cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2580
Views
0
Helpful
8
Replies

Wireless connection disconnects

mahesh18
Level 6
Level 6

Hi Everyone,

I have Cisco 1811W at home for my wi fi network.

i lose the wi fi connection and after few mins it was working again.

Here are logs from Router

Nov 20 19:52:12.721 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station 1811w 74e5.0b5b.e788 Associated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 19:54:29.113 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   a00b.bacf.37a5 Associated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 19:57:08.625 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station  74e5.433b.c8db Associated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 19:57:40.741 MST: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticating Station 74e5.433b.c8db Reason: Previous authentication no longer valid SSID[ACDinternet]

Nov 20 19:57:42.205 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station  74e5.433b.c8db Reassociated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 20:01:28.835 MST: %DOT11-4-MAXRETRIES: Packet to client 74e5.433b.c8db reached max retries, removing the client

Nov 20 20:01:28.835 MST: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticating Station 74e5.433b.c8db Reason: Previous authentication no longer valid SSID[ACDinternet]

Nov 20 20:01:29.851 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station  74e5.433b.c8db Reassociated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 20:01:29.863 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:43.880 MST: %DOT11-4-MAXRETRIES: Packet to client 74e5.433b.c8db reached max retries, removing the client

Nov 20 20:01:43.880 MST: %DOT11-6-DISASSOC: Interface Dot11Radio0, Deauthenticating Station 74e5.433b.c8db Reason: Previous authentication no longer valid SSID[ACDinternet]

Nov 20 20:01:44.908 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.936 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station  74e5.433b.c8db Reassociated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 20:01:44.940 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.940 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.940 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.944 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.944 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.944 MST: %DOT11-4-TKIP_MIC_FAILURE: TKIP Michael MIC failure was detected on a packet (TSC=0x859D0F5200000000) received from 0000.0000.0000.

Nov 20 20:01:44.944 MST: %DOT11-3-TKIP_MIC_FAILURE_REPEATED: Two TKIP Michael MIC failures were detected within 15 seconds on Dot11Radio0 interface. The interface will be put on MIC failure hold state for next 60 seconds.

Nov 20 20:02:49.401 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   40fc.894e.c48c Associated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 20:02:58.614 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station  74e5.433b.c8db Associated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Nov 20 20:03:56.035 MST: %DOT11-6-ASSOC: Interface Dot11Radio0, Station   a00b.bacf.37a5 Associated SSID[ACDinternet] AUTH_TYPE[OPEN] KEY_MGMT[WPA PSK]

Need to  know if these logs tells any reason for disconnection?

Regards

Mahesh

8 Replies 8

Saurav Lodh
Level 7
Level 7
Error Message    DOT11-TKIP_MIC_FAILURE_REPEATED: Two TKIP Michael MIC failures were 
detected within [number] seconds on [interface] interface. The interface will be 
put on MIC failure hold state for next [number] seconds

Explanation   Because MIC failures usually indicate an active attack on your network, the interface  will be put on hold for the configured time. During this hold time, stations using TKIP ciphers are  disassociated and cannot reassociate until the hold time ends. At the end of the hold time, the  interface operates normally. Severity level: 3.

Recommended Action    Michael MIC failures usually indicate an active attack on your network. Search  for and remove potential rogue devices from your wireless LAN. If this is a false alarm and the  interface should not be on hold this long, use the countermeasure tkip hold-time command to  adjust the hold time.

Hi Saurav,

Which interface i should  config above command?

Also should i config hold time to less than 60 secs as seems 60 secs is default time.

There is no rogue device in my network.

Regards

Mahesh

Configure your wireless to support WPA2/AES with PSK, if it is supported on this model. Then you should not worry about this WPA/TKIP issue.

HTH

Rasika

**** Pls rate all useful responses ****

Hi Rasika,

Seems currently router is supporting WPA only.

Can you tell me which  IOS version supports WPA2?

Regards

Mahesh

I am not too sure Mahesh... if you have 256/64 (DRAM/FLASH) you can try to download latest image (c181x-adventerprisek9-mz.151-4.M7.bin) for this platform & see if that supports WPA2.

Documentation says WPA, but you could verify that since you have the product with you.

HTH

Rasika

**** Pls rate all useful responses ****

Here is the command to disable countermeasure from the cli

http://www.my80211.com/cisco-wlc-cli-commands/2009/12/29/configure-tkip-countermeasure-holdoff-timer-on-wlc.html

Sent from Cisco Technical Support iPad App

"Satisfaction does not come from knowing the solution, it comes from knowing why." - Rosalind Franklin
___________________________________________________________

abwahid
Level 4
Level 4

Hi,

Try latest version, which might have WPA2 supported.

 

Do you know any version which supports WP2?

Regards

MAhesh

Review Cisco Networking products for a $25 gift card