AP130 IOS device Authing with Certificate, RADIUS grants full access, Device drops from AP

  • 1
  • Question
  • Updated 1 year ago
  • (Edited)

Hi,

I've got 10 AP130's in our staff area and have noticed there is an issue with IOS (9 and 10)connecting using a Identity Certificate to auth.

IOS devices connect fine on our AP330's and AP370's all located in the student area, students have ipads yr's 3-6

On the AP130's the IOS device auth to RADIUS using the Cert, get accepted then drop the network

Same AP130 using the guest SSID, User/pass for auth rather than Cert but still RADIUS

IOS connects fine and remains connected


We didn't notice the issue with the AP130's until now as all staff have a windows laptop and we've only just allowed them to attach to our BYOD program


Here are the RADIUS Events for 2 different AP's

the AP130 give me an extra Account Session Identifier number for some reason, I haven't found the setting to turn that off

IOS

Event from AP330

Network Policy Server granted access to a user.

User:
 Security ID:   SCHOOL\smcipad244
 Account Name:   smcipad244
 Account Domain:   SCHOOL
 Fully Qualified Account Name: SCHOOL\smcipad244

Client Machine:
 Security ID:   NULL SID
 Account Name:   -
 Fully Qualified Account Name: -
 OS-Version:   -
 Called Station Identifier:  XX-XX-XX-XX-XX-XX:MyDevice@SMC
 Calling Station Identifier:  XX-XX-XX-XX-XX-XX

NAS:
 NAS IPv4 Address:  XXX.XXX.XXX.XXX
 NAS IPv6 Address:  -
 NAS Identifier:   S244-AH-WAP
 NAS Port-Type:   Wireless - IEEE 802.11
 NAS Port:   0

RADIUS Client:
 Client Friendly Name:  AerohiveVLAN
 Client IP Address:   XXX.XXX.XXX.XXX

Authentication Details:
 Connection Request Policy Name: Secure Wireless Connections
 Network Policy Name:  SMCiPad Authentication K-P - VLAN101
 Authentication Provider:  Windows
 Authentication Server:  NPS.school
 Authentication Type:  EAP
 EAP Type:   Microsoft: Smart Card or other certificate
 Account Session Identifier:  -
 Logging Results:   Accounting information was not written to any data store.

Quarantine Information:
 Result:    Full Access
 Session Identifier:   -

Event from AP130

Network Policy Server granted access to a user.

User:
 Security ID:   SCHOOL\smcipad244
 Account Name:   smcipad244
 Account Domain:   SCHOOL
 Fully Qualified Account Name: SCHOOL\smcipad244

Client Machine:
 Security ID:   NULL SID
 Account Name:   -
 Fully Qualified Account Name: -
 OS-Version:   -
 Called Station Identifier:  XX-XX-XX-XX-XX-XX:MyDevice@SMC
 Calling Station Identifier:  XX-XX-XX-XX-XX-XX

NAS:
 NAS IPv4 Address:  X.XXX.XXX.XXX
 NAS IPv6 Address:  -
 NAS Identifier:   C020-AH-WAP
 NAS Port-Type:   Wireless - IEEE 802.11
 NAS Port:   0

RADIUS Client:
 Client Friendly Name:  AerohiveVLAN
 Client IP Address:   X.XXX.XXX.XXX

Authentication Details:
 Connection Request Policy Name: Secure Wireless Connections
 Network Policy Name:  SMCiPad Authentication K-P - VLAN101
 Authentication Provider:  Windows
 Authentication Server:  NPS.school
 Authentication Type:  EAP
 EAP Type:   Microsoft: Smart Card or other certificate
 Account Session Identifier:  31343136423630352D3030303030303137
 Logging Results:   Accounting information was not written to any data store.

Quarantine Information:
 Result:    Full Access
 Session Identifier:   -

Windows 10

Network Policy Server granted access to a user.

User:
 Security ID:   SCHOOL\tstudent
 Account Name:   tstudent
 Account Domain:   SCHOOL
 Fully Qualified Account Name: SCHOOL\tstudent

Client Machine:
 Security ID:   NULL SID
 Account Name:   -
 Fully Qualified Account Name: -
 OS-Version:   -
 Called Station Identifier:  XX-XX-XX-XX-XX-XX:MyDevice@SMC
 Calling Station Identifier:  XX-XX-XX-XX-XX-XX

NAS:
 NAS IPv4 Address:  X.XXX.XXX.XXX
 NAS IPv6 Address:  -
 NAS Identifier:   C020-AH-WAP
 NAS Port-Type:   Wireless - IEEE 802.11
 NAS Port:   0

RADIUS Client:
 Client Friendly Name:  AerohiveVLAN
 Client IP Address:   X.XXX.XXX.XXX

Authentication Details:
 Connection Request Policy Name: Secure Wireless Connections
 Network Policy Name:  BYOD Authentication Yr8 - VLAN108
 Authentication Provider:  Windows
 Authentication Server:  NPS.school
 Authentication Type:  EAP
 EAP Type:   Microsoft: Smart Card or other certificate
 Account Session Identifier:  31343136423630352D3030303030303741
 Logging Results:   Accounting information was not written to any data store.

Quarantine Information:
 Result:    Full Access
 Session Identifier:   -


The windows laptop remains connected to the AP and runs as normal, the IOS device does a drop - reconnect dance

All AP's have the same network policy AP130's running HiveOS 7.1r1.142326, have also tested with 6.8r1 with the same results

330's and 370's running 6.6 and 6.5


I'm sure its a little Apple gotcha I've overlooked I just haven't managed to find the solution

Anyone got any ideas


Cheers

Photo of Jeremy

Jeremy

  • 7 Posts
  • 2 Reply Likes

Posted 1 year ago

  • 1
Photo of Ruwan Indika

Ruwan Indika

  • 66 Posts
  • 22 Reply Likes
Hi Jeremy,

Could you add a client to the client monitor, replicate the issue and post the result,



Photo of Jeremy

Jeremy

  • 7 Posts
  • 2 Reply Likes

Hi Ruwan,

There is 2-3 connects/disconnects in the list

the 4 way handshake looks to be the issue

03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (161)IEEE802.1X auth is starting (at if=wifi1.1)
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (162)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=19 length=233,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (163)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=19 length=90
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (164)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=20 length=415,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (165)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=20 length=243
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (166)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=21 length=325,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (167)Receive message from RADIUS Server: code=2 (Access-Accept) identifier=21 length=271  RADIUS_ATTR_TUNNEL_MEDIUM_TYPE:0=6 RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID:0=101 RADIUS_ATTR_TUNNEL_TYPE:0=13
03/20/2017 11:56:23 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (168)Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:24 AM  CCC7600DFD2F  885BDD0D7954  C020-AH-WAP  INFO    (169)Sending 1/4 msg of 4-Way Handshake (at if=wifi0.1)
03/20/2017 11:56:27 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (170)Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:27 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (171)Received 2/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:27 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (172)Sending 3/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:27 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (174)Sta(at if=wifi1.1) is de-authenticated because of notification of driver
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (175)Rx auth <open> (frame 1, rssi -44dB)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (176)Tx auth <open> (frame 2, status 0, pwr 14dBm)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (177)Rx assoc req (rssi -44dB)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (178)Tx assoc resp <accept> (status 0, pwr 14dBm)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (179)IEEE802.1X auth is starting (at if=wifi1.1)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (180)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=22 length=233,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (181)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=22 length=90
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (182)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=23 length=383,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (183)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=23 length=1590
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (184)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=24 length=262,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (185)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=24 length=485
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (186)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=25 length=1542,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (187)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=25 length=90
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (188)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=26 length=1542,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (189)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=26 length=90
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (190)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=27 length=1450,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (191)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=27 length=153
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (192)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=28 length=262,  User-Name=smcipad244 Called-Station-Id=88-5B-DD-0D-79-64:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F NAS-IP-Address=192.168.247.73
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  DETAIL  (193)Receive message from RADIUS Server: code=2 (Access-Accept) identifier=28 length=271  RADIUS_ATTR_TUNNEL_MEDIUM_TYPE:0=6 RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID:0=101 RADIUS_ATTR_TUNNEL_TYPE:0=13
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (194)Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (195)Received 2/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  INFO    (196)Sending 3/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (198)Sta(at if=wifi1.1) is de-authenticated because of notification of driver
03/20/2017 11:56:28 AM  CCC7600DFD2F  885BDD0D7954  C020-AH-WAP  BASIC   (199)Sta(at if=wifi0.1) is de-authenticated because of 4way handshake failure
03/20/2017 11:56:31 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (201)Rx auth <open> (frame 1, rssi -44dB)
03/20/2017 11:56:31 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (202)Tx auth <open> (frame 2, status 0, pwr 14dBm)
03/20/2017 11:56:31 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (203)Rx assoc req (rssi -44dB)
03/20/2017 11:56:31 AM  CCC7600DFD2F  885BDD0D7964  C020-AH-WAP  BASIC   (204)Tx assoc resp <accept> (status 0, pwr 14dBm)

Photo of Ruwan Indika

Ruwan Indika

  • 66 Posts
  • 22 Reply Likes
Hi Jeremy,

Please disable voice enterprise setting if you have enabled and try again,



Photo of Jeremy

Jeremy

  • 7 Posts
  • 2 Reply Likes

Hi Ruwan,

those are already disabled


Cheers

Photo of Jeremy

Jeremy

  • 7 Posts
  • 2 Reply Likes

Hi Ruwan,

Looks like I've found the solution


For some reason my SSID had WMM turned off, only thought of it because of your image showing the Enterprise voice controls.

Checked my other SSIDs and they all had it on. I've turned it on for that SSID and AP and the ipads connect (see below).

So an iPad IOS 10 will fail to connect to an SSID using cert based auth on an AP130 if Enable WMM isn't ticked where it will connect on AP330 and AP370's.

I've got 2 AP121's I'm going to test too


Cheers


03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (53)IEEE802.1X auth is starting (at if=wifi1.1)
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (54)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=98 length=161,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (55)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=98 length=90
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (56)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=99 length=311,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (57)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=99 length=1590
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (58)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=100 length=190,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (59)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=100 length=485
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (60)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=101 length=1470,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (61)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=101 length=90
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (62)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=102 length=1470,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (63)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=102 length=90
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (64)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=103 length=1378,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (65)Receive message from RADIUS Server: code=11 (Access-Challenge) identifier=103 length=153
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (66)Send message to RADIUS Server(192.168.51.38): code=1 (Access-Request) identifier=104 length=190,  User-Name=smcipad244 NAS-IP-Address=192.168.247.17 Called-Station-Id=08-EA-44-3E-E3-A8:MyDevice@SMC Calling-Station-Id=CC-C7-60-0D-FD-2F
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  DETAIL  (67)Receive message from RADIUS Server: code=2 (Access-Accept) identifier=104 length=271  RADIUS_ATTR_TUNNEL_MEDIUM_TYPE:0=6 RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID:0=101 RADIUS_ATTR_TUNNEL_TYPE:0=13
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (68)Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (69)Received 2/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (70)Sending 3/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (71)Received 4/4 msg of 4-Way Handshake (at if=wifi1.1)
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (72)PTK is set (at if=wifi1.1)
03/20/2017 09:20:47 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  BASIC   (73)Authentication is successfully finished (at if=wifi1.1)
03/20/2017 09:20:49 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (74)station sent out DHCP REQUEST message
03/20/2017 09:20:49 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  INFO    (75)DHCP server sent out DHCP ACKNOWLEDGE message to station
03/20/2017 09:20:49 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  BASIC   (76)DHCP session completed for station
03/20/2017 09:20:49 AM  CCC7600DFD2F  08EA443EE3A8  S244-AH-WAP  BASIC   (77)IP 192.168.101.23 assigned for station

Photo of Ruwan Indika

Ruwan Indika

  • 66 Posts
  • 22 Reply Likes
Excellent, usually if 4-way handshake fail at 3/4 it is either that voice enterprise is enabled and the client doesn't support it or wmm is disabled.