INTEL WIRELESS
Wired Stuff
WiFi Tablet Corner
My80211 White Papers (Coming Soon!)

Cisco Wireless Compatibility Matrix (Nov. 2011)

Podcasts / Videos

My80211 Videos

Cisco: 802 11 frames with Cisco VIP George Stefanick

Fluke Networks: Minimize Wi Fi Network Downtime

Aruba: Packets never lie: An in-depth overview of 802.11 frames

ATM15 Ten Talk “Wifi drivers and devices”

Houston Methodist Innovates with Wireless Technology

Bruce Frederick Antennas (1/2)

 

Bruce Frederick dB,dBi,dBd (2/2)

Cisco AP Group Nugget

Social Links
Revolution WiFi Capacity Planner

Anchor / Office Extends Ports

 

Peek Inside Cisco's Gear

See inside Cisco's latest wireless gear!

2.4 GHz Channel Overlap

EXAMPLE 1  

EXAMPLE 2

EXAMPLE 3  

CWSP RELEASE DATE 2/08/2010
  • CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
    CWSP Certified Wireless Security Professional Official Study Guide: Exam PW0-204
    by David D. Coleman, David A. Westcott, Bryan E. Harkins, Shawn M. Jackman

    Shawn Jackman (Jack) CWNE#54 is a personal friend and has been a mentor to me for many years.  I've had the pleasure and opportunity to work with Jack for 4 years. Jack is a great teacher who takes complex 802.11 standards and breaks them down so almost anyone can understand the concept at hand. I'm excited for you brother. Great job and job well done! Put another notch in the belt!

IEEE 802.11a/g/n Reference Sheet

 

LWAPP QoS Packet Tagging

 

 

Interference Types

BLUETOOTH
 

Microwave Oven
 

Cordless Phone

JAMMER!
 

  

Wednesday
Feb202013

BUG CSCtn75346: 7925 phone loses 5 GHz connection intermittently with OEAP600

My 2 second sales pitch

Cisco Office Extends is a very powerful enterprise tool to have in your arsenal. It is changing the way we look at remote workers enterprise wide. The ease of installation and seamless mobility from enterprise to home is changing the way we do business.  It helps with users who are technically challenged and at times have issues with the simplest of VPN clients. Most notable in healthcare remote coders. 

On a recent trip to South America I packed my AP600 and Cisco 7925 and conducted long distance testing from Chile to Houston. The calls where remarkably good and my connection was better then some hotel connections with VPN. 

Cisco Office Extends AP600 Bug -

After completing our Office Extends design I had issues connecting my Cisco 7925 Wireless Phone to my Office Extends access point (AP600). The 7925 would cycle on and off the wireless network while constantly displaying the “locating network services” on the handset. 

 


After a packet capture, it was very apparent the issue was the NAV timer. The phone would regularly send a CTS-SELF with a NAV timer set at 18,800us. Normally you might see a NAV at a value of 44us or there around.  

By triggering a frame with a NAV timer set to 18,800us, the Cisco phone was telling everyone on the channel not to communicate because the phone had data to send and it would take 18,800us. Clearly the payload didnt warrent that amount of time.

 

For the non 802.11 readers -- What does this all mean ?

802.11 wireless networks are a half duplex medium, meaning only 1 device can transmit a frame on the medium at a time. In this case, the medium is a channel for example <1, 6 or 11>. 

802.11 use Carrier Sense Multiple Access - Collision Avoidance (CSMA-CA). The Collision Avoidance is particularly interesting. 802.11 uses protocols to sense the wireless medium to determine if the medium is busy or idle. It does this with CSMA-CA. CSMA-CA uses 2 protocols. 

They are Physical Carrier Sense (CCA) and Virtual Carrier Sense (NAV). 

Physical Carrier Senses uses Clear Channel Assessment (CCA). Think of CCA like a pair of ears attached to your head.  Always listening to the medium to determine if other device(s) are on channel trigger frame transmissions. If it senses frame transmissions or elevated levels of non 802.11 interference it will determine the medium as busy. 

