If a legacy client expects the rates of 1 and 2 it will not connect.
    Local Probe Threshold
    Local probe Threshold prevents a client from connecting to an AP with a too low a signal - helps more with initial connection than roaming.
    The local probe threshold parameter is not supposed to force clients to roam as soon as they pass near an access point with a good signal, but rather to NOT hold on to an access point with a weak signal (avoiding sticky clients).
    PMK Caching
    Defined by 802.11i and is a technique available for authentication between a single AP and a station. If a station has authenticated to an AP, roams away from that AP, and comes back, it does not need to perform a full authentication exchange. Only the 802.11i 4-way handshake is performed to establish transient encryption keys.
    Opportunistic Key Caching (OKC)
    Is a similar technique to PMK, but not defined by 802.11i, for authentication between multiple APs in a network where those APs are under common administrative control. An Aruba deployment with multiple APs under the control of a single controller is one such example. Using OKC, a station roaming to any AP in the network will not have to complete a full authentication exchange, but will instead just perform the 4-way handshake to establish transient encryption keys
    Implementation and Configuration
    802.11k
    802.11k is configured in your VAP profile. Tick the option to “Advertise 802.11k”. There after set the Handover Trigger Feature Settings.
    Tick the “Enable Handover Trigger feature” and then set RSSI threshold by specifying the -dBm level at what the hand over trigger should be sent to the client
    802.11r
    802.11r is configured under SSID of your VAP profile. Tick the option to “Advertise 802.11r”
    HandofF Assist
    Station Handoff Assist is enabled in RF Optimization under the RF Management section of AP configuration.
    Tick the “Station Handoff Assist” option to enable it, next set the Low RSSI Threshold – the threshold determines above what level no deauth gets sent
    Lower Transmit Rates
    Transmit rates can be adjusted in the Advanced tab of SSID under your VAP profile.
    Remember that the basic rates are a subset of the transmit rates. If you only want to allow speeds 9 and up, you would select only the transmit rates of 9 and up, and the basic rates of 9 and 11
    Local Probe threshold
    Local Probe threshold can be adjusted in the advanced tab of SSID under your VAP profile.
    Depending on the density of your APs consider values between 20 and 40 -- 40 being aggressive in an AP dense area.
    Deny Broadcast Probes
    Denying Broadcast Probes can cause problems with Roaming especially if the SSID is hidden – leave option disabled.

    Hi, thank you for the helpful guidance.  I have a basic question, if the device roam from one AP to another AP with the same SSID.  Is there a need of re-authentication given a) the network uses EAP based authentication; b) the network uses MAC address authentication.   If there is no need of EAP re-authentication, how the 802.11 keys are moved to the new AP.  Thank you very much if you could help me clarify my thought. 

  • Scanning Access Points configured with JAPAN Channels

    Hi,
    I have configured the below mentioned configuration for my Access Point. These wireless networks are not appearing in windows client network list. I have tried explicit scan also. Still it is not showing networks with 184,188 channels. But it is showing all remaining networks.
    Country code: JAPAN
    SSID for WLAN 1: Wireless Network1
    WLAN 1 mode: 5 GHz 54Mbps (802.11a)
    WLAN 1 auto channel: Enabled
    WLAN 1 channel: 184 (4920MHz)
    WLAN 1 alt. channel: 188 (4940MHz)
    SSID for WLAN 2: Wireless Network2
    WLAN 2 mode: 5 GHz 54Mbps (802.11a)
    WLAN 2 auto channel: Enabled
    WLAN 2 channel: 188 (4940MHz)
    I am using CISCO AIRONET 802.11a/b/g WIRELESS ADAPTER. This problem can occur due to the following reasons.
    (1) Do I need to set any region settings at Adapter?
    (2) Does adapter firmware depends upon
    country? How do I check the adapter firware?
    (3) Is there anything wrong with adapter vendor driver? Do I need to set anything in driver level for supporting JAPAN channels.
    Anyone please help me to identify and resolve the above problem.
    Thanks

    What channels are available? The 802.11b standard defines a total of 14 frequency channels. The FCC allows channels 1 through 11 within the U.S.; whereas, most of Europe can use channels 1 through 13. In Japan, you have only one choice: channel 14.
    An important concept to note regarding channel assignments is that the channel actually represents the center frequency that the transceiver within the radio and access point uses (e.g., 2.412 GHz for channel 1 and 2.417 GHz for channel 2). There is only 5 MHz separation between the cente frequencies, and an 802.11b signal occupies approximately 30 MHz of the frequency spectrum. The signal falls within about 15 MHz of each side of the center frequency. As a result, an 802.11b signal overlaps with several adjacent channel frequencies. This leaves you with only three channels (channels 1, 6, and 11 for the U.S.) that you can use without causing interference between access points.
    http://www.cisco.com/en/US/prod/collateral/wireless/ps7183/ps469/product_data_sheet09186a008008883b.html

  • Roaming between RV220W wireless router and WAP121 Access Point

    Hello, I have recently purchased a RV220W wireless router and a WAP121 access point and i would like to allow my users to "roam" between the two networks as needed (so when the user is closer to whichever one they connect to that one since it has a better signal). For the most part I only have experience in cisco IOS and in actual routers not the wireless stuff so my knowledge has not exactly transfered over well.

