Wireless client disconnecting

Hi All,
We have a WLAN setup with 1 AP 1230 assigned as a WDS, and the 16 APs configured as Infrastructure AP. Off late, I am experiencing a problem where all my clients are getting disconnected frequently. I have checked the logs and the logs indicate the follwoing:
%DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x19B42) received from 0013.ced4.bd48.
Oct 24 12:45:42 172.20.166.22 5673: Oct 24 07:15:42.428: %DOT11-3-TKIP_MIC_FAILURE_REPEATED: Two TKIP Michael MIC failures were detected within 48 seconds on Dot11Radio0 interface. The interface will be put on MIC failure hold state for next 60 seconds.
Oct 24 12:45:42 172.20.166.22 5674: Oct 24 07:15:42.429: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x19B43) received from 0013.ced4.bd48.
Oct 24 12:45:42 172.20.166.22 5675: Oct 24 07:15:42.430: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x19B44) received from 0013.ced4.bd48.
Oct 24 12:45:42 172.20.166.22 5676: Oct 24 07:15:42.430: Too many MIC failures.
I need a solution to overcome this problems. Please let me know if you need any further information, to help me provide a solution.
regds,
Mahesh

Good afternoon Mahesh...
Similar to a CRC, TKIP uses Message Integrity Check(MIC) to ensure protection of the payload and headers. Presently the Michael algorithm is used to accomplish this function. Essentially these messages are early warning signs of RF interference, hardware failure and or an active attack.
The initial error message of TKIP_MIC_FAILURE is rather harmless, as there is no effect to surrounding clients. It simply states that the AP has received a packet which failed its integrity check. MIC replaced WEP's CRC-32 checksum for improved security. You will NOT see this issue in LEAP as it does not utilize MIC.
TKIP_MIC_FAILURE_REPEATED, however is another story. If you see this log entry on an access point, you will want to respond quickly. This is stating that a workstation has sent X number of MIC failures in a certain number of seconds. As stated by the 802.11i standard, the access point goes into a blackout period. ( Cisco's default is 60 second blackout period), what this does is disassociates all wireless clients associated with the access point and puts the radio in a type of hold where it does not allow any associations until the blackout is lifted.
The offending client and those associated with the access point do not receive any sort of error. All the user will notice, is that their laptop's wireless has been disconnected. If the user's laptop is able to access another AP it will attempt to connect to it, if behaving and configure correctly. What we have seen in at our facility is the offending client will continue to cause TKIP errors and bring down the AP it just connected to.
Is there a Band-Aid to this problem?
Interface dot11radio x
countermeasure tkip hold-time 0
This is NOT a solution, its simply a fix to keep your APs from going into blackout. Again I would only use this if you had a larger volume of laptops with malfunctioning nics than your local techsupport could handle.
There are two typical causes for these errors, hardware problems and RF issues. RF changes even at 5ft, if you are able to go to multiple areas of your facility (saying you have a large facility) and take still shoot out errors, you likly have a hardware issue. Replace the card and your good to go.
While upgrading to the latest IOS is always the best messure even when not facing problems you will likly not see a decrease/increase.
hope this helps.... Simply put , research if its a single laptop... If it is, attempt to replace the nic.. We had one laptop which even after reloading the IOS, swapping the cards, etc it kept commiting the units. We kept the harddrive and sent the laptop off and was RMA'd. New laptop came in, put the old hdd back in, no problems.
We have not noticed a link between driver version nor firmware...

Similar Messages

  • Wireless Client Disconnects

    Greetings,
    I have (two) of the latest Intel 802.11n/ac PCI desktop client adapters each connected to a set of external dual antennas.  Both are running Win 8.1, basically they are identical and both are less than 20ft from the ceiling mounted AP.  One client seems to work fine but the other will disconnect at random times at least once a day.  Once that client is disconnected it can’t see any of our SSIDs for 5 to 20 mins. But it can see other Wi Fi signals / hotspots, etc.
    Average RSSI is -61, SNR is 31
    We've been running the following stable configuration for the past number of months:
    - One 5508WLC - 7.5.102.0
    - APs-3602I all running 802.11n (not .ac) in FlexConnect local switching mode
    - Prime Infrastructure 1.3
    - ISE 1.1.3
    We've reinstalled Windows and updated the adapter drivers...no change.  It seems obvious to me that it's a client issue but how can I log and prove it?
    ISE doesn't show any authentications problems.  I've read through other "client disconnect" posts here and made the few WLC setting changes recommended.  I’ve turned on debugging on the WLC for the MAC of that client. The WLC msglog never logs anything against the client MAC.  What other AP or WLC logs or debugging can I look at? 
    Thanks
    Michael

    Create an OPEN SSID and get the client to join.
    Provide additional details:
    1.  debug client ;
    2.  sh client detail ;
    3.  What is the make and model of the wireless NIC of the client?  What is the firmware version number?

  • Is it possible to to disconnect 2 wireless clients from my wireless network without access to the clients i.e. 2 iPads?

    Is it possible to disconnect 2 wireless clients from my network if I do not have access to the clients? ie 2 iPads.

    You would have to set up Timed Access for each device.
    This consists of specifying the amount of time each day that wireless devices will be allowed to connect to the network. You must provide a MAC or hardware address for each device, which is a long code that might look something like this, for example......A1-B2-C3-D4-E5-F6....and then specify the hours each day that this device is allowed to connect to the wireless network.
    You have to do this for each device, which is tedious. Devices that are not on the Access List cannot connect to the network at any time.

  • WRT610N disconnects when transfering from wireless client to wired client

    based on reviews, I purchased a WRT610N.
    Have it setup with wireless N to work with my two laptops, and also have a desktop connected to one of the gig ports.
    Whenever I try to transfer any files (or access the desktop) from any of the wireless clients, the wireless radio part of the router seem to reboot itself every 5 to 10 seconds.  
    If I go from a wireless client to another wireless client, it works fine.  If I plug one of the laptops into one of the gig ports and transfer files to the desktop through the wired connection, it works fine.  But as soon as either laptop try to access the desktop through the wireless connection, the radio goes into a reboot cycle until I stop trying to access the desktop.
    Router has latest firmware.  the two laptops has a Intel 5300 and intel 4965AGN card, both running windows 7, desktop is also running windows 7.
    Used to be able to do this with a WRT150n without any issues,  upgraded to the WRT610N for the gig port speed, but now this issue.
    appreciate any assistance.

    Ok I disabled IPV6 and now it will go about a minute of transferring files before the wireless dies.
    AP Isolation is disabled.
    Even tried from within the same room, direct line of sight from the laptop to the Router, about 5 to 7 feet away.  Computer shows wireless signal at full strength.
    I don't think it's the wireless cards in the laptops because I used the exact same setup with a WRT150N and WRT54GR  and both work fine (although slower).
    Just as a sanity check, I put the WRT150N back in last night and tested it,  it would let me transfer files all night long without disconnecting.

  • HWIC-AP-AG-A keep on disconnecting wireless clients sometime its ok but sometimes its not

    hi,
    i have a  HWIC-AP-AG-A running in 2801 router.
    RTR01(config-if)#do sho run int Dot11Radio0/1/0
    Building configuration...
    Current configuration : 367 bytes
    interface Dot11Radio0/1/0
    no ip address
    no dot11 extension aironet
    encryption vlan 30 mode ciphers tkip
    encryption vlan 40 mode ciphers tkip
    encryption vlan 10 mode ciphers tkip
    ssid GuestUsers
    ssid InternalUsers
    ssid SecureZone
    speed basic-6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
    channel 2412
    station-role root
    no cdp enable
    end
    RTR01(config-if)#do sho run int Dot11Radio0/1/1
    Building configuration...
    Current configuration : 325 bytes
    interface Dot11Radio0/1/1
    no ip address
    encryption vlan 30 mode ciphers tkip
    encryption vlan 40 mode ciphers tkip
    encryption vlan 10 mode ciphers tkip
    ssid GuestUsers
    ssid InternalUsers
    ssid SecureZone
    speed basic-6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
    station-role root
    no cdp enable
    there are days that the wireless signal is keep on disconnecting.. im no sure what is the problem or.. what can i do?
    n Interface FastEthernet0/3/0, changed state to up
    *Jan 12 11:00:25.511: %LINK-3-UPDOWN: Interface BVI30, changed state to down
    *Jan 12 11:00:25.511: %LINK-3-UPDOWN: Interface BVI40, changed state to down
    *Jan 12 11:00:26.535: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI30, changed state to down
    *Jan 12 11:00:26.535: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI40, changed state to down
    *Jan 12 11:00:27.679: %DSPRM-5-UPDOWN: DSP 1 in slot 0, changed state to up
    *Jan 12 11:00:28.091: %LINK-3-UPDOWN: Interface Foreign Exchange Office 0/0/0, changed state to up
    *Jan 12 11:00:28.503: %LINK-3-UPDOWN: Interface Foreign Exchange Office 0/0/1, changed state to up
    *Jan 12 11:00:28.735: %LINK-3-UPDOWN: Interface Foreign Exchange Station 0/2/1, changed state to up
    *Jan 12 11:00:28.843: %LINK-3-UPDOWN: Interface Foreign Exchange Station 0/2/0, changed state to up
    *Jan 12 11:00:31.563: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel1, changed state to up
    *Jan 12 11:00:32.290: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/0 assigned DHCP address 222.164.193.47, mask 255.255.252.0, hostname marlonmalinao.homeip.net
    *Jan 12 11:00:33.582: %LINEPROTO-5-UPDOWN: Line protocol on Interface Tunnel100, changed state to up
    *Jan 12 11:00:42.381: %DUAL-5-NBRCHANGE: IP-EIGRP(0) 123: Neighbor 10.10.254.1 (Tunnel1) is up: new adjacency
    *Jan 12 11:00:44.773: %SSH-5-SSH2_SESSION: SSH2 Session request from 172.25.254.4 (tty = 0) using crypto cipher 'aes256-cbc', hmac 'hmac-sha1' Succeeded
    *Jan 12 11:00:56.652: %SSH-5-SSH2_USERAUTH: User 'mc.malinao' authentication for SSH2 Session from 172.25.254.4 (tty = 0) using crypto cipher 'aes256-cbc', hmac 'hmac-sha1' Succeeded
    *Jan 12 11:00:57.948: %DOT11-6-FREQ_USED: Interface Dot11Radio0/1/1, frequency 5320 selected
    *Jan 12 11:00:57.952: %LINK-3-UPDOWN: Interface Dot11Radio0/1/1, changed state to up
    *Jan 12 11:00:59.076: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0/1/1, changed state to up
    *Jan 12 11:01:00.172: %LINK-3-UPDOWN: Interface BVI30, changed state to up
    *Jan 12 11:01:01.171: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI30, changed state to up
    *Jan 12 11:01:05.499: %LINK-3-UPDOWN: Interface BVI40, changed state to up
    *Jan 12 11:01:06.499: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI40, changed state to up
    *Jan 12 11:01:13.202: %IPPHONE-6-REG_ALARM: 14: Name=SEP001E4AF3B6D4 Load= SCCP70.8-4-2S Last=UCM-closed-TCP
    *Jan 12 11:01:13.206: %IPPHONE-6-REGISTER: ephone-6:SEP001E4AF3B6D4 IP:172.25.254.61 Socket:1 DeviceType:Phone has registered.
    *Jan 12 11:01:25.401: %DOT11-6-ASSOC: Interface Dot11Radio0/1/1, Station   8c7b.9dde.e8f9 Associated SSID[InternalUsers] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]
    *Jan 12 11:01:37.236: %DOT11-6-ASSOC: Interface Dot11Radio0/1/1, Station MCMRTR01 0019.d2b8.3c68 Associated SSID[GuestUsers] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]
    *Jan 12 11:03:15.542: %DOT11-6-DISASSOC: Interface Dot11Radio0/1/1, Deauthenticating Station 0013.e8a2.a4c1 Reason: Sending station has left the BSS SSID[InternalUsers]
    *Jan 12 11:03:43.247: %LINK-3-UPDOWN: Interface Dot11Radio0/1/0, changed state to up
    *Jan 12 11:03:44.247: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0/1/0, changed state to up
    *Jan 12 11:07:20.957: %DOT11-7-AUTH_FAILED: Station 0013.e8a2.a4c1 Authentication failed
    *Jan 12 11:07:32.720: %DOT11-6-ASSOC: Interface Dot11Radio0/1/1, Station MCMX61 0013.e8a2.a4c1 Associated SSID[GuestUsers] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]
    *Jan 12 11:08:16.023: %DOT11-6-DISASSOC: Interface Dot11Radio0/1/1, Deauthenticating Station 8c7b.9dde.e8f9 Reason: Previous authentication no longer valid SSID[InternalUsers]
    *Jan 12 11:08:16.343: %DOT11-6-ASSOC: Interface Dot11Radio0/1/1, Station   8c7b.9dde.e8f9 Associated SSID[InternalUsers] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]
    *Jan 12 11:09:21.208: %DOT11-4-MAXRETRIES: Packet to client 8c7b.9dde.e8f9 reached max retries, removing the client
    *Jan 12 11:09:21.208: %DOT11-6-DISASSOC: Interface Dot11Radio0/1/1, Deauthenticating Station 8c7b.9dde.e8f9 Reason: Previous authentication no longer valid SSID[InternalUsers]