Virtual Carrier Sense uses Network Allocation Vector (NAV). When a frame marks the duration with a specific value, in our case 18,800us. Other devices within range of this frame will read this duration value. These devices will then BACKOFF for this set amount of time. This includes access points.

You can see, the Cisco phone was telling all other devices on the channel not to communicate for 18,800us. Normally, most client reserve the medium for 60 - 200us to send traffic. This is why I think the phone would go into locating network services. The access point read the NAV and wasn't allowed to trigger a beacon. No beacon no network. Phone drops and then tries to find the network again.

Upgrade to 1.4.3SR1 fixed the issue

CSCtn75346 Bug Details

7925 phone loses 5 GHz connection intermittently with OEAP600
Symptom:
7925 phone loses 5 GHz connection intermittently with OEAP600.
No connectivity issues when using 2.4 GHz.

Conditions:
Using an OEAP600, or certain third-party 802.11n APs, and 7925 on 5 GHz.

Workaround:
Use 2.4 GHz or an alternate AP platform.
Status Status 
Fixed 

Severity Severity 
3 - moderate 

Last Modified Last Modified 
In Last Year 

Product Product 
Cisco Unified IP Phone 7900 Series 

Technology Technology 
Wireless, Mobile 

1st Found-In 1st Found-in 
1.4(1)
1.4(2) 

Fixed-In Fixed-in 
1.4(3)
1.4(2)ES3

 

“While others may cringe at complex issues. I look at it from a different pair of glasses. The glasses called opportunity to learn something new”.  ~ George Stefanick

Wednesday
Feb132013

Cisco Bridge Alignment ~ Real World Example Using RSSI Voltage

WiFi engineer Timothy Dennehy, a friend of this blog recently blogged about Cisco Bridge alignment using RSSI voltage. Coincidently, I was working on a bridge project at the same time. With Tim's permission, I've reposted. You can visit Tims blog @ http://justdowifi.blogspot.com. On my project, I was able to increase dBm by -33 using this alignment technique.

I was recently called out to investigate a Wi-Fi bridge link that was being accused of being the culprit of a myriad of network problems.

Upon arrival on site, I noticed that the main site’s Wi-Fi bridge was sitting on channel 161, and that channel was overpopulated since there were two access points in the building, both on channel 161.  I moved the building’s access points to the UNII-1 band, and changed the bridge’s channel  to help alleviate some of the congestion since there was another access point on that channel across the street.  These three screen shots are  before I made any changes:

Note that the bridge is capable of achieving a 54 mb/s data rate, however only 3% of all the packets are traveling at that rate – and 92% of them are data packets.  The busiest data rate is the lowest data rate – with 72% of the traffic at that rate.  Hmmm….

Also, a quick screenshot as a baseline..

After coming up with a channel/power plan, I made the necessary changes.  The following three screenshots are post channel plan change.  I saw immediate improvement after my change.  The first screenshot is of the devices now on their newly assigned channels.

With the bridge’s new channel assignment, there is far less noise in the environment and the SNR increases.  This allows the bridge to negotiate a higher data rate.  On channel 153, the bridges are now able to send 78% of the data at 18 mb/s.  A dramatic increase over what I saw when sharing the same channel with other 802.11 devices.

Now that we have some of the low hanging fruit taken care of, it is time to check the out the line of site between the two dish antennas that are making this 2.79 mile Wi-Fi link.

When I did the calculations for this link, I discovered this link should easily handle 54 mb/s since it is less than three miles and it is using high gain antennas.   But it wasn’t, and here I am… (onsite)

I went up on the roof to take a look and here is what I found:

Physically, everything looked good.  But distance from the ground was only 16 feet.  The calculations from two online calculators both agreed these antennas should be ~35 feet above the ground.  Now to take a look at what the antenna sees:

I have centered the antenna’s “target” in this picture.  There is a “V” between those two trees you see in the middle, and a little white speck centered in the V.  That’s our target!  As you can see, we don’t have a clear line of site, which means the antenna does not either.