    William,
    WDS will not work between the RV220W and WAP121 due to incompatible chipsets. The RV220W can be repeated using WDS by another RV220W or RV180W only. You will need to plug the WAP121 into the RV220W or try WorkGroup Bridge mode to repeat the signal.
    Regarding roaming, the router or AP are not aware of each other and do not have the capability to disconnect a client and help them connect to the AP with the stronger signal. The client will switch to the stronger AP only when the original signal is lost.
    The Aironet (enterprise) devices have the ability to utilize a wireless LAN controller which can help keep devices connected to the stronger signal and allow truly seamless roaming between APs.
    - Marty

  • Wireless Client Authentication issues when roaming Access Points (Local)

    I have a Cisco 5508 with Software version 7.4.121.0 and Field Recovery 7.6.101.1.
    There are a handful of clients that when roaming between AP's with the same SSID that get an authentication issue and have to restart the wireless to get back on.
    From Cisco ISE
    Event
    5400 Authentication failed
    Failure Reason
    11514 Unexpectedly received empty TLS message; treating as a rejection by the client
    Resolution
    Ensure that the client's supplicant does not have any known compatibility issues and that it is properly configured. Also ensure that the ISE server certificate is trusted by the client, by configuring the supplicant with the CA certificate that signed the ISE server certificate. It is strongly recommended to not disable the server certificate validation on the client!
    Root cause
    While trying to negotiate a TLS handshake with the client, ISE expected to receive a non-empty TLS message or TLS alert message, but instead received an empty TLS message. This could be due to an inconformity in the implementation of the protocol between ISE and the supplicant. For example, it is a known issue that the XP supplicant sends an empty TLS message instead of a non-empty TLS alert message. It might also involve the supplicant not trusting the ISE server certificate for some reason. ISE treated the unexpected message as a sign that the client rejected the tunnel establishment.
    I am having a hard time figuring out what is causing this. My assumption is if there were a problem with the Controller or AP configurations then it would happen to everyone. My further assumption is if the client had a problem with their laptop (windows 7) then why does work at other times? So I have checked and the ISE certificate is trusted by client.
    Is something happening that the previous access point is holding on to the mac and the return authentication traffic is going to the old AP instead of the new one or something like that which is corrupting the data?
    I also had this from Splunk for the same client:
    Mar 5 13:44:51 usstlz-piseps01 CISE_Failed_Attempts 0014809622 1 0 2015-03-05 13:44:51.952 +00:00 0865003824 5435 NOTICE RADIUS: NAS conducted several failed authentications of the same scenario
     FailureReason="12929 NAS sends RADIUS accounting update messages too frequently"
    Any help on this would be appreciated. These error messages give me an idea but doesn't give me the exact answer to why the problem occurred and what needs to be done to fix it.
    Thanks

    Further detail From ISE for the failure:
    11001
    Received RADIUS Access-Request
    11017
    RADIUS created a new session
    15049
    Evaluating Policy Group
    15008
    Evaluating Service Selection Policy
    15048
    Queried PIP
    15048
    Queried PIP
    15004
    Matched rule
    15048
    Queried PIP
    15048
    Queried PIP
    15004
    Matched rule
    11507
    Extracted EAP-Response/Identity
    12500
    Prepared EAP-Request proposing EAP-TLS with challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12301
    Extracted EAP-Response/NAK requesting to use PEAP instead
    12300
    Prepared EAP-Request proposing PEAP with challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12302
    Extracted EAP-Response containing PEAP challenge-response and accepting PEAP as negotiated
    12318
    Successfully negotiated PEAP version 0
    12800
    Extracted first TLS record; TLS handshake started
    12805
    Extracted TLS ClientHello message
    12806
    Prepared TLS ServerHello message
    12807
    Prepared TLS Certificate message
    12810
    Prepared TLS ServerDone message
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    12305
    Prepared EAP-Request with another PEAP challenge
    11006
    Returned RADIUS Access-Challenge
    11001
    Received RADIUS Access-Request
    11018
    RADIUS is re-using an existing session
    12304
    Extracted EAP-Response containing PEAP challenge-response
    11514
    Unexpectedly received empty TLS message; treating as a rejection by the client
    12512
    Treat the unexpected TLS acknowledge message as a rejection from the client
    11504
    Prepared EAP-Failure
    11003
    Returned RADIUS Access-Reject

Maybe you are looking for