Client Deauth because of notification of driver

  • 2
  • Question
  • Updated 8 months ago
  • (Edited)
We have Kindles in a room and one day they may work fine and then the next they don't.  If you watch the wifi on the kindle itself you see that it loses connection and says something about authintication.  In Hivemanger NG if you what the log it shows when it loses connection and the reason it notifcation of driver.   Most of the time after a few minutes it will connect back, but I'm at a loss right now.  Here is the log

2017-11-10 09:23:07SSE 111C413E22626D4BasicRx auth <open> (frame 1, rssi -58dB)

2017-11-10 09:23:07SSE 111C413E22626D4BasicTx auth <open> (frame 2, status 0, pwr 13dBm)

2017-11-10 09:23:07SSE 111C413E22626D4BasicSta(at if=wifi0.1) is de-authenticated because of notification of driver

2017-11-10 09:23:07SSE 111C413E22626D4BasicRx assoc req (rssi -58dB)

2017-11-10 09:23:07SSE 111C413E22626D4BasicTx assoc resp <accept> (status 0, pwr 13dBm)

2017-11-10 09:23:07SSE 111C413E22626D4InfoWPA-PSK auth is starting (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4InfoSending 1/4 msg of 4-Way Handshake (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4InfoReceived 2/4 msg of 4-Way Handshake (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4InfoSending 3/4 msg of 4-Way Handshake (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4InfoReceived 4/4 msg of 4-Way Handshake (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4InfoPTK is set (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4BasicAuthentication is successfully finished (at if=wifi0.1)

2017-11-10 09:23:07SSE 111C413E22626D4Infostation sent out DHCP REQUEST message

2017-11-10 09:23:07SSE 111C413E22626D4InfoDHCP server sent out DHCP ACKNOWLEDGE message to station

2017-11-10 09:23:07SSE 111C413E22626D4BasicDHCP session completed for station

2017-11-10 09:23:07SSE 111C413E22626D4BasicIP 10.10.xx.xx assigned for station

2017-11-10 09:37:58SSE 111C413E22626D4BasicSta(at if=wifi0.1) is de-authenticated because of notification of driver

2017-11-10 09:37:58SSE 111C413E22626D4BasicSta(at if=wifi0.1) is de-authenticated because of notification of driver



Any Help would be greatly appreciated...

Photo of Bobby

Bobby

  • 23 Posts
  • 0 Reply Likes

Posted 8 months ago

  • 2
Photo of Eastman Rivai

Eastman Rivai, Official Rep

  • 146 Posts
  • 17 Reply Likes
Bobby,

What is the AP model and version? Could you share the AP's running configuration? 

Eastman
Photo of Bobby

Bobby

  • 23 Posts
  • 0 Reply Likes
Sorry so long on the reply we have been on Thanksgiving break.
The model is AP250 running hiveos 8.1r2a.  Not sure what config your looking for.  From the command prompt do you want the results of show run?
Photo of Eastman Rivai

