Controller Based WLANs

Why do few wireless clients experience problem in connecting to an SSID, where other clients have no issue?

Environment : This article applies to Aruba Mobility Domain with ArubaOS.

 

Surprisingly, some clients experience problem in connecting to an SSID and as a WLAN administrator one would not have a clue. The first place where an administrator should look into,  is the output of following CLI command to see if the MAC address of the client is listed here:

"Show ap blacklist-clients"

 

 

rtaImage.jpg

 

There are several reasons why a client gets blacklisted. For example, when you enable different Aruba intrusion detection system (IDS) features that detect suspicious activities, such as MAC address spoofing or DoS attacks.

Below shown are the various reasons for a client getting blacklisted:

 

 

user-defined: User was blacklisted due to blacklist criteria were defined by the network administrator
mitm-attack: Blacklisted for a man in the middle (MITM) attack; impersonating a valid enterprise AP.
ping-flood: Blacklisted for a ping flood attack.
session-flood: Blacklisted for a session flood attack.
syn-flood: Blacklisted for a syn flood attack
session-blacklist: User session was blacklisted
IP spoofing: Blacklisted for sending messages using the IP address of a trusted client.
ESI-blacklist: An external virus detection or intrusion detection application or appliance blacklisted the client.
CP-flood: Blacklisting for flooding with fake AP beacons.
UNKNOWN: Blacklist reason unknown.

 

  • You can configure the duration that clients are blacklisted on a per-SSID basis via the virtual AP profile. There are two different blacklist duration settings:

    • For clients that are blacklisted due to authentication failure. By default, this is set to 0 (the client is blacklisted indefinitely)

     

    • For clients that are blacklisted due to other reasons, including manual blacklisting. By default, this is set to 3600 seconds (one hour). You can set this to 0 to blacklist clients indefinitely.
Version History
Revision #:
2 of 2
Last update:
‎09-10-2014 11:18 AM
Updated by:
 
Labels (1)
Tags (1)
Comments
smartin

Actually, per our SE these features do not work as advertized and are now disabled by default.  From my personal experience, if they are enabled every client in the system eventually gets blacklisted regardless of the threshold settings.  Do not enable these features.

Hi Sean,

 

The blacklist option on Virtual-AP Profile is enabled by default. The options under Firewall depend on customer environment (example :: TCP sessions for one customer maybe high at value X while it maybe acceptable for another). Hence; this option is disabled by default. It can potentially blacklisted all clients if misconfigured to a low value.

 

To validate blacklisting based on session; we can troubleshoot using "show datapath user" (shows # of sessions) & "show datapath session table <user ip> . Compare it against the configured value.

 

Logs would also show entry for it.

 

May 29 15:45:44  authmgr[3493]: <124006> <WARN> |authmgr|  {638} TCP srcip=10.120.0.34 srcport=53789 dstip=10.129.0.70 dstport=3268, action=blacklist, policy=Monitor IP sessions attack
May 29 15:46:07  authmgr[3493]: <124006> <WARN> |authmgr|  {639} UDP srcip=10.120.130.240 srcport=46934 dstip=109.165.75.157 dstport=38022, action=blacklist, policy=Monitor IP sessions attack
May 29 15:46:12  authmgr[3493]: <124006> <WARN> |authmgr|  {640} TCP srcip=10.120.131.79 srcport=39876 dstip=68.71.212.184 dstport=80, action=blacklist, policy=Monitor IP sessions attack
May 29 15:46:32  authmgr[3493]: <124006> <WARN> |authmgr|  {641} UDP srcip=10.120.128.66 srcport=50344 dstip=4.2.2.2 dstport=53, action=blacklist, policy=Monitor IP sessions attack

 

As a general recommendation; any option should be enabled / configured after thorough evaluation.

 

Hope this helps.

 

Thanks

 

-vijay

 

 

Search Airheads
Showing results for 
Search instead for 
Did you mean: 
Is this a frequent problem?

Request an official Aruba knowledge base article to be written by our experts.