Are you positive it is the WLSE that is doing the request? Can you do the below and attach the output.
Go to the WLSE command line via telnet or SSH, login as admin, and use the following command:
dumptcp proto ip interface ethernet0 host log
where is ip address of the WDS AP or ACS server which is the destination. Allow the capture to run for 1.5 minutes or so if the interval you are seeing is 30 sec. After that, go to Admin->Appliance in the GUI and download a copy of the dumptcp.cap file and attach it here.
Usually this interaction is initiated by the WDS device.
I may have discovered what the problem is. On a recent posting (30 Jan 2006) called "WLSE WDS Authentication Issue" another user had problems with authentication of their WDS service. It would seem that I too may have been caught by bug CSCsb47726.
Because the authentication process is not quite working correctly, I suspect the WDS Access Point is trying to reauthenticate every 30 seconds to achieve "Security Keys Established" with the WLSE. At present it is only geting as far as "Authenticated".
This may also explain my problem with my WDS/WLSE/ Radio Management process not finding rogue access points since my recent upgrade to ACS 3.3.3 and WLSE 2.12.
I hope this helps others who may be in the same predicament.
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...