    Your wireless clients will associate to the best AP interms of signal strenght and signal to noise etc.
    There is an LWAPP tunnel between the access point and the controller.
    At the controller there will be logical interfaces for the wireless LANS that are asssociated to specific VLANs on the wired network.
    It doesn't matter where you are in the building as a client as its the controller that puts the client data onto the wired network.
    All client data is tunneled between the access point and the controller.
    With regard to the losing IP address situation. I assume that the clients do initially get an IP address and then lose it after a period of time.
    Check the session timeout paramter on the controller (look on the WLAN-Advanced).
    There is a bug with some versions of software relating to session timeouts. Try setting the timeout to 65535 seconds. The default setting is probably 30 minutes.

  • How to modify Time Capsule wireless clients?

    I have a Time Capsule that I use as the router for the house. We've had a lot of computers connected to it over the years. What I am wanting to know if it is possible to remove wireless clients that are connected or previously connected. Under Finder there is an HP computer that is connected but to my knowledge there is no Windows based computer using the network. At one point there was an old HP laptop connected to it. But for the life of me I can not find anything or figure out how to remove this computer from showing up under the Finder. I am confident that the problem resides at the router because I can see that same device connected.
    http://i.imgur.com/PXdR9XJ.png

    Under Finder there is an HP computer that is connected but to my knowledge there is no Windows based computer using the network.
    Maybe you have an HP printer that is connected either by wireless or Ethernet?
    Does the HP device show up in the list of current wireless clients? If not, then the HP device is connected via Ethernet to your network.
    What I am wanting to know if it is possible to remove wireless clients that are connected or previously connected.
    If a wireless device is already connected to the network, the only way that you can remove it is to change the wireless network password, or set up Timed Access on that device..
    Chaging the password will disconnect all connected devices, then you will have to log on again from each device that you want to connect.

  • Mobile based clients disconnecting frequently

    Hi folks,
    I have an 1142 running 15.2.2JB.  I noticed numerous messages of clients disconnecting with the following message:
    %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticating Station 847a.885b.622c Reason: Previous authentication no longer valid
    The MAC addresses involved are all associated to various mobile devices...iPad, iPhone, Windows 8 Mobile and Android (MAC above is an Android phone).  This doesn't appear to impact PC's and laptops (both Windows an Apple).
    The devices reconnect immediately and this doesn't appear to cause any problems with anything other than Android devices which register the disconnect immediately and therefore bin anything they're currently doing (for some reason the Windows 8 Mobile and Apple devices seem to be able to cope with the disconnect and reconnect and don't ditch anything network connections)
    Config on the AP is:
    dot11 ssid Frozen
       authentication open
       authentication key-management wpa version 2
       wpa-psk ascii 7 05261F303645480C260816190E1F3B3D242A2C362724060B2900005D5C4B12
    dot11 ssid FrozenSlow
       authentication open
       authentication key-management wpa version 2
       wpa-psk ascii 7 1124003A001B0D093B272A2F2D200A351C09120613504C546C570F081D0518
    interface Dot11Radio0
    no ip address
    encryption mode ciphers aes-ccm
    ssid FrozenSlow
    antenna gain 0
    speed  basic-1.0 2.0 5.5 11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.
    channel 2462
    station-role root
    no dot11 extension aironet
    no cdp enable
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 spanning-disabled
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    interface Dot11Radio1
    no ip address
    encryption mode ciphers aes-ccm
    ssid Frozen
    antenna gain 0
    no dfs band block
    speed  6.0 9.0 basic-12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.
    channel width 40-above
    channel dfs
    station-role root
    no dot11 extension aironet
    no cdp enable
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 spanning-disabled
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    When I debug dot11 aaa I see the following:
    211137: Oct 21 16:26:58.910: dot11_dot1x_gtk_update_on_disassociate: Recieved gtk update notice due to disconnect for 847a.885b.622c on vlan 0
    211138: Oct 21 17:26:58 BST: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticating Station 847a.885b.622c Reason: Previous authentication no longer valid Could not find station pointer for client 847a.885b.622c. Using vlan number from aaa_client
    211139: Oct 21 16:27:02.640: dot11_dot1x_send_ssn_eapol_key: wpav2 msg 1 pak_size 121
    211140: Oct 21 16:27:02.640: dot11_dot1x_send_ssn_eapol_key: eapol->length 117
    211141: Oct 21 16:27:02.640: dot11_dot1x_build_ptk_handshake: building PTK msg 1 for 847a.885b.622c
    211142: Oct 21 16:27:02.640: dot11_dot1x_build_ptk_handshake: ptk key len 16
    211143: Oct 21 16:27:02.640: dot11_dot1x_build_ptk_handshake: ptk key data len 22
    211144: Oct 21 16:27:02.640: dot11_dot1x_build_ptk_handshake: wpav2 pmkid[DOT1X]: 4252DC05F4159E0B7BAB4A3C56116E4F
    211145: Oct 21 16:27:02.689: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 2 from 847a.885b.622c
    211146: Oct 21 16:27:02.689: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x10, act=0x0)
    211147: Oct 21 16:27:02.689: dot11_dot1x_ssn_generate_ptk: wpa-v2 PSK: use ssid psk as pmk
    211148: Oct 21 16:27:02.689: dot11_dot1x_ssn_generate_ptk: dot11_dot1x_ssn_generate_ptk(): wpa-v2 clnt 847a.885b.622c does not have cached pmk rec: aaa_client->ms_mppe_receive_key:0x0
    211149: Oct 21 16:27:02.689: dot11_dot1x_verify_ptk_handshake: Handshake passedCould not find station pointer for client 847a.885b.622c. Using vlan number from aaa_client
    211150: Oct 21 16:27:02.690: dot11_dot1x_send_ssn_eapol_key:
    211151: Oct 21 16:27:02.690: wpav2 msg3 data_len before padding 46
    211152: Oct 21 16:27:02.690: dot11_dot1x_send_ssn_eapol_key:
    211153: Oct 21 16:27:02.690: wpav2 msg3 padding 2 data_len after padding 56, eapol pak_size 155
    211154: Oct 21 16:27:02.690: dot11_dot1x_send_ssn_eapol_key: wpav2 msg 3 pak_size 155
    211155: Oct 21 16:27:02.690: dot11_dot1x_send_ssn_eapol_key: eapol->length 151
    211156: Oct 21 16:27:02.690: dot11_dot1x_build_ptk_handshake: building PTK msg 3 for 847a.885b.622c
    211157: Oct 21 16:27:02.690: dot11_dot1x_build_ptk_handshake: ptk key len 16
    211158: Oct 21 16:27:02.690: dot11_dot1x_build_ptk_handshake: wpav2_ptk msg 3 rsnie len 22 and 20
    211159: Oct 21 16:27:02.690: dot11_dot1x_build_ptk_handshake mcst_key_len 16 index 1 vlan 0
    211160: Oct 21 16:27:02.690: gnonce: 01 DA 02 04 01 D2 FA 40 03 39 B1 50 00 1C 5A 2C 03 39 B1 50 00 00 00 00 00 00 00 00 01 D2 FA 40
    211161: Oct 21 16:27:02.691: gtk(pt): 1B 9E E3 5F B6 82 A7 A7 3F 1E 94 56 BD ED B1 8C
    211162: Oct 21 16:27:02.692:
    211163: Oct 21 16:27:02.692: gtk(pt) len 16: 1B 9E E3 5F B6 82 A7 A7 3F 1E 94 56 BD ED B1 8C
    211164: Oct 21 16:27:02.692:
    211165: Oct 21 16:27:02.693: dot11_dot1x_build_ptk_handshake:
    211166: Oct 21 16:27:02.693: build wpav2 ptk msg 3, pad data from 46 by 2
    211167: Oct 21 16:27:02.693: dump temp_key_data(pt) len 48: 30 14 01 00 00 0F AC 04 01 00 00 0F AC 04 01 00 00 0F AC 02 3C 00 DD 16 00 0F AC 01 01 00 1B 9E E3 5F B6 82 A7 A7 3F 1E 94 56 BD ED B1 8C DD 00
    211168: Oct 21 16:27:02.694:
    211169: Oct 21 16:27:02.694: dump eapol_encrypt_key: B7 06 7B 67 33 D2 41 86 8D 52 9C 0A 0C 8F D9 3A
    211170: Oct 21 16:27:02.695:
    211171: Oct 21 16:27:02.695:  key_data from len 48 to 56 (ct): 34 DA 2E 1C 7A 59 30 19 BA 1E 2B B8 A8 3B 67 48 93 80 F1 39 0A 1C CB D4 D5 51 5B 50 0D 32 7D FA FC A1 12 5C D9 19 3A 8D F4 87 44 97 5B F8 BE AE 21 01 1D C2 EF 90 FC E4
    211172: Oct 21 16:27:02.696:
    211173: Oct 21 16:27:02.696: dot11_dot1x_build_ptk_handshake:
    211174: Oct 21 16:27:02.697:  aes key wrap key_data from len 48 to 56 gtk(ct):
    211175: Oct 21 16:27:02.697: dump decrypted key data: 30 14 01 00 00 0F AC 04 01 00 00 0F AC 04 01 00 00 0F AC 02 3C 00 DD 16 00 0F AC 01 01 00 1B 9E E3 5F B6 82 A7 A7 3F 1E 94 56 BD ED B1 8C DD 00
    211176: Oct 21 16:27:02.698:
    211177: Oct 21 16:27:02.698: dot11_dot1x_build_ptk_handshake:
    211178: Oct 21 16:27:02.698: wpav2 msg 3 key data len 56
    211179: Oct 21 16:27:02.703: mic_key: 68 B6 19 DB EF CA 12 B1 DC B0 6C FD 7D 8B AD FF
    211180: Oct 21 16:27:02.704: hmac_sha1 mic for eapol pak len 155: E3 B5 76 CC 90 FB EA 8F E6 8F 20 16 9E CC 5F 8F
    211181: Oct 21 16:27:02.704: dot11_dot1x_build_ptk_handshake:
    211182: Oct 21 16:27:02.704: msg 3 hmac_sha1 mic for eapol_key len 155
    211183: Oct 21 16:27:02.710: dot11_dot1x_verify_ptk_handshake: verifying PTK msg 4 from 847a.885b.622c
    211184: Oct 21 16:27:02.710: dot11_dot1x_verify_eapol_header: Warning: Invalid key len (exp=0x10, act=0x0)
    211185: Oct 21 16:27:02.710: dot11_dot1x_verify_ptk_handshake: Handshake passed
    211186: Oct 21 17:27:02 BST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   847a.885b.622c Associated KEY_MGMT[WPAv2 PSK]
    Does anyone have any ideas why I'm seeing the message "Could not find station pointer" or any other idea's why this is happening?  A search of the web throws up many threads exhibiting the same symptoms but none seem to have a fix and the fixes there are (disable aironet extensions, extend the WPA handshake and disable guest mode) haven't worked so far.
    Many thanks,

    from that debug, the cleint was in a run state, then there was an EAPOL Start message.
    As Blake had asked, what type of device is it?  specifically what is the WNIC and driver versions?
    Wireless drivers do not get updated with the standard windows update.
    Steve

  • WRT120N: Wireless Client List - Refresh button useless

    WRT120N:
    Wireless --> Wireless MAC Filter --> Enabled --> Wireless client list...
    Opening Wireless Client List on WRT120N shows the list of wireless clients connected.
    Add button is working.
    Close button is working
    But Refresh button is useless. Even if clients on the lists are already not connected to the router, pressing the Refresh button does nothing. It may add new clients connected but can't determine whether the client disconnects or not. The only way to determine if the client is still connected or not is to Reboot the router (Administration --> Start Reboot).
    Refresh doesn't update/remove disconnected clients from the list.
    I'm hoping that on future firmware updates for WRT120N, this can be fixed.

    Did you try to upgrade/re-flash the firmware on your router?
    Connect the computer to the router with the Ethernet cable. Download the latest firmware from Linksys website and save it on your computer. Upgrade/re-flash the firmware on your router. After upgrading the firmware on your router, reset the router and reconfigure it.

  • WAG320N port forwarding to wireless client/bridge client

    Hi,
    My network looks like the above diagram:
    1. Wireless bridge connections.
    ADSL Line ==> WAG320N (192.168.1.1) == bridge client mode ==> TP-Link WR941ND (192.168.1.4) ==> Client (192.168.1.11)
    2. Lan connections.
    ADSL Line ==> WAG320N (192.168.1.1) == cable connection ==> Client (192.168.1.100)
    3. Wireless AP conenctions.
    ADSL Line ==> WAG320N (192.168.1.1) == wireless connection ==> Client (192.168.1.106)
    Port forwarding from WAN to LAN (scenario 2) clients works great, but I have problem with wireless clients (scenario 1 and 3). Accessing the wireless destination from LAN is possible. Also pings from WAG320N to the wireless destination looks OK.
    PING 192.168.1.11 (192.168.1.11) 60 bytes of data.
    60 bytes from 192.168.1.11: icmp_seq=1 ttl=63 time=1.69 ms
    60 bytes from 192.168.1.11: icmp_seq=2 ttl=63 time=1.62 ms
    60 bytes from 192.168.1.11: icmp_seq=3 ttl=63 time=2.23 ms
    60 bytes from 192.168.1.11: icmp_seq=4 ttl=63 time=1.60 ms
    60 bytes from 192.168.1.11: icmp_seq=5 ttl=63 time=2.12 ms
    60 bytes from 192.168.1.11: icmp_seq=6 ttl=63 time=3.78 ms
    60 bytes from 192.168.1.11: icmp_seq=7 ttl=63 time=1.61 ms
    60 bytes from 192.168.1.11: icmp_seq=8 ttl=63 time=1.56 ms
    60 bytes from 192.168.1.11: icmp_seq=9 ttl=63 time=2.08 ms
    60 bytes from 192.168.1.11: icmp_seq=10 ttl=63 time=3.37 ms
    --- 192.168.1.11 ping statistics ---
    10 packets transmitted, 10 received, 0% packet loss, time 9002ms
    rount-trip min/avg/max/mdev = 1.569/2.172/3.788/0.748
    Forwarding external port 9090 to wireless client (192.168.1.11:80) is not working. I am thinking of resetting to default settings. What do you think?

    nicebilal_007 wrote:
    Hope ! You are fine.I am using LINKSYS  WAG320N since 10 days.I am facing no. of issues.If wifi is on & i connect "LAN PORT OF MY PC" to LINKSYS WAG320N or with ADSL Modem.My LAN doesn't work.
    When i am using wifi,it frequently disconnects or doesn't work.
    There is no fault from my ISP Provider.
    Anyone can address my issues...Thanks a lot....
    From:Bilal Ali-Pakistan
    [email protected]
    0092-344-7127679
    Reset the WAG320N then check if you are getting a valid ip address to know if it is still assigning an ip address to the network. To reset, press and hold the reset button for 30 seconds while the power on. After that, release the button and power off the WAG. Leave it off for 30 seconds then power it back on. Wait for the power light to stop blinking then check if you have a valid ip address with the computer. You may click  the link below on how to check the ip address of the computer:
    Title: Checking your computer’s IP address
    Article ID: 3996
    http://kb.linksys.com/Linksys/ukp.aspx?vw=1&docid=d02ed3aa3e704caea42f5c007b8c6472_3996.xml&pid=80&r...

  • Wireless Clients cannot communicate to eachother.

