Hello Cjoseph, and thanks for your reply.
The problem we are having is that after few weeks working normally and while clients are able to get IP@, and complete authentication the AP stops forwarding traffic on any of the SSIDs.
What I would like to understand is what is triggering this condition the AP runs into after sometime like if there were a memory leak condition met ...
AP is a 225 and I would expect it to be able to manage 38 connections even if there are legacy devices. The AP is deployed in a HD area.
Too Many Total Clients Diagnostics
Indicator | Too Many Total Clients |
Value | 38 |
Ideal | ≤20 |
Explanation | The total number of wireless clients currently associated to this AP. Too many clients on an AP can strain CPU and memory resources. |
Resolution | ARM should load balance. Sustained high rates will require adding capacity or more APs. |
Anywhoo will wait an see what does TAC investigations lead us, I just found these entries on the AP TS:
<2>[21594.150173] kernel BUG at drivers/net/gianfar.c:2912!
<4>[21594.210601] Oops: Exception in kernel mode, sig: 5 [#1]
And I am concern behind these warning of too many clients on radio we may be facing an DoS attack :
In January 19th 2016 a vulnerability was discovered in the Linux kernel. This vulnerability could allowed a regular user to escalate privileges.
Red Hat has been made aware of a vulnerability affecting the kernel that ships with Red Hat Enterprise Linux 7 kernel and derivatives. CVE-2016-0728 documents and exploit that could allow a skilled attacker to execute arbitrary code and also be used to escalate their privileges on the system. The attacker must be able to run custom code on the account; in the most common configuration, this requires them to have a login and shell account on the target system.
DSP