Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

timer wpa-key-period

This thread has been viewed 3 times
  • 1.  timer wpa-key-period

    Posted Jan 20, 2015 11:34 AM

    Hello,

     

    I have some client disconnection in my wifi system. I read this in the controller log:

     

    <132093> |AP IAP-225-n16@192.168.1.16 stm| WPA2 Key message 2 from Station 08:d8:33:xx:xx:xx 18:64:72:xx:xx:xx IAP-225-n16 did not match the replay counter 02 vs 04

     I read that it is a good idea to change the "timer wpa-key-period" parameter to bigger one.

     

    I had set it to 1000ms and change to 2000ms.

     

    Anyone has experience changing this parameter? Which will be a good number?

     

    Regards.


    #AP225


  • 2.  RE: timer wpa-key-period

    EMPLOYEE
    Posted Jan 20, 2015 11:36 AM
    You should open a TAC case before changing timers. 


    Thanks, 
    Tim


  • 3.  RE: timer wpa-key-period

    Posted Jan 20, 2015 11:40 AM

    Hello Tim,

     

    Why coulad I open a TAC case?

     

    Mostly the disconnecion happens in some specific Android devices, it is possible to apply this AAA profile to some MAC address?

     

    I will appreciate any help.



  • 4.  RE: timer wpa-key-period

    EMPLOYEE
    Posted Jan 21, 2015 10:00 PM

    I always like to advise that you work with Aruba TAC when changing timers as they are often sensitive changes that can cause other issues.

     



  • 5.  RE: timer wpa-key-period

    Posted Jan 21, 2015 11:06 PM
    You should start by updating the drivers on your device.
    https://arubanetworkskb.secure.force.com/pkb/articles/Troubleshooting/R-450


  • 6.  RE: timer wpa-key-period

    EMPLOYEE
    Posted Jan 22, 2015 03:16 AM

    josu-k35

    i'll be preparing a forum post on this soon enough (next week i hope), values over 1000ms are problematic for recent Apple devices at a minimum and you should exercise care in using anything greater than a few hundred msec.

     

    And yes, TAC are guilty of using slapdash values - myself included and it is for this reason I recently discovered a problem with iOS8 and the usual values that we like to use on these timers (long story short, if the time is too long between eap-success and wpa2-key1, Apple device appears to start to scan and is gone by the time controller starts key exchange, which ends up seriously prolonging the exchange or failing completely)

     

    Please reset all timers to default, ensure you have eapol rate optimsation turned on in the SSID profile, and see how the client behaves from auth trace buf under 'regular' conditions.

     

    You can also look at enabling 'packet-capture wifi-client' and taking a look at the actual transaction (more or less mirrors the auth trace buf, but better granularity) to see what is going on.

     

    regards

    -jeff