Eastman Rivai, Official Rep

  • 146 Posts
  • 17 Reply Likes
Yes please
Photo of Bobby

Bobby

  • 23 Posts
  • 0 Reply Likes
security mac-filter Hive-Profile-1 default permit
security mac-filter PCS default permit
security mac-filter PCS-K12 default permit
radio profile 5GHz-AC
radio profile 5GHz-AC phymode 11ac
radio profile 5GHz-AC acsp access channel-auto-select time-range 00:00 04:00 station 5
radio profile 5GHz-AC interference-map enable
radio profile 5GHz-AC interference-map cu-threshold 35
radio profile 5GHz-AC interference-map crc-err-threshold 35
radio profile 5GHz-AC deny-client 11b
radio profile 5GHz-AC short-guard-interval
radio profile 5GHz-AC dfs
radio profile 5GHz-AC benchmark phymode 11b rate 11 success 60 usage 50
radio profile 5GHz-AC benchmark phymode 11b rate 5.5 success 70 usage 50
radio profile 5GHz-AC benchmark phymode 11g rate 36 success 70 usage 50
radio profile 5GHz-AC benchmark phymode 11g rate 24 success 80 usage 50
radio profile 5GHz-AC benchmark phymode 11a rate 36 success 70 usage 50
radio profile 5GHz-AC benchmark phymode 11a rate 24 success 80 usage 50
radio profile 5GHz-AC benchmark phymode 11n rate mcs4/2 success 80 usage 50
radio profile 5GHz-AC benchmark phymode 11n rate 54 success 70 usage 50
radio profile 5GHz-AC benchmark phymode 11ac rate mcs2/2 success 80 usage 50
radio profile 5GHz-AC benchmark phymode 11ac rate 54 success 70 usage 50
radio profile 5GHz-AC weak-snr-suppress enable
radio profile 5GHz-AC frameburst
radio profile 2.4GHz-BGN
radio profile 2.4GHz-BGN phymode 11ng
radio profile 2.4GHz-BGN acsp access channel-auto-select time-range 00:00 04:00 station 5
radio profile 2.4GHz-BGN interference-map enable
radio profile 2.4GHz-BGN deny-client 11b
radio profile 2.4GHz-BGN short-guard-interval
radio profile 2.4GHz-BGN benchmark phymode 11b rate 11 success 60 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11b rate 5.5 success 70 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11g rate 36 success 70 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11g rate 24 success 80 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11a rate 36 success 70 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11a rate 24 success 80 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11n rate mcs4/2 success 80 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11n rate 54 success 70 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11ac rate mcs2/2 success 80 usage 50
radio profile 2.4GHz-BGN benchmark phymode 11ac rate 54 success 70 usage 50
radio profile 2.4GHz-BGN weak-snr-suppress enable
radio profile 2.4GHz-BGN presence enable
radio profile 2.4GHz-BGN presence aging-time 15
radio profile 2.4GHz-BGN presence trap-interval 15
radio profile 2.4GHz-BGN presence aggr-interval 15
security-object PCS
security-object PCS security protocol-suite wpa2-aes-psk hex-key ***
security-object PCS security private-psk
security-object PCS security private-psk default-psk-disabled
security-object PCS default-user-profile-attr 10
security-object PCS-K12
security-object PCS-K12 security protocol-suite wpa2-aes-psk hex-key ***
security-object PCS-K12 security private-psk
security-object PCS-K12 security private-psk default-psk-disabled
client-monitor policy default_Policy problem-type association
client-monitor policy default_Policy problem-type authentication
client-monitor policy default_Policy problem-type networking
ssid PCS
ssid PCS security-object PCS
ssid PCS security mac-filter PCS
ssid PCS 11g-rate-set 11-basic 6 9 12 18 24 36 48 54
no ssid PCS inter-station-traffic
ssid PCS multicast conversion-to-unicast auto
ssid PCS client-monitor-policy default_Policy
ssid PCS-K12
ssid PCS-K12 security-object PCS-K12
ssid PCS-K12 security mac-filter PCS-K12
ssid PCS-K12 11g-rate-set 11-basic 6 9 12 18 24 36 48 54
ssid PCS-K12 multicast conversion-to-unicast auto
ssid PCS-K12 client-monitor-policy default_Policy
hive Hive-Profile-1
hive Hive-Profile-1 security mac-filter Hive-Profile-1
hive Hive-Profile-1 password ***
interface eth0 native-vlan 1
interface eth1 native-vlan 1
interface wifi0 radio profile 2.4GHz-BGN
interface wifi0 radio power 20
interface wifi1 radio profile 5GHz-AC
interface wifi1 mode access
interface mgt0 hive Hive-Profile-1
interface wifi0 ssid PCS
interface wifi1 ssid PCS
interface wifi0 ssid PCS-K12
interface wifi1 ssid PCS-K12
no system led power-saving-mode
kddr enable
security wlan-idp profile PCS-WIPS
security wlan-idp profile PCS-WIPS ap-policy
security wlan-idp profile PCS-WIPS ap-policy ap-oui
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry 00:19:77
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry d8:54:a2
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry 08:ea:44
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry c8:67:5e
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry 88:5b:dd
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry c4:13:e2
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry 40:18:b1
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry 9c:5d:12
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry e0:1c:41
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry f0:9c:e9
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry b8:7c:f2
security wlan-idp profile PCS-WIPS ap-policy ap-oui entry c8:66:5d
security wlan-idp profile PCS-WIPS adhoc
security wlan-idp profile PCS-WIPS ap-detection connected
security wlan-idp profile PCS-WIPS ap-detection client-mac-in-net
security wlan-idp profile PCS-WIPS sta-report
interface wifi0 wlan-idp profile PCS-WIPS
interface wifi1 wlan-idp profile PCS-WIPS
access-console security protocol-suite wpa2-aes-psk ascii-key ***
no access-console telnet
hostname "SSE 116"
admin root-admin admin password ***
interface mgt0 ip 10.10.X.X 255.255.248.0
ip route net 0.0.0.0 0.0.0.0 gateway 10.10.X.X
no interface mgt0 dhcp client
dns server-ip 10.10.X.X
dns server-ip 10.10.X.X second
dns server-ip 10.10.X.X third
dns domain-name pcs.k12.va.us
ntp server 0.aerohive.pool.ntp.org
ntp server 1.aerohive.pool.ntp.org second
ntp server 2.aerohive.pool.ntp.org third
ntp server 3.aerohive.pool.ntp.org fourth
ntp interval 1440
config version 40469241
config rollback enable
device-location "SSE Main Floor"
ssid PCS user-group Students
ssid PCS-K12 user-group Student-K12
os-detection method user-agent
mac-object Samsung-Tablets-6021C0 mac-range 6021:c000:0000 - 6021:c0ff:ffff
mac-object Samsung-Tablets-5CF8A1 mac-range 5cf8:a100:0000 - 5cf8:a1ff:ffff
mac-object Samsung-Tablets-5C0A5B mac-range 5c0a:5b00:0000 - 5c0a:5bff:ffff
mac-object Samsung-Tablets-044665 mac-range 0446:6500:0000 - 0446:65ff:ffff
mac-object Aerohive-F09CE9 mac-range f09c:e900:0000 - f09c:e9ff:ffff
mac-object Aerohive-E01C41 mac-range e01c:4100:0000 - e01c:41ff:ffff
mac-object Aerohive-D854A2 mac-range d854:a200:0000 - d854:a2ff:ffff
mac-object Aerohive-C8675E mac-range c867:5e00:0000 - c867:5eff:ffff
mac-object Aerohive-C8665D mac-range c866:5d00:0000 - c866:5dff:ffff
mac-object Aerohive-C413E2 mac-range c413:e200:0000 - c413:e2ff:ffff
mac-object Aerohive-B87CF2 mac-range b87c:f200:0000 - b87c:f2ff:ffff
mac-object Aerohive-9C5D12 mac-range 9c5d:1200:0000 - 9c5d:12ff:ffff
mac-object Aerohive-885BDD mac-range 885b:dd00:0000 - 885b:ddff:ffff
mac-object Aerohive-4018B1 mac-range 4018:b100:0000 - 4018:b1ff:ffff
mac-object Aerohive-08EA44 mac-range 08ea:4400:0000 - 08ea:44ff:ffff
mac-object Aerohive-001977 mac-range 0019:7700:0000 - 0019:77ff:ffff
capwap client server name hmng-prd-va-cwps-07.aerohive.com
capwap client server backup name hmng-prd-va-cwpm-01.aerohive.com
capwap client dtls hm-defined-passphrase *** key-id 1
capwap client vhm-name VHM-APMTJBQC
no capwap client dtls negotiation enable
location aerohive enable
no location aerohive list-match enable
qos airtime enable
user-profile Students qos-policy def-user-qos vlan-id 1 attribute 10
bonjour-gateway enable
application reporting auto
application reporting upload https://cloud-va.aerohive.com:443/afs-webapp/l7report/16502/ time-window 15 admin VHM-APMTJBQC password *** basic
application identification cdp-index 19000 cdp-name app19000
application identification cdp-index 19000 cdp-rule host=powertest.powerschool.com cdp-module HTTP
application identification cdp-index 19001 cdp-name app19001
application identification cdp-index 19002 cdp-name app19002
application identification cdp-index 19002 cdp-rule host=*.nwea.org cdp-module TLS
Photo of Eastman Rivai

Eastman Rivai, Official Rep

  • 146 Posts
  • 17 Reply Likes
Bobby,

I would change the data rate settings on both SSID to 
6 9 12-basic 18 24 36 48 54

and remove " deny-client 11b"  from both radio profiles.  I would also update the kindle's network driver if it is available. 

If the issue still happens please run "_debug auth all" obtain the AP's tech data, capture the wireless frames and open a support case.

Eastman