Fortunately the Electricians came to the rescue with an extension of ten feet.  After the extension had been fabricated, a bucket truck was used to move the antenna up ten feet.

Here’s the antenna’s new view:

Now that’s more like it.  The target is the white blur you see in the middle of this view.  There’s nothing we can do about the metal electrical pole in the middle, which I am told was not there when the link was initially designed.

Now what?  Well, we moved it up, but dishes are not easy to align because they don’t come with any type of sight, and when you are standing behind one (or sitting in the bucket of a bucket truck 30 feet above the ground) you can’t really see what you are doing.

We decided to use the RSSI port on the Cisco bridge to align it.  The first thing you need to do is identify the BNC connector on the unit, which is #2 on the graphic below.

And in “real life”…

Next, you’ll need a length of RG-6 or other 75 ohm coaxial cable with a BNC connector on it.  I bought my raw cable at Home Depot and the BNC cable at Radio Shack.  I stripped both ends with my coaxial cable stripper (I just happen to have one of those) and screwed one end into the BNC connector.  The other end I left raw – that’s the end I connected to my multimeter.  When I was at Radio Shack, I also bought a pair of alligator clips for my test leads – see photo of meter below.  These little gems allow you to clip the meter’s probes to the coaxial wire – connect the red to the center conductor, and the black to the shield.  It is a lot easier than trying to hold the test lead directly to the conductor – especially if you are by yourself.  For a myriad of reasons, I do not recommend doing this alone. 

Connect the BNC cable to the port and measure the voltage with a multimeter.  I snagged this little multimeter at Home Depot for twenty bucks on the same trip when hunting the RG-6.  The other things are in my toolkit – a pair of radios for communicating with someone at the other end of the link, a flexible mirror, and some rubber tape.  The rubber tape is used for weatherproofing cables and connectors, and the mirror for reflecting light.  It sometimes works, sometimes doesn’t.  Don’t try  it at night… it won’t work.  A road flare, on the other hand…

With the connector on the bridge, simply connect the meter and read the voltage using the vdc scale.   I measured the voltage before we raised the antenna so we would have a baseline, and it was .78 vdc.

With the antenna now raised, we simply moved the antenna back and forth, from left to right and then up and down until we reached the highest voltage we could achieve.  We did read 1.43 vdc once, and then tried to find that again but could not and finally settled with 1.35 vdc.  I was happy with that and we decided that we should lock it down and be done with it.

I am also going to mention the length of the coaxial cable.  You may be tempted to use/purchase a short piece of cable.  If you are up in a bucket truck and someone else is there, it is nice to be able to have someone call out the voltage levels to you while you do the antenna adjustment.  A long cable is your friend sometimes.  It isn’t expensive or heavy, so why not get 10 feet or more.  You’ll thank me later.

For those of you who are curious, here’s what the scale looks like when trying to align a Wi-Fi link:

We went from somewhere around -70 dBm (we were at .78 vdc) to approximate -55 dBm.  In my book, that is phenomenal.  We gained at least 10 dB – those of you who are knowledgeable in RF math know what that means!

I will also mention there is another way to align the antennas if you don’t have a meter, etc.  I have not done it this way, however I will include the directions here anyway.  I clipped this information from the hardware installation guide.

“Aligning the Antenna Using LED Indications” (from the Cisco manual)

 

You can align the integrated antenna using LEDs after the bridge successfully associates with a remote  bridge. In the installation mode before association to another bridge, the Install LED blinks amber. If the bridge associates to a root bridge, the Install LED turns continuous amber. If the bridge does not associate to a root bridge in the first 60 seconds, the Install LED blinks green to indicate beacons are being transmitted and the bridge is waiting for another non-root bridge to associate. After association, the Install LED turns into continuous green and the Ethernet, status, and radio LEDs then display signal strength as shown below.  When using LEDs to maximize the signal, adjust the antenna until as many LEDs as possible are turned on and the rest are blinking as fast as possible.

 Here’s the equivalent scale to the RSSI voltage method.

This is a real world example of what the LEDs look like on the back of the bridge.  As you can probably guess,  trying to watch these LEDs and aim an external antenna might be a challenge in the afternoon sun.

Now the antenna has been raised and aligned, I want to see what the traffic looks like with a protocol analyzer.  Looks 98% of the traffic is traversing the Wi-Fi link at 54 mb/s.


I confirmed with a console connection to each bridge that the signal is now in the -55 dBm range, just as the bridge RSSI voltage table depicted.  The SNR was now in the 35-40 dB, much higher than earlier reports of it being in the 10-15 dB range.

  

What a difference ten feet makes!  Mission successful…

One of my lessons learned on this expedition was the fact that I forgot to grab some screenshots of the console output BEFORE I did my work.  I have a protocol analysis of what it looked like before I started, however I don’t have any CLI.  I would love to have a “before and after” – I’ll just have to settle for that screenshot above.  Next time I won’t forget.

BTW, thanks to all who helped me out with blogging.  I appreciate all the input.  You know who you are.

 

 

Tuesday
Feb122013

WFD#4 February 13-15th, 2013 ~ NEXT STOP SAN JOSE!

Once again I received the privilege of attending WFD! This is my 4th Wireless Field Day event. Many thanks to Stephen, Claire and to the other delegates! 

WHAT SHOULD YOU KNOW ABOUT WFD#4?

Field Day events bring together innovative IT product vendors and independent thought leaders to share information and opinions in a presentation and discussion format. Independent bloggers, freelance writers, and podcasters have a public presence that has immense influence on the ways that products and companies are perceived and by the general public.

DO YOU HAVE A QUESTION FOR A PARTICIPATING VENDOR? 

Feel free to tweet your question to any one of the delegates and we will ask on your behalf!

WHAT WFD MEANS TO ME

WFD is an awesome experience to collaborate with other like minded individuals. Share ideas, individual experience, and subject matter expertise. Each delegate brings a unique perspective to the WFD group.

Visiting the shakers and movers in the WiFi industry and getting their undivided attention is a great experience. Often times getting a behind the curtain look at their product road maps and new features.  Getting this exposure helps me understand the direction of WiFi, new products and whats coming out. This allows me to be a better decision maker and a more informed engineer.

Exposure received during these events is massive. Expect hundreds of tweets passing the word. You can also view via live streaming. Check the schedule below!

Social networking is an important aspect in todays networking. Gestalt IT brings it to life in this social media event! 

WFD SPONSORS

I would like to personally thank the below sponsors for participating in WFD4! cant wait to meet you foks!

pastedGraphic.pdf

pastedGraphic_1.pdf

pastedGraphic_2.pdf

pastedGraphic_3.pdf

pastedGraphic_4.pdf

 

 

Delegates

Delegates are selected by the Field Day Delegate community. For more information on our selection process, please see our page about becoming a Field Day Delegate.

 

pastedGraphic_5.pdf

Blake Krone

@BlakeKrone

Blake Krone is Cisco CCIE Wireless and CWNA certified Wireless Network Architect with experience designing and deploying enterprise class networks supporting hundreds of APs and multiple controllers for Voice, Data, and RTLS.

pastedGraphic_6.pdf

Chris Lyttle

@WiFiKiwi

 

pastedGraphic_7.pdf

Daniel Cybulskie

@SimplyWiFi

Daniel Cybulskie is a Senior Security Consultant out of the Toronto, Ontario, Canada area.

pastedGraphic_8.pdf

George Stefanick

@WirelesssGuru

George Stefanick is a Wireless Architect employed by a large healthcare system in the Texas Medical Center.

pastedGraphic_9.pdf

Jennifer Huber

@JenniferLucille

Jennifer has over 10 years of experience in the networking and wireless engineering industry.

pastedGraphic_10.pdf

Keith R. Parsons

@KeithRParsons

Keith Parsons is Managing Director of the Institute for Network Professionals.

pastedGraphic_11.pdf

Lee Badman

@WiredNot

Lee Badman currently writes for Network Computing Magazine as Wireless and Mobility blogger, and has over twelve years of professional industry analysis under his belt.

pastedGraphic_12.pdf

Mark Julier

@MarkJulier

Mark Julier is CEO and founder of DigitalAir Wireless Networks which was established nearly 10 years ago.

pastedGraphic_13.pdf

Peter Paul Engelen

@PPJM_Engelen

Peter-Paul Engelen is a technical consultant with advanced (pre) sales experience and business development skills in multi-vendor Cloud-based (W)LAN and Wholesale ISP/Carriers.

pastedGraphic_14.pdf

Sam Clements

@Samuel_Clements

Sam Clements is an avid wireless technologist with a passion for all things mobility.

pastedGraphic_15.pdf

Scott Stapleton

@ScottPStapleton

Scott started out in Wi-Fi with nothing more than a soldering iron and N-type connector in hand, scouring roof tops for ex-pay-TV antennas as part of the community Wi-Fi movement of the early 2000s.

pastedGraphic_16.pdf

Steve Williams

@SWilliams_Group

Although Steve has a strong routing and switching background, today he focuses mainly on WiFi, Firewalls and Identity Management.

 

Presentation Calendar

Most presentations are streamed live on this page, at TechFieldDay.com, and at some delegate and presenter web sites. After the event, the following pages contain video recordings of these presentations.

 

Wednesday, Feb 13

14:00-16:00

Motorola Solutions Presents at Wireless Field Day 4

Wednesday, Feb 13

16:00-18:00

Wi-Fi Stress Tests with Keith Parsons

Thursday, Feb 14

08:00-10:00

Juniper Presents at Wireless Field Day 4

Thursday, Feb 14

13:00-17:00

Aruba Networks Presents at Wireless Field Day 4

Friday, Feb 15

9:00-10:00

Meraki Presents at Wireless Field Day 4

Friday, Feb 15

10:30-12:30

Cisco Presents at Wireless Field Day 4

 
Thursday
Jan312013

Cisco Wireless LAN Controllers and Lightweight Access Points Code Release 7.0.240.0

Cisco releases code 7.0.240.0

Resolved Caveats

Table 1-7 lists caveats resolved in controller software release 7.0.240.0.

 

Table 1-7 Resolved Caveats 

ID Number
Description

CSCtk13612

Unable to get the order of WLANs in an AP group configuration. When AP Group templates are discovered in WCS, the WLAN order does not match the configuration on the controller.

CSCuc78713

Wireless client do not receive broadcast packets after broadcast key rotation.

CSCty75270

Controller does not keep max RSSI used when classifying rogue AP.

CSCtn78269

Brand new LAPs come up on unexpected channels.

CSCtq97915

1120 and 1130 Lightweight Access Points associated to a controller log memory allocation errors, and can crash or loose configuration.

CSCtr21759

Incorrect transmission of AMSDU within the active block ACK agreement.

CSCts05391

H-REAP client IP address does not appear in the client details on the controller.

CSCts13482

Controller does not update the shared secret.

CSCtt20493

Guest clients stay in Web-Auth Required state without getting redirected.

CSCtt96265

Controller fails to transfer or save configuration and eventually crashes. No crash log available.

CSCtu19860

Controller does not set 802.1p marking for downstream CAPWAP packets.

CSCtw69785

DCA list corrupt with 16 or more configured country codes.

CSCtw94633

Intermittent DHCP packet drop per VLAN for anchor scenario.

CSCtx00942

Webauth stops redirecting after some time.

CSCtx03556

TACACS user login failure on Cisco 5508 Controller running 7.0.116.0.

CSCtx08257

DHCP required configuration enabled on a WLAN is not retained after the controller reboots.

CSCtx17062

Controller client statistics appear blank.

CSCtx42747

AP 3500 radio core dump.

CSCtx17650

Controller may experience a partial denial of service condition when receiving certain malformed HTTP/HTTPS packets.

CSCtx43418

AP manager interface replies to ping using the wrong port.

CSCtx43436

1522CM RAP blacklists the Ethernet/Cable interface.

CSCtx49189

Preauthentication ACL gets removed from Web Auth WLAN.

CSCtx56334

HREAP client does not successfully roam between two controllers.

CSCtx61016

Incorrect BSSID client count on the AP.

CSCtx92465

Monitor mode AP interference measurements not accurate.

CSCty05792

Wireless clients receive GARP from different VLAN.

CSCty07036

CCKM EAPOL broadcast key rotation breaks during M5 exchange.

CSCty15308

CAP3502P-Q reboots every 15 minutes with 7.0.230.0 controller image.

CSCty38823

Memory leak may occur for EAP Framework task.

CSCty45960

TFTP backup config does not show correct setting for exclusion list timer.

CSCty47582

Controller crashes while running show ap eventlog <AP Name> command.

CSCty68030

For AP 3500/1260, upgrade bootloader automatically from IOS.

CSCty82919

AP 1130 in HREAP mode does not send deauthenticate non-associated client.

CSCty96959

Spaces are not allowed in SSID after migration from autonomous, or upgrade from 6.0/7.x releases.

CSCtz05201

5508 controller crashes on LDAP DP Task 1 and 2.

CSCtz20766

Controller crash: software failed on instruction ewaFormSubmit_blacklistclient.

CSCtz23878

802.1x authentications stop happening on specific WLANs.

CSCtz24594

Controller deauthenticates EAP client when credentials change.

CSCtz31572

Wireless clients associated to a Flexconnect locally switched WLAN may not be able to receive broadcast traffic like ARP.

CSCtz43631

Controller keeps ghost client entry if the network between controller and HREAP is unstable.

CSCtz50719

WISM out of memory crash on 7.0.220.0 controller image.

CSCtz55502

Multicast packets may stop or be sent out of order for power-save clients.

CSCtz89535

Motorola MC75 gives inconsistent linktest results.

CSCua29504

802.11w-capable client fails pairwise key handshake with AES.

CSCua39538

Controller with media snooping crashes due to memory corruption.

CSCua59722

Controller crashes with sig11, null pointer exception. Crash file shows sshpmDeleteLeakedWebauthRule.

CSCua60653

Following multiple vulnerabilities in controllers:

Wireless Intrusion Prevention System (wIPS) Denial of Service Vulnerability

Session Initiation Protocol Denial of Service Vulnerability

HTTP Profiling Remote Code Execution Vulnerability

SNMP Unauthorized Access Vulnerability

CSCua74143

WISM with 7.0.230.0 has low buffer length for the packet sent by Catalyst 6K.

CSCua93936

Broadcast Key rotation does not use rotated index 1 and 2.

CSCub07426

SP800-90A DRBG, entropy source updation.

CSCub46092

HREAP-AP is central switch when the WLAN is set for local switch.

CSCub49367

When client roams in a quarantine VLAN, with Authentication enabled, controller cannot change VLAN successfully.

CSCub57982

CT5508 crashes at capwapSocketTask due to malloc corruption.

CSCub65575

WiSM forwards broadcast ARP requests to APs in local mode or H-REAP advertises centrally switched WLANs.

CSCub82353

Controllers configured as mobility anchors may not properly block injected traffic from the network.

CSCub97882

For H-REAP local switching, the WLAN-VLAN mapping changes.

CSCuc06422

World Mode is enabled automatically for the controller.

CSCuc33930

Controller crash in ewaFormSubmit_guestuser_list.

CSCuc68648

5508 controller with 7.0.230.0 image crashes every week due to a memory leak in SNMP.

CSCuc74769