OK more testing today:
Came into work and the iPad in question was being pinged overnight and had not lost connectivity.
Started Airplay and within 10 minutes it had dropped again.
Then I started Goodplayer a video player App which allows you to transfer the files via HTTP – and did this between a workstation and the iPad and it copied 4 x 700Mb files over about 40 minutes and never dropped once. I also streamed a video straight from Goodplayer on the iPad to the desktop and again it played no issues and I never lost connectivity. Of course – lack of symptoms doesn’t mean that there is no issue – just that it didn’t show up during this test
.
What I did not test was extended transfer of files from one WIRELESS VLAN to another WIRELESS VLAN – this test was Wireless to Wired. When I get my hands on two iPads tomorrow I can test that.
Also - Ryan, went through your suggestions and:
Once dropped - cannot ping default gateway for the VLAN from the iPad
Checked Arm History on the AP in question and it hadn’t changed since the 14th August when it increased its power.
TTSWLSW02) #show ap arm history ap-name APN
Interface :wifi0
Interface :wifi1
ARM History
-----------
Time of Change Old Channel New Channel Old Power New Power Reason
-------------- ----------- ----------- --------- --------- ------
2013-08-14 15:36:34 11 11 18 21 P+
I: Interference, R: Radar detection, N: Noise exceeded, Q: Bad Channel Quality E: Error threshold exceeded, INV: Invalid Channel, G: Rogue AP Containment, M: Empty Channel, P+: Increase Power, P-: Decrease Power, 40INT: 40MHZ intol detected on 2.4G, NO40INT: 40MHz intol cleared on 2.4G, OFF: Turn off Radio, ON: Turn on Radio
User table still showed the iPad entry and the Association table for the AP still showed my iPad after the drop.
Did a remote debug mgmt. frames after I connected and then ran it again after a drop and nothing changed after the drop.
The last entry as was the initial success of the first join.
#show ap remote debug mgmt-frames ap-name APN
Traced 802.11 Management Frames
-------------------------------
Timestamp stype SA DA BSS signal Misc
--------- ----- -- -- --- ------ ----
Aug 18 09:39:43 assoc-resp d8:c7:c8:ad:30:58 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 15 Success
Aug 18 09:39:43 assoc-req 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 d8:c7:c8:ad:30:58 36 -
Aug 18 09:39:43 auth d8:c7:c8:ad:30:58 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 15 Success (seq num 2088)
Aug 18 09:39:43 auth 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 d8:c7:c8:ad:30:58 60 -
Aug 18 09:39:30 disassoc 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 d8:c7:c8:ad:30:58 60 STA has left and is disassociated
Aug 18 09:31:36 deauth d8:c7:c8:ad:30:58 60:fe:c5:f4:11:08 d8:c7:c8:ad:30:58 15 - (internal only)
Aug 18 09:31:11 disassoc 60:fe:c5:f4:11:08 d8:c7:c8:ad:30:58 d8:c7:c8:ad:30:58 60 STA has left and is disassociated
Aug 18 09:30:51 assoc-resp d8:c7:c8:ad:30:58 60:fe:c5:f4:11:08 d8:c7:c8:ad:30:58 15 Success
Aug 18 09:30:51 assoc-req 60:fe:c5:f4:11:08 d8:c7:c8:ad:30:58 d8:c7:c8:ad:30:58 29 -
Aug 18 09:30:51 auth d8:c7:c8:ad:30:58 60:fe:c5:f4:11:08 d8:c7:c8:ad:30:58 15 Success (seq num 46)
Aug 18 09:30:51 auth 60:fe:c5:f4:11:08 d8:c7:c8:ad:30:58 d8:c7:c8:ad:30:58 60 -
Aug 18 09:29:45 assoc-resp d8:c7:c8:ad:30:50 14:36:05:e8:6b:b5 d8:c7:c8:ad:30:50 15 Success
Then did the auth-tracebug and similar results – nothing changed between the initial join and after the drop.
#show auth-tracebuf mac 34:51:c9:df:a8:56
Auth Trace Buffer
-----------------
Aug 18 09:47:16 station-down * 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 - -
Aug 18 09:48:31 station-up * 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 - - wpa2 aes
Aug 18 09:48:31 eap-id-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 1 5
Aug 18 09:48:31 eap-id-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 1 11 wally
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 65484 201
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65484 76
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 2 6
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 2 166
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65485 386
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65485 984
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 3 908
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 3 144
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65500 364
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65500 139
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 4 69
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 4 6
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65479 226
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65479 113
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 5 43
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 5 43
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65478 263
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65478 145
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 6 75
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 6 107
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65506 327
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65506 161
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 7 91
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 7 43
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65499 263
Aug 18 09:48:31 rad-resp <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65499 113
Aug 18 09:48:31 eap-req <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 8 43
Aug 18 09:48:31 eap-resp -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 8 43
Aug 18 09:48:31 rad-req -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65495 263
Aug 18 09:48:31 rad-accept <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58/Clearpass-Server 65495 247
Aug 18 09:48:31 eap-success <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 8 4
Aug 18 09:48:31 wpa2-key1 <- 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 - 117
Aug 18 09:48:31 wpa2-key2 -> 34:51:c9:df:a8:56 d8:c7:c8:ad:30:58 - 117
We are meeting with the Vendor on Tuesday and they will Open a case with TAC for us - (our support agreement does not allow us to contact TAC directly).
Will test with 2 iPads tomorrow and see if we can make it happen on something other than Airplay.
Wally