Wireless Access

Reply
Occasional Contributor II
Posts: 12
Registered: ‎03-17-2013

VIA with iOS 6 and 7 backround disconnect

[ Edited ]

This problem occurs only on the iPhone.

On Android and Windows 7 , VIA client working stable.

 

The problem is that after a successful connection, i put VIA in background and usin web browser, voip.

Within 1-5 minutes vpn connection is lost.

 

Has anyone encountered a similar problem?

 

 

 

 

Guru Elite
Posts: 21,269
Registered: ‎03-29-2007

Re: VIA with iOS 6 and 7 backround disconnect

Please open a support case in parallel so that they can collect your logs and understand what is happening...



Colin Joseph
Aruba Customer Engineering

Looking for an Answer? Search the Community Knowledge Base Here: Community Knowledge Base

Occasional Contributor I
Posts: 8
Registered: ‎05-28-2009

Re: VIA with iOS 6 and 7 backround disconnect

Did you get this resolved?  We had the same issue with one of our customers using VIA.  The problem was related to the policy tied to the via user role.  The via client requires communication with the controller, if this communication is not allowed between the client and the controllers internal IP address, then the client disconnects after 1 minute.  Allowing this communication in the user role that is assigned to the via client solved the issue for us.

Occasional Contributor II
Posts: 12
Registered: ‎03-17-2013

Re: VIA with iOS 6 and 7 backround disconnect

I solved the problem.

Internal ip address, that i use in VIA profile was not maped to any vlan on controller.

 

Changing VIA profile ip to vlan ip and it fix iOS session connection drop problem.

It was my stupid mistake, but it's strange that the problem affects only on iOS.

 

aaa authentication via connection-profile "via-voip"
   server addr "94.228.***.***" internal-ip 192.168.128.1 desc "Ent" position 0 <<<<<<<<<<<<<<<<<<<internal-ip address
   auth-profile "default" position 0
   no auto-upgrade
   tunnel address 192.168.128.0 netmask 255.255.255.0
   tunnel address 10.11.2.0 netmask 255.255.255.0
   tunnel address 192.168.2.0 netmask 255.255.255.0
   split-tunneling
   client-wlan-profile "office" position 0
   ikev2-policy "10004"
   no windows-credentials
   no domain-pre-connect
   client-netmask 255.255.255.0
   no validate-server-cert

 

Search Airheads
Showing results for 
Search instead for 
Did you mean: