802.11 Client Device Interoperability

Reply
Frequent Contributor I

Motorola Defy with problems to reconnect

Device:
Smartphone Motorola Defy version 3.4.2-107_JDNL-7
Android 2.2.1

Network:
ArubaOS (MODEL: Aruba3400), Version 6.0.1.3
AP-125
802.1x with PEAP

The 1st connection is ok and work fine, but if we turn off wifi of Motorola setting and turn on wifi, the smartphone doesn't reconnect. Even power off/ power on doesn't work.

Below, the log of device connection on controller:

<<<<< 1st conection >>>>
Oct 18 09:21:59 authmgr: <124003> |authmgr| Authentication result=Authentication Successful(0), method=802.1x, server=radius_bcb_vap_movel_sede, user=40:fc:89:8b:97:90
Oct 18 09:21:59 authmgr: <124004> |authmgr| Called mac_station_new() for mac 40:fc:89:8b:97:90
Oct 18 09:21:59 authmgr: <124004> |authmgr| Save Class in station for MAC 40:fc:89:8b:97:90
Oct 18 09:21:59 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:22:04 dhcpdwrap: <202534> |dhcpdwrap| |dhcp| Datapath vlan64: DISCOVER 40:fc:89:8b:97:90 Options 39:05dc 3c:64686370636420342e302e3135 37:01792103061c333a3b
Oct 18 09:22:04 dhcpdwrap: <202536> |dhcpdwrap| |dhcp| Datapath vlan64: REQUEST 40:fc:89:8b:97:90 reqIP=192.168.64.104 Options 36:ac110529 39:05dc 3c:64686370636420342e302e3135 37:01792103061c333a3b
Oct 18 09:22:04 dhcpdwrap: <202541> |dhcpdwrap| |dhcp| Received DHCP packet from Datpath, sos msg hdr flags 0x40 opcode 0x5a ingress 0x10a2 vlan 64 egress 0x40 src mac 40:fc:89:8b:97:90
Oct 18 09:22:04 dhcpdwrap: <202541> |dhcpdwrap| |dhcp| Received DHCP packet from Datpath, sos msg hdr flags 0x40 opcode 0x5a ingress 0x10a2 vlan 64 egress 0x40 src mac 40:fc:89:8b:97:90
Oct 18 09:22:04 dhcpdwrap: <202544> |dhcpdwrap| |dhcp| Datapath vlan64: ACK 40:fc:89:8b:97:90 clientIP=192.168.64.104
Oct 18 09:22:04 dhcpdwrap: <202546> |dhcpdwrap| |dhcp| Datapath vlan64: OFFER 40:fc:89:8b:97:90 clientIP=192.168.64.104
Oct 18 09:22:04 dhcpdwrap: <202546> |dhcpdwrap| |dhcp| Datapath vlan64: OFFER 40:fc:89:8b:97:90 clientIP=192.168.64.11
Oct 18 09:22:12 authmgr: <124003> |authmgr| Authentication result=Authentication Successful(0), method=radius-accounting, server=radius_bcb_vap_movel_sede, user=40:fc:89:8b:97:90
Oct 18 09:22:12 authmgr: <124004> |authmgr| Enforcing L2 check for mac 40:fc:89:8b:97:90
Oct 18 09:22:12 authmgr: <124004> |authmgr| Enforcing L2 check for mac 40:fc:89:8b:97:90
Oct 18 09:22:12 authmgr: <124004> |authmgr| Enforcing L2 check for mac 40:fc:89:8b:97:90
Oct 18 09:22:12 authmgr: <124004> |authmgr| Enforcing L2 check for mac 40:fc:89:8b:97:90
Oct 18 09:22:12 authmgr: <124004> |authmgr| sta_add_l3: mac 40:fc:89:8b:97:90 ip 192.168.64.104
Oct 18 09:22:12 authmgr: <522046> |authmgr| 40:fc:89:8b:97:90 : User-Agent: Apache-HttpClient/UNAVAILABLE (java 1.4)

turn off wifi
turn on wifi

Oct 18 09:25:52 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:25:59 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:26:02 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:26:09 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:27:00 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:27:07 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:27:10 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:27:17 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:27:51 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:27:58 authmgr: <132030> |authmgr| Dropping EAPOL packet sent by Station 40:fc:89:8b:97:90 00:1a:1e:63:df:c2
Oct 18 09:27:58 authmgr: <132030> |authmgr| Dropping EAPOL packet sent by Station 40:fc:89:8b:97:90 00:1a:1e:63:df:c2
Oct 18 09:27:58 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:28:03 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:28:09 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:29:13 authmgr: <124003> |authmgr| Authentication result=Authentication Successful(0), method=radius-accounting, server=radius_bcb_vap_movel_sede, user=40:fc:89:8b:97:90
Oct 18 09:29:13 authmgr: <124004> |authmgr| Free macuser 0x0x10822644 and user 0x0x1098202c for mac 40:fc:89:8b:97:90
Oct 18 09:29:13 authmgr: <124004> |authmgr| sta_del_l3: mac 40:fc:89:8b:97:90 ip 192.168.64.104