    I have a 871W router that I am having trouble getting wireless clients to communicate.
    I can ping and use applications from any wired client to any wireless device. However I am unable to ping or use any other protacol from one wireless device to another.
    I have confirmed that there is no firewalls on the endpoints blocking communication.
    I have removed ACLs on the BVI1 interface but that had no affect.
    Any assistance would be greatly appreciated.
    Current configuration : 7670 bytes
    version 12.4
    no service pad
    service tcp-keepalives-in
    service tcp-keepalives-out
    service timestamps debug datetime msec localtime show-timezone
    service timestamps log datetime msec localtime show-timezone
    service password-encryption
    service sequence-numbers
    hostname cc-fw-router
    boot-start-marker
    boot-end-marker
    logging buffered 51200 debugging
    enable secret 5 $1$crkU$2cWtWnMRjMvfo4ADb4pfi0
    aaa new-model
    aaa authentication login default local none
    aaa session-id common
    resource policy
    clock timezone PCTime -5
    clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
    ip subnet-zero
    no ip source-route
    ip cef
    no ip dhcp use vrf connected
    ip dhcp excluded-address 10.10.10.1
    ip dhcp excluded-address 10.10.20.1
    ip dhcp pool sdm-pool1
       import all
       network 10.10.20.0 255.255.255.0
       default-router 10.10.20.1
       dns-server 192.168.2.244 8.8.8.8
    ip dhcp pool xbox
       host 10.10.20.20 255.255.255.0
       hardware-address 0100.1dd8.5b52.73 ieee802
       dns-server 192.168.2.251 4.2.2.2
    ip inspect name DEFAULT100 cuseeme
    ip inspect name DEFAULT100 ftp
    ip inspect name DEFAULT100 h323
    ip inspect name DEFAULT100 icmp
    ip inspect name DEFAULT100 netshow
    ip inspect name DEFAULT100 rcmd
    ip inspect name DEFAULT100 realaudio
    ip inspect name DEFAULT100 rtsp
    ip inspect name DEFAULT100 esmtp
    ip inspect name DEFAULT100 sqlnet
    ip inspect name DEFAULT100 streamworks
    ip inspect name DEFAULT100 tftp
    ip inspect name DEFAULT100 tcp
    ip inspect name DEFAULT100 udp
    ip inspect name DEFAULT100 vdolive
    ip tcp synwait-time 10
    no ip bootp server
    ip domain name yourdomain.com
    ip name-server 4.2.2.2
    ip ssh time-out 60
    ip ssh authentication-retries 2
    crypto pki trustpoint TP-self-signed-1816499983
    enrollment selfsigned
    subject-name cn=IOS-Self-Signed-Certificate-1816499983
    revocation-check none
    rsakeypair TP-self-signed-1816499983
    crypto pki certificate chain TP-self-signed-1816499983
    certificate self-signed 01
      30820252 308201BB A0030201 02020101 300D0609 2A864886 F70D0101 04050030
      31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
      69666963 6174652D 31383136 34393939 3833301E 170D3038 30323039 32313436
      31395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
      4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 38313634
      39393938 3330819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
      8100BD37 F594F5B4 726A60BA 2C99B43C 0DE6814A 17BB53C2 A2202828 D6AA7774
      7E3FF99D 7A6B06D8 C7A52D0E 2989CF78 F5E892C0 9A9DA783 1E6C8B59 6F8B01D7
      1E631226 D372D65B 6E72CA49 D572FEA6 26131F83 32F87678 4B13735F 383D9F65
      287E2CE3 46459CAD 582DB438 6E599885 BAE48719 4AC9EB73 8BC32114 C6C637C9
      80350203 010001A3 7A307830 0F060355 1D130101 FF040530 030101FF 30250603
      551D1104 1E301C82 1A63632D 66772D70 65746572 2E796F75 72646F6D 61696E2E
      636F6D30 1F060355 1D230418 30168014 391859D0 F5A8499D 8EF185B7 DC937161
      7F2B7CBA 301D0603 551D0E04 16041439 1859D0F5 A8499D8E F185B7DC 9371617F
      2B7CBA30 0D06092A 864886F7 0D010104 05000381 8100BC17 189FF9F1 01349085
      70E363E9 47AB7A9A 6F80498B D8F727DF 687CC37E 8FF3024F 30451A97 C4C81676
      C2FCA1A0 2B51D091 AA0B44E7 BA7FCA6A ED98CF5F 3EE60AD4 AB79DB09 BBE94F64
      C83FB22E 8936E561 C84AF542 DB4756E3 6EF31359 4210262A 43D2E1F7 15DD3E32
      15278156 9569D8BE 5EC38773 9A2EFB63 11C55FFD 93B4
      quit
    username user privilege 15 secret 5 $1$wVlg$THSMUBnF3f3A3o2Oh18xS/
    username ccadmin password 7 09774C051612111B180439
    crypto isakmp policy 1
    encr 3des
    authentication pre-share
    group 2
    crypto isakmp key 01234567890123456789 address 96.252.99.66 no-xauth
    crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto map SDM_CMAP_1 1 ipsec-isakmp
    description Tunnel
    set peer OFFICEVPN IP
    set transform-set ESP-3DES-SHA1
    match address 103
    bridge irb
    interface FastEthernet0
    interface FastEthernet1
    interface FastEthernet2
    interface FastEthernet3
    interface FastEthernet4
    description $FW_OUTSIDE$$ES_WAN$
    no ip address
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip virtual-reassembly
    ip route-cache flow
    duplex auto
    speed auto
    pppoe enable group global
    pppoe-client dial-pool-number 1
    interface Dot11Radio0
    no ip address
    encryption mode ciphers tkip
    ssid my_home
        authentication open
        authentication key-management wpa
        guest-mode
        wpa-psk ascii 7 133E1413181F0138273D15
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    station-role root
    no dot11 extension aironet
    bridge-group 1
    bridge-group 1 spanning-disabled
    interface Vlan1
    description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$FW_INSIDE$
    no ip address
    ip virtual-reassembly
    bridge-group 1
    interface Dialer0
    description $FW_OUTSIDE$
    ip address negotiated
    no ip redirects
    no ip unreachables
    no ip proxy-arp
    ip mtu 1452
    ip nat outside
    ip virtual-reassembly
    encapsulation ppp
    ip route-cache flow
    dialer pool 1
    dialer-group 1
    no cdp enable
    ppp authentication chap pap callin
    ppp chap hostname verizonfios
    ppp chap password 7 01050316521109012745411A
    ppp pap sent-username verizonfios password 7 120F00051B11030A2C222B3B
    crypto map SDM_CMAP_1
    interface BVI1
    description $ES_LAN$$FW_INSIDE$
    ip address 10.10.20.1 255.255.255.0
    ip access-group 100 in
    ip nat inside
    ip virtual-reassembly
    ip tcp adjust-mss 1200
    ip classless
    ip route 0.0.0.0 0.0.0.0 Dialer0
    ip http server
    ip http authentication local
    ip http secure-server
    ip http timeout-policy idle 60 life 86400 requests 10000
    ip nat inside source route-map SDM_RMAP_1 interface Dialer0 overload
    ip nat inside source static udp 10.10.20.20 88 interface Dialer0 88
    ip nat inside source static tcp 10.10.20.20 3074 interface Dialer0 3074
    ip nat inside source static udp 10.10.20.20 3074 interface Dialer0 3074
    logging 10.10.20.27
    access-list 1 remark INSIDE_IF=BVI1
    access-list 1 remark SDM_ACL Category=2
    access-list 1 permit 10.10.10.0 0.0.0.255
    access-list 1 permit 10.10.20.0 0.0.0.255
    access-list 100 remark auto generated by Cisco SDM Express firewall configuration
    access-list 100 remark SDM_ACL Category=1
    access-list 100 deny   ip host 255.255.255.255 any
    access-list 100 deny   ip 127.0.0.0 0.255.255.255 any
    access-list 100 permit ip any any
    access-list 103 remark SDM_ACL Category=4
    access-list 103 remark IPSec Rule
    access-list 103 permit ip 10.10.20.0 0.0.0.255 192.168.2.0 0.0.0.255
    access-list 103 permit ip 10.10.20.0 0.0.0.255 10.1.1.0 0.0.0.255
    access-list 110 deny   ip 10.10.20.0 0.0.0.255 10.1.1.0 0.0.0.255
    access-list 110 deny   ip 10.10.20.0 0.0.0.255 192.168.2.0 0.0.0.255
    access-list 110 permit ip 10.10.20.0 0.0.0.255 any
    access-list 120 remark Xbox
    access-list 120 permit tcp any eq 88 host 10.10.20.20 eq 88
    access-list 120 permit tcp any eq 3074 host 10.10.20.20 eq 3074
    access-list 120 permit udp any eq 3074 host 10.10.20.20 eq 3074
    dialer-list 1 protocol ip permit
    snmp-server community public RO
    no cdp run
    route-map SDM_RMAP_1 permit 1
    match ip address 110
    control-plane
    bridge 1 protocol ieee
    bridge 1 route ip
    banner login ^CAuthorized access only!
    Disconnect IMMEDIATELY if you are not an authorized user!^C
    line con 0
    no modem enable
    transport output telnet
    line aux 0
    transport output telnet
    line vty 0 4
    privilege level 15
    transport input telnet ssh
    scheduler max-task-time 5000
    scheduler allocate 4000 1000
    scheduler interval 500
    end

    see the option "client Isolation"in the Ap
    Posted by WebUser Anshul Rohilla

  • Clients disconnected from WLC randomly

    Hi,
    I'm doing some tests with clients to see how much time they are kept registered in the controller while they are disconnected. I've set session timeout to 0 (infinite) and user idle timeout to 12 hours. 
    The problem is that sometimes the clients are disconnected from the controller before the user idle timeout expires:
    apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 6, reasonCode 1
    Other times they are expired normally by the user idle timeout (deleteReason4,reasonCode4).
    If I am not wrong deleteReason 6 corresponds to manual deletion of the client, but there is no manual interventention when this happen, is the controller who deletes it.
    Can anybody explain why this happens randomly?
    WLC version 6.0.196
    Thanks.

    Refer the 2 Bugs :
    Unified APs removing clients on maximum retries.
    CSCti91944
    Description
    Symptom:
    A wireless client might be removed from the mobility database before the user idle timeout. When this happens, if "debug client MAC" is in effect, messages similar to the following are seen on the WLC:
    *spamApTask3: clientmacaddrXYZ Received Idle-Timeout from
    AP macADDR-abc slot 0 for STA XYZ Client MAC ADDR
    *spamApTask3: apfMsDeleteByMscb Scheduling mobile for deletion with
    deleteReason 4, reasonCode 4
    The symptoms, as experienced by the user, depends on the behavior of the client device and on the WLAN configuration as follows:
    - If the WLAN is configured for web-auth, the client is forced to reauthenticate through the web.
    - If the WLAN is configured for L3 mobility and if the client performs an L3 roam at the time of the removal, the client's old IP address in the old subnet is no longer valid, and the client is forced to re-DHCP in the new subnet. Any existing TCP connections fail to work expected. If the client is a 792x wireless phone on a call, the talk path is lost for the remainder of the call.
    - If the WLAN is configured for L2 mobility, then the client is forced to perform a full EAP authentication (if EAP is configured) and to re-DHCP (if DHCP required is configured). In most cases, this does not cause a perceptible service interruption, unless the client's IP address changes.
    Conditions:
    This occurs when an access point fails to transmit 250 consecutive packets to the client (if there are 64 failed retransmits per packet, which means 4 consecutive dropped packets, it triggers the deauth).
    Examples:
    - Client radio is temporarily disabled.
    - Client has gone into hibernation/standby.
    - For a voice client, if the client is in a call and is unable to receive audio packets for a fraction of a second.
    Workaround:
    None; however, reconfiguring the WLAN for layer 2 rather than layer 3 mobility can mitigate the effect.
    Known Affected Releases:
    (3)
    7.0(98.0)
    6.0(199.0)
    6.0(199.4)
    Clients hit Idle timeout after successful authentication
    CSCue34763
    Description
    Symptom:
    A wireless client, while associated/authenticated (in RUN state), will be
    prematurely idle timed out by an AP. With "debug client" in effect on the
    WLC, messages similar to the following are seen:
    *spamApTask2: Jan 30 17:10:17.258: 00:11:22:33:44:55 Received Idle-Timeout from
    AP 84:78:ac:00:11:22, slot 1 for STA 00:11:22:33:44:558
    *spamApTask2: Jan 30 17:10:17.258: 00:11:22:33:44:55 apfMsDeleteByMscb
    Scheduling mobile for deletion with deleteReason 4, reasonCode 4
    The idle timeout event occurs while the client is not idle, and more rapidly,
    after the client's last reassociation, than the configured user idle timeout
    value.
    Conditions:
    Flexconnect (H-REAP) local switching is configured, with DHCP Required.
    Workaround:
    Clients hit Idle timeout after successful authentication
    CSCue34763
    Description
    Symptom:
    A wireless client, while associated/authenticated (in RUN state), will be
    prematurely idle timed out by an AP. With "debug client" in effect on the
    WLC, messages similar to the following are seen:
    *spamApTask2: Jan 30 17:10:17.258: 00:11:22:33:44:55 Received Idle-Timeout from
    AP 84:78:ac:00:11:22, slot 1 for STA 00:11:22:33:44:558
    *spamApTask2: Jan 30 17:10:17.258: 00:11:22:33:44:55 apfMsDeleteByMscb
    Scheduling mobile for deletion with deleteReason 4, reasonCode 4
    The idle timeout event occurs while the client is not idle, and more rapidly,
    after the client's last reassociation, than the configured user idle timeout
    value.
    Conditions:
    Flexconnect (H-REAP) local switching is configured, with DHCP Required.
    Workaround:
    Disable DHCP required.
    Disable DHCP required.

  • Wireless Viao disconnects WRT54G

    Whenever my new Viao accesses my WRT54G wirelessly it disconnects all those connected (wired and wireless) to the router. Anyone have a clue? I've decereased the xmit power on the Viao but that did nothing. Also, noticed that while users are connected DHCP CLients Table does not show that connection - why?

    Thanks Brickmonkey - I tried another channel, and have security set to WPA and the problem still occurs. It's strange - I have two wired connections and three wireless - 2 Macbooks and the Viao. When the Viao connects it knocks the two wired connections off and they disappear from the DHCP clients connection list, yet wireless remian. I've tried many things, lowering the xmit power on the Viao, changed wireless card config., upgraded all FW, no success. So, I've given up for now and decided to resurrect an old BEFSR41 and am using it as the DHCP server with two wired connections and have WRT connected to the BEF to support the wireless (BTW I used the excellent description of how to do this which I found on this forum!). This is working with no problems, turn Viao on/off wired connections remain, but this requires another power connection, a second box etc.
    I'll try your last suggestion as I would like to find this problem, but the Viao user is clamoring for her laptop...
    Thanks again and best for the holidays. 

  • Time Capsule - "wireless clients" mean what???

    I have a new Time Capsule, and configured it today.  I noticed it listed a wireless client; whenI clicked on it a second box opened up.  The "client" (Frank's Big Dog") was a large back up hard drive I once had connected but no longer do.  Anyone know how to disconnect that wireless client?

    Change the wireless password.

  • EA2700 Firmware 1.1.40 Build 162751 Dropping Wireless Clients

    Hello, 
    We have noticed on several EA2700 units that the recent 1.1.40 update has caused wireless clients to be disconnected en-masse periodically. 
    It does not seem to be related to client devices, as we have one "All Apple" environment where iPhones are simultaneously disconnected (but wired computers are fine) and a separate environment where the same thing is happening with only Samsung tablets and handhelds. 
    Rolling back to the previous firmware (1.1.39 Build 145204) is an option in the Troubleshooting section of the device, but in order for it to work properly you have to do the following:
      a) Login to the Connectivity section and turn-off the Auto-Update feature
      b) Login to the Troubleshooting section and use the rollback feature to previous firmware
      c) Using a paperclip for 30 seconds (all lights flash), reset to factory settings.  (192.168.1.1 on LAN port with Internet disconnected)
      d) Login and reconfigure your settings (Wireless SSID and Passwords)
    If you do not perform the hard factory reset using the reset button on the bottom after downgrading the firmware, you will be able to see the SSID but not connect any devices.  We believe this is due to the new "wireless drivers" that were upgraded as per the changelog in the 1.1.40 firmware, and are probably also responsible for the bug with wireless devices disconnecting. 
    We engaged with the live chat to give them a heads up on the issue but didn't seem to get anything but a script to solve typical wireless issues; Hopefully this post is helpful and catches the eyes of Linksys engineers.   We have a lot of these devices in use, and so far have rolled back about 10 of them so far.  Unfortunately when you only loose wireless for a few minutes every hour or so, people don't notice too quickly.   Those with multiple wireless devices and wired connections seem to figure it out. 
    The fact that all devices seem to disconnect at once suggest the 1.1.40 is having resource issues (running out of memory causing WPA services to restart), or suffering from some sort of other kernel/device driver issue related to the upgrade.  Without debug logs we don't have a smoking gun, but the observations seem indicative of a problem. 
    We chose the EA line for our customers because the autoupdate allows us to often upgrade out of bugs with certain wireless clients, but in this case we upgraded into a bug affecting all clients. 

    Good news, 
    Since we have a number of devices still under warranty, we have been able to engage Belkin/Linksys'sCustomer Assistance Team (CAT), the next level of support from the email/Chat/phone queues.
    Following disclosure of a number of scenarios and additional problem description details we were engaged by the product Sustainment Engineering team.   We provided more details, reproduction steps and example configurations. 
    Although we still don't have our hands on a 1.1.39 build to mitigate risk of not being able to roll-back if a 1.1.41 does not resolve the problem, it seems likely that the engineering team is going to have a closer look and get this resolved. 
    One recommendation, that we have not yet tried that came out of all the discussions, was to manually apply the firmware from the website.  I don't expect much to change, as I am pretty sure they would employ a simple MD5SUM check.  
    Although we have rolled back a number of these so far with 100% resolution (using the process described), it is only about 5-10% of the devices configured to auto-upgrade that have been reported as having a problem so far, so there is still a good chance that not every device is affected, though we have been able to reproduce this easily, and all of our devices share identical configurations except for SSID information. 
    The EA2700 is good value when it works.  Lots of resources, 64MB RAM and 64MB FLASH,  decent Broadcom Gigabit PHY and Dual Spatial Radios on a very compatible Broadcom Wireless chipset make it a great little AP bridge for 700-1000 sq ft. MDUs where we provide 80 Mbps service which it can handle in that environment at 40Hz.    

  • Can I use ASA to be a DHCP Server use in WLC wireless Client

    I want to use ASA to be a DHCP Server for Wireless Client not it can't.
    I check the debug log in WLC, I confirm the WLC have send the request to ASA.
    In the ASA, it don't have any hits in the rule when the WLC send the DHCP relay request.
    I have try don't use dhcp relay in WLC but don't success. Anybody have the same case with me? And Is the ASA can't support DHCP relay agent to request to get the IP Addr.
    P.S. In the Network Design limitation so I can't use WLC to be DHCP Server.
    Equipment:
    ASA5510
    WLC4402
    How can I fix it.
    Thank you very much

    The issue is that the ASA doesn't accept DHCP requests from a relay agent, only broadcast DHCP requests. In the 4.2 version for the controllers there is now an option so you can change the way the controller forwards DHCP requests so that it is sent as a broadcast and not from a relay agent.

Maybe you are looking for