Wireless Access

last person joined: 12 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

VIA with iOS 6 and 7 backround disconnect

This thread has been viewed 0 times
  • 1.  VIA with iOS 6 and 7 backround disconnect

    Posted Sep 20, 2013 06:08 AM

    This problem occurs only on the iPhone.

    On Android and Windows 7 , VIA client working stable.

     

    The problem is that after a successful connection, i put VIA in background and usin web browser, voip.

    Within 1-5 minutes vpn connection is lost.

     

    Has anyone encountered a similar problem?

     

     

     

     



  • 2.  RE: VIA with iOS 6 and 7 backround disconnect

    EMPLOYEE
    Posted Sep 20, 2013 07:31 AM

    Please open a support case in parallel so that they can collect your logs and understand what is happening...



  • 3.  RE: VIA with iOS 6 and 7 backround disconnect

    Posted Dec 14, 2013 10:40 AM

    Did you get this resolved?  We had the same issue with one of our customers using VIA.  The problem was related to the policy tied to the via user role.  The via client requires communication with the controller, if this communication is not allowed between the client and the controllers internal IP address, then the client disconnects after 1 minute.  Allowing this communication in the user role that is assigned to the via client solved the issue for us.



  • 4.  RE: VIA with iOS 6 and 7 backround disconnect

    Posted Dec 15, 2013 11:25 PM

    I solved the problem.

    Internal ip address, that i use in VIA profile was not maped to any vlan on controller.

     

    Changing VIA profile ip to vlan ip and it fix iOS session connection drop problem.

    It was my stupid mistake, but it's strange that the problem affects only on iOS.

     

    aaa authentication via connection-profile "via-voip"
       server addr "94.228.***.***" internal-ip 192.168.128.1 desc "Ent" position 0 <<<<<<<<<<<<<<<<<<<internal-ip address
       auth-profile "default" position 0
       no auto-upgrade
       tunnel address 192.168.128.0 netmask 255.255.255.0
       tunnel address 10.11.2.0 netmask 255.255.255.0
       tunnel address 192.168.2.0 netmask 255.255.255.0
       split-tunneling
       client-wlan-profile "office" position 0
       ikev2-policy "10004"
       no windows-credentials
       no domain-pre-connect
       client-netmask 255.255.255.0
       no validate-server-cert