Forcing to connect on settings of Motorola Defy
Oct 18 09:30:19 authmgr: <124004> |authmgr| Called mac_station_new() for mac 40:fc:89:8b:97:90
Oct 18 09:30:19 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:30:25 authmgr: <124004> |authmgr| Free macuser 0x0x1098c6cc and user 0x0x1098202c for mac 40:fc:89:8b:97:90
Oct 18 09:30:25 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:30:31 authmgr: <124004> |authmgr| Called mac_station_new() for mac 40:fc:89:8b:97:90
Oct 18 09:30:31 authmgr: <124004> |authmgr| Free macuser 0x0x10984fd4 and user 0x0x109a804c for mac 40:fc:89:8b:97:90
Oct 18 09:30:31 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated
Oct 18 09:30:35 authmgr: <124004> |authmgr| Called mac_station_new() for mac 40:fc:89:8b:97:90
Oct 18 09:30:35 authmgr: <124004> |authmgr| Free macuser 0x0x108230ac and user 0x0x1098202c for mac 40:fc:89:8b:97:90
Oct 18 09:30:35 authmgr: <132066> |authmgr| Station40:fc:89:8b:97:90 00:1a:1e:63:df:c2 -2.Dired 64 33568 VLAN has been updated

-----------------------------------------------

With iPhone 3G (iOS 4.2.1) no problem. See the log:

Oct 18 09:57:25 authmgr: <124003> |authmgr| Authentication result=Authentication Successful(0), method=802.1x, server=radius_bcb_vap_guest_sede, user=00:23:6c:d9:8a:6f
Oct 18 09:57:25 authmgr: <124004> |authmgr| Save Class in station for MAC 00:23:6c:d9:8a:6f
Oct 18 09:57:25 authmgr: <132066> |authmgr| Station00:23:6c:d9:8a:6f 00:1a:1e:63:df:c1 -2.Dired 1112 33552 VLAN has been updated
Oct 18 09:57:26 dhcpdwrap: <202536> |dhcpdwrap| |dhcp| Datapath vlan1112: REQUEST 00:23:6c:d9:8a:6f reqIP=172.16.114.84 Options 37:0103060f77fc 39:05dc 3d:0100236cd98a6f 33:0076a700 0c:6950686f6e65
Oct 18 09:57:26 dhcpdwrap: <202541> |dhcpdwrap| |dhcp| Received DHCP packet from Datpath, sos msg hdr flags 0x40 opcode 0x5a ingress 0x10e6 vlan 1112 egress 0x458 src mac 00:23:6c:d9:8a:6f
Oct 18 09:57:26 dhcpdwrap: <202544> |dhcpdwrap| |dhcp| Datapath vlan1112: ACK 00:23:6c:d9:8a:6f clientIP=172.16.114.84
Oct 18 09:57:28 authmgr: <124003> |authmgr| Authentication result=Authentication Successful(0), method=radius-accounting, server=radius_bcb_vap_guest_sede, user=00:23:6c:d9:8a:6f
Oct 18 09:57:28 authmgr: <124004> |authmgr| Enforcing L2 check for mac 00:23:6c:d9:8a:6f
Oct 18 09:57:28 authmgr: <124004> |authmgr| Enforcing L2 check for mac 00:23:6c:d9:8a:6f
Oct 18 09:57:28 authmgr: <124004> |authmgr| sta_add_l3: mac 00:23:6c:d9:8a:6f ip 172.16.114.84

Turn off wifi
Turn on wifi

Oct 18 09:59:22 authmgr: <124003> |authmgr| Authentication result=Authentication Successful(0), method=802.1x, server=radius_bcb_vap_guest_cetre, user=00:23:6c:d9:8a:6f
Oct 18 09:59:22 authmgr: <124004> |authmgr| Save Class in station for MAC 00:23:6c:d9:8a:6f
Oct 18 09:59:22 authmgr: <132066> |authmgr| Station00:23:6c:d9:8a:6f 00:1a:1e:63:df:c1 -2.Dired 1112 33552 VLAN has been updated
Oct 18 09:59:22 dhcpdwrap: <202536> |dhcpdwrap| |dhcp| Datapath vlan1112: REQUEST 00:23:6c:d9:8a:6f reqIP=172.16.114.84 Options 37:0103060f77fc 39:05dc 3d:0100236cd98a6f 33:0076a700 0c:6950686f6e65
Oct 18 09:59:22 dhcpdwrap: <202541> |dhcpdwrap| |dhcp| Received DHCP packet from Datpath, sos msg hdr flags 0x40 opcode 0x5a ingress 0x10e6 vlan 1112 egress 0x458 src mac 00:23:6c:d9:8a:6f
Oct 18 09:59:22 dhcpdwrap: <202544> |dhcpdwrap| |dhcp| Datapath vlan1112: ACK 00:23:6c:d9:8a:6f clientIP=172.16.114.84
----------------------------------

Any help?
Is there other log to see?
Search Airheads
cancel
Showing results for 
Search instead for 
Did you mean: