Wireless Access

Reply
Highlighted
Guru Elite

Re: iPad constant deauth on 1 AP

Your max TX EIRP should be 18 and your min should be 12.  Anything higher than that could contribute to a sticky client issue.  Allowed bands for 40 mhz channels should be done if you have a high density environment to provide more channel reuse.  Try that and see if you still have the same issue.


*Answers and views expressed by me on this forum are my own and not necessarily the position of Aruba Networks or Hewlett Packard Enterprise.*
ArubaOS 8.5 User Guide
InstantOS 8.5 User Guide
Airheads Knowledgebase
Airheads Video Knowledge Base
Remote Access Point Solution Guide
ArubaOS Consolidated Release Notes
ArubaOS 8 ViA VPN Solution Guide
Highlighted
Occasional Contributor II

Re: iPad constant deauth on 1 AP

Thank you . Let me try this and give you the result on sunday 

 

Regards

Khalid Shaikh 

Regards
Khalid Shaikh
Nesma Telecom and Technology
ACMA ACMP ACCP CCIE R&S
Highlighted
Occasional Contributor II

Re: iPad constant deauth on 1 AP

Hi 

 

I tried the above mentioned recommendation . Below is the output of show ap active 

 

B1-1st-4              BLDG_1_ClearPass  192.168.104.54  3            AP:HT:11/12/20       5            AP:HT:48-/12/23      105      2da    19d:3h:4m:31s    N/A
B1-1st-2              BLDG_1_ClearPass  192.168.104.58  1            AP:HT:11/12/20       1            AP:HT:48-/18/23      105      2ad    19d:3h:4m:57s    N/A
B1-1st-1              BLDG_1_ClearPass  192.168.104.60  1            AP:HT:11/12/20       6            AP:HT:44+/18/23      105      2da    6d:5h:1m:54s     N/A
B1-1st-5              BLDG_1_ClearPass  192.168.104.72   0                                 1            AP:HT:56/18/23       105      2a     19d:3h:5m:5s     N/A
B1-GF-2               BLDG_1_ClearPass  192.168.104.83   0            AP:HT:11/12/20       2            AP:HT:44+/18/23      105      2ad    19d:3h:4m:36s    N/A
B1-1st-3              BLDG_1_ClearPass  192.168.104.90   1            AP:HT:1/12/20        7            AP:HT:40-/18/23      105      2ad    19d:3h:5m:12s    N/A
B1-GF-1               BLDG_1_ClearPass  192.168.104.91   1            AP:HT:1/12/20        1            AP:HT:40-/18/23      105      2ad    19d:3h:5m:29s    N/A

 

But I am still facing the issue of disconnection . Below is the latest disconnection output faced . 

 

 

 

Oct 25 15:14:11  authmgr[2293]: <522036> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b Station DN: BSSID=d8:c7:c8:a3:e5:9a ESSID=KACST_Emp VLAN=222 AP-name=B1-1st-1
Oct 25 15:14:11  authmgr[2293]: <522234> <DBUG> |authmgr|  Setting idle timer for user c0:ee:fb:21:8c:4b to 300 seconds (idle timeout: 300 ageout: 0).
Oct 25 15:14:11  stm[800]: <501000> <DBUG> |AP B1-1st-1@192.168.104.60 stm|  Station c0:ee:fb:21:8c:4b: Clearing state
Oct 25 15:14:11  stm[800]: <501105> <NOTI> |AP B1-1st-1@192.168.104.60 stm|  Deauth from sta: c0:ee:fb:21:8c:4b: AP 192.168.104.60-d8:c7:c8:a3:e5:9a-B1-1st-1 Reason Unspecified Failure
Oct 25 15:14:16  authmgr[2293]: <522008> <NOTI> |authmgr|  User Authentication Successful: username=kshaikh MAC=c0:ee:fb:21:8c:4b IP=192.168.48.103 role=Domain VLAN=222 AP=B1-1st-1 SSID=KACST_Emp AAA profile=ClearPass_AAA auth method=802.1x auth server=ClearPass
Oct 25 15:14:16  authmgr[2293]: <522029> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b Station authenticate: method=802.1x, role=Domain/Domain//Limited_Access, VLAN=222/222, Derivation=7/1, Value Pair=0
Oct 25 15:14:16  authmgr[2293]: <522035> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b Station UP: BSSID=d8:c7:c8:a3:e5:92 ESSID=KACST_Emp VLAN=222 AP-name=B1-1st-1
Oct 25 15:14:16  authmgr[2293]: <522044> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b Station authenticate(start): method=802.1x, role=Domain/Domain//Limited_Access, VLAN=222/222, Derivation=7/1, Value Pair=0, flags=0x8
Oct 25 15:14:16  authmgr[2293]: <522049> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b,IP=N/A User role updated, existing Role=Domain/Domain, new Role=Domain/Domain, reason=Station Authenticated with auth type: 4
Oct 25 15:14:16  authmgr[2293]: <522050> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b,IP=N/A User data downloaded to datapath, new Role=Domain/112, bw Contract=0/0, reason=Download driven by user role setting, idle-timeout=300
Oct 25 15:14:16  authmgr[2293]: <522077> <DBUG> |authmgr|  MAC=c0:ee:fb:21:8c:4b ingress 0x0x10667 (tunnel 1639), u_encr 64, m_encr 64, slotport 0x0x2100 , type: local, FW mode: 0, AP IP: 0.0.0.0 mdie 0 ft_complete 0
Oct 25 15:14:16  authmgr[2293]: <522078> <DBUG> |authmgr|  MAC=c0:ee:fb:21:8c:4b, wired: 0, vlan:222 ingress:0x0x10667 (tunnel 1639), ingress:0x0x10667 new_aaa_prof: ClearPass_AAA, stored profile: ClearPass_AAA stored wired: 0 stored essid: KACST_Emp, stored-ingress: 0x0x1038f
Oct 25 15:14:16  authmgr[2293]: <522243> <DBUG> |authmgr|  MAC=c0:ee:fb:21:8c:4b Station Updated Update MMS: BSSID=d8:c7:c8:a3:e5:92 ESSID=KACST_Emp VLAN=222 AP-name=B1-1st-1
Oct 25 15:14:16  authmgr[2293]: <522246> <DBUG> |authmgr|  Idle timeout should be driven by STM for MAC c0:ee:fb:21:8c:4b.
Oct 25 15:14:16  authmgr[2293]: <522247> <DBUG> |authmgr|  User idle timer removed for user with  MAC c0:ee:fb:21:8c:4b.
Oct 25 15:14:16  authmgr[2293]: <522254> <DBUG> |authmgr|  VDR - mac c0:ee:fb:21:8c:4b rolename Domain fwdmode 0 derivation_type Dot1x Aruba VSA Role Contained vp not present.
Oct 25 15:14:16  authmgr[2293]: <522254> <DBUG> |authmgr|  VDR - mac c0:ee:fb:21:8c:4b rolename Limited_Access fwdmode 0 derivation_type Initial Role Contained vp not present.
Oct 25 15:14:16  authmgr[2293]: <522254> <DBUG> |authmgr|  VDR - mac c0:ee:fb:21:8c:4b rolename NULL fwdmode 0 derivation_type Matched User Rule vp present.
Oct 25 15:14:16  authmgr[2293]: <522254> <DBUG> |authmgr|  VDR - mac c0:ee:fb:21:8c:4b rolename NULL fwdmode 0 derivation_type VLAN from pmk-cache vp not present.
Oct 25 15:14:16  authmgr[2293]: <522255> <DBUG> |authmgr|  "VDR - set vlan in user for c0:ee:fb:21:8c:4b vlan 222 fwdmode 0 derivation_type Current VLAN updated.
Oct 25 15:14:16  authmgr[2293]: <522255> <DBUG> |authmgr|  "VDR - set vlan in user for c0:ee:fb:21:8c:4b vlan 222 fwdmode 0 derivation_type Current VLAN updated.
Oct 25 15:14:16  authmgr[2293]: <522255> <DBUG> |authmgr|  "VDR - set vlan in user for c0:ee:fb:21:8c:4b vlan 222 fwdmode 0 derivation_type Default VLAN.
