cancel
Showing results for 
Search instead for 
Did you mean: 

Trouble with Wireless Connections from MR33

Comes here often

Trouble with Wireless Connections from MR33

We have a location with a single AP (MR33). There is only a couple clients connecting to this AP during the week. We have recently had tickets where users are unable to connect to the corporate SSID. I swapped out for another spare AP 2 weeks ago and we have reports of the same issues. Below are some logs. I am new to the Meraki world so I am not sure how normal this is. This cycle starts at 8:01am and just continues over and over until 9:27am the same day. Is this normal logs for clients? This is not the only device this happens to at this particular location there are others. But these devices are fine at other locations with the same SSID settings and AP settings. 

 

Mar 14 08:03:24GVLAP007802.1X deauthentication
radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35  more »
Mar 14 08:03:21

GVLAP007

802.11 association
channel: 6, rssi: 5
Mar 14 08:03:05GVLAP007802.11 association
channel: 64, rssi: 33
Mar 14 08:03:05GVLAP007802.11 disassociation
unspecified reason
Mar 14 08:02:52GVLAP007802.11 association
channel: 64, rssi: 34
Mar 14 08:02:51GVLAP007802.11 disassociation
unknown reason
Mar 14 08:02:51GVLAP007802.1X deauthentication
radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35  more »
Mar 14 08:02:33GVLAP007802.11 association
channel: 64, rssi: 31
Mar 14 08:02:33GVLAP007802.11 disassociation
unknown reason
Mar 14 08:02:33GVLAP007802.1X deauthentication
radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35  more »
Mar 14 08:02:15GVLAP007802.11 association
channel: 64, rssi: 30
Mar 14 08:02:15GVLAP007802.11 disassociation
unknown reason
Mar 14 08:02:15GVLAP007802.1X deauthentication
radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35  more »
Mar 14 08:01:57GVLAP007802.11 association
channel: 64, rssi: 35
Mar 14 08:01:57GVLAP007802.11 disassociation
unknown reason
Mar 14 08:01:56GVLAP007802.1X deauthentication
radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35  more »
Mar 14 08:01:38GVLAP007802.1X deauthentication
radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35  more »
Mar 14 08:01:38GVLAP007802.11 association
channel: 64, rssi: 33
9 REPLIES 9
Kind of a big deal

Re: Trouble with Wireless Connections from MR33

What firmware is the AP running? (use 25.13).

Also if you have Intel NICs on the laptops I would update to 20.120.x.x package.

The deauthentication messages would be the ones to concern me, the rest are normal.

What is acting as your radius server?
Nolan Herring | nolanwifi.com
TwitterLinkedIn
Comes here often

Re: Trouble with Wireless Connections from MR33

Firmware on the AP is 25.13 currently up to date. 

 

Yes these are intel NICs but this is only happening on this particular AP. If it was a NIC issue on the laptop it should be happening at other locations in our enterprise. 

 

Our radius server is a 2012r2 server. 

 

Comes here often

Re: Trouble with Wireless Connections from MR33

You can see for today it's happened many times already. But when this device goes back to where it normally resides it does not happen. SWDAP01 is the AP in questions with device GVLAP007. You can see "deauthentication" around the enterprise is very minimal for other APs. 

 

3/15/2019 10:44RCKAP02FFG_CORPNWBTAB01802.1X deauthentication"radio: 1, vap: 2, client_mac: 98:5FSmiley Very Happy3:54:A8:F4"
3/15/2019 8:32PHPAP01FFG_CORPNWBTAB041802.1X deauthentication"radio: 0, vap: 2, client_mac: F0:6E:0B:CF:95Smiley Very HappyA"
3/15/2019 8:30SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:30SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:28SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:28SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:27SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:27SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:27SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:27SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:26SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:26SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:26SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:24SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:24SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:23SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:23SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:23SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:23SBHAP01FFG_CORPSBHLAP008802.1X deauthentication"radio: 1, vap: 2, client_mac: 7C:5C:F8:A6:ED:43"
3/15/2019 8:23SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:22SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:22SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:21SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:21LSTAP01FFG_CORPSBHLAP009802.1X deauthentication"radio: 0, vap: 2, client_mac: 80:00:0B:B7:AB:FB"
3/15/2019 8:20SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:20SWDAP01FFG_CORPFFGLAP040802.1X deauthentication"radio: 1, vap: 2, client_mac: 2C:6F:C9:03:88:F9"
3/15/2019 8:20SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:19SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:19SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
3/15/2019 8:19SWDAP01FFG_CORPGVLAP007802.1X deauthentication"radio: 1, vap: 2, client_mac: E4:42:A6Smiley Very Happy3:92:35"
Comes here often

Re: Trouble with Wireless Connections from MR33

Also this happens with pretty much any device that tries to connect to this AP. 

Kind of a big deal

Re: Trouble with Wireless Connections from MR33

To me this is showing clients authenticating/deauthenicating.  Are you using WPA2-Enterprise mode?  If so, is this AP correctly configured in the RADIUS server?  Is the RADIUS server showing any logs?

 

You should take a look at Wireless/Wireless Health and see what it reports.

 

It is possible you are being attacked and someone is sending de-auth frames.  Check out Wireless/Air Marshall.  You don't want to see any Rouge SSIDs, spoofs or malicious broadcasts.

Highlighted
Kind of a big deal

Re: Trouble with Wireless Connections from MR33

Also is the MR33 being powered by a 30W 802.3at switch, an 802.3at power injector or a power cube?

 

If you are only using 802.3af they can retard their performance.  If you go Wireless/Access Points it will report its power source.

Comes here often

Re: Trouble with Wireless Connections from MR33

There are no logs from the RADIUS server except positive logs, where I can see audits for successful RADIUS requests from this particular laptop during this particular time frame I posted. 

 

Yes we are using WPA2-Enterprise mode. 

 

There are no rogue SSIDs reported in Wireless>Air Marshal for the last week. There are no Spoofs or Malicious Broadcasts reported for the last week. I work for several different banks. We take security very seriously. I would have known about anything like this ahead of time and/or been alerted already. 

 

Power for the AP is PoE 802.3af. It is plugged directly into a brand new Cisco 2960-L switch. The issues were happening before that though when it was using a PoE injector to get power. It has not changed since removing that. 

 

 

 

 

Comes here often

Re: Trouble with Wireless Connections from MR33

Another note, this particular AP is not mounted on a ceiling. It is sitting on a shelf. 

Comes here often

Re: Trouble with Wireless Connections from MR33

Anybody have any other thoughts?

Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Points Contest
Join us for a month-long contest with heaps of swag to win!

Learn More ›