Oct 25 15:14:16  authmgr[2293]: <522258> <DBUG> |authmgr|  "VDR - Add to history of user user c0:ee:fb:21:8c:4b vlan 0 derivation_type Reset Role Based VLANs index 1.
Oct 25 15:14:16  authmgr[2293]: <522258> <DBUG> |authmgr|  "VDR - Add to history of user user c0:ee:fb:21:8c:4b vlan 0 derivation_type Reset Role Based VLANs index 2.
Oct 25 15:14:16  authmgr[2293]: <522258> <DBUG> |authmgr|  "VDR - Add to history of user user c0:ee:fb:21:8c:4b vlan 0 derivation_type Reset VLANs for Station up index 30.
Oct 25 15:14:16  authmgr[2293]: <522258> <DBUG> |authmgr|  "VDR - Add to history of user user c0:ee:fb:21:8c:4b vlan 222 derivation_type Current VLAN updated index 0.
Oct 25 15:14:16  authmgr[2293]: <522258> <DBUG> |authmgr|  "VDR - Add to history of user user c0:ee:fb:21:8c:4b vlan 222 derivation_type Current VLAN updated index 3.
Oct 25 15:14:16  authmgr[2293]: <522258> <DBUG> |authmgr|  "VDR - Add to history of user user c0:ee:fb:21:8c:4b vlan 222 derivation_type Default VLAN index 31.
Oct 25 15:14:16  authmgr[2293]: <522259> <DBUG> |authmgr|  "VDR - Do Role Based VLAN Derivation user c0:ee:fb:21:8c:4b role Domain authtype 4 rolehow Aruba VSA.
Oct 25 15:14:16  authmgr[2293]: <522260> <DBUG> |authmgr|  "VDR - Cur VLAN updated c0:ee:fb:21:8c:4b mob 0 inform 1 remote 0 wired 0 defvlan 222 exportedvlan 0 curvlan 222.
Oct 25 15:14:16  authmgr[2293]: <524124> <DBUG> |authmgr|  dot1x_supplicant_up(): MAC:c0:ee:fb:21:8c:4b, pmkid_present:True, pmkid:3d c6 4e 07 08 84 6e b8 86 23 d4 d0 9b 47 19 99
Oct 25 15:14:16  stm[2014]: <501095> <NOTI> |stm|  Assoc request @ 15:14:16.925948: c0:ee:fb:21:8c:4b (SN 55): AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1
Oct 25 15:14:16  stm[2014]: <501100> <NOTI> |stm|  Assoc success @ 15:14:16.926940: c0:ee:fb:21:8c:4b: AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1
Oct 25 15:14:16  stm[800]: <501093> <NOTI> |AP B1-1st-1@192.168.104.60 stm|  Auth success: c0:ee:fb:21:8c:4b: AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1
Oct 25 15:14:16  stm[800]: <501095> <NOTI> |AP B1-1st-1@192.168.104.60 stm|  Assoc request @ 15:14:16.499583: c0:ee:fb:21:8c:4b (SN 55): AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1
Oct 25 15:14:16  stm[800]: <501100> <NOTI> |AP B1-1st-1@192.168.104.60 stm|  Assoc success @ 15:14:16.500932: c0:ee:fb:21:8c:4b: AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1
Oct 25 15:14:16  stm[800]: <501109> <NOTI> |AP B1-1st-1@192.168.104.60 stm|  Auth request: c0:ee:fb:21:8c:4b: AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1 auth_alg 0
Oct 25 15:14:20  mdns[2093]: <527000> <DBUG> |mdns|  mdns_parse_auth_userrole_message 289 Auth User ROLE: MAC:c0:ee:fb:21:8c:4b, NAME:kshaikh, ROLE_NAME:Domain
Oct 25 15:14:35  mdns[2093]: <527000> <DBUG> |mdns|  mdns_parse_packet 2189 mdns query packet received - info; mac=c0:ee:fb:21:8c:4b, ip=192.168.48.103, origin=1
Oct 25 15:14:35  mdns[2093]: <527000> <DBUG> |mdns|  mdns_parse_packet_from_sos 423 pkt from SOS: vlan 222, mac c0:ee:fb:21:8c:4b ip 192.168.48.103
Oct 25 15:14:35  mdns[2093]: <527000> <DBUG> |mdns|  mdns_parse_query_packet 1833 There was no response to query from mac:c0:ee:fb:21:8c:4b, ip: 192.168.48.103
Oct 25 15:14:46  authmgr[2293]: <522036> <INFO> |authmgr|  MAC=c0:ee:fb:21:8c:4b Station DN: BSSID=d8:c7:c8:a3:e5:92 ESSID=KACST_Emp VLAN=222 AP-name=B1-1st-1
Oct 25 15:14:46  authmgr[2293]: <522234> <DBUG> |authmgr|  Setting idle timer for user c0:ee:fb:21:8c:4b to 300 seconds (idle timeout: 300 ageout: 0).
Oct 25 15:14:46  stm[2014]: <501000> <DBUG> |stm|  Station c0:ee:fb:21:8c:4b: Clearing state
Oct 25 15:14:46  stm[2014]: <501105> <NOTI> |stm|  Deauth from sta: c0:ee:fb:21:8c:4b: AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1 Reason Client Match
Oct 25 15:14:46  stm[800]: <501000> <DBUG> |AP B1-1st-1@192.168.104.60 stm|  Station c0:ee:fb:21:8c:4b: Clearing state
Oct 25 15:14:46  stm[800]: <501080> <NOTI> |AP B1-1st-1@192.168.104.60 stm|  Deauth to sta: c0:ee:fb:21:8c:4b: Ageout AP 192.168.104.60-d8:c7:c8:a3:e5:92-B1-1st-1 Client Match
Regards
Khalid Shaikh
Nesma Telecom and Technology
ACMA ACMP ACCP CCIE R&S
Highlighted
Guru Elite

Re: iPad constant deauth on 1 AP

You should open a TAC case in parallel so that they can obtain detailed information about your case and attempt to push this forward.  There is a limit to what personal information we can ask you here and that will keep us from making a real determination.

 

You mentioned that the version of code is 6.3.0.x  You are missing the last digit.  What is the output of "show version"?

 


*Answers and views expressed by me on this forum are my own and not necessarily the position of Aruba Networks or Hewlett Packard Enterprise.*
ArubaOS 8.5 User Guide
InstantOS 8.5 User Guide
Airheads Knowledgebase
Airheads Video Knowledge Base
Remote Access Point Solution Guide
ArubaOS Consolidated Release Notes
ArubaOS 8 ViA VPN Solution Guide
Highlighted
Occasional Contributor II

Re: iPad constant deauth on 1 AP

Hi 

 

The version is 6.3.1.13 

 

Thanks I will open case with TAC 

 

 

 

Regards
Khalid Shaikh
Nesma Telecom and Technology
ACMA ACMP ACCP CCIE R&S
Highlighted

Re: iPad constant deauth on 1 AP

I dont think this is a problem of Aruba contorller

This is more an issue with the apple IOS9

 

Check if the apple devices does have IOS 9?

There are multiple treads of users having issues with IOS 9 with random disconnects, and this happened after the upgraded to IOS 9.

 

Im facing the same issue and for what i see this didnt happen before and now all of the sudden its happening... and yes it was after the users did the upgrade to ios 9.

 

Cheers

Carlos

----------------------------------------------------
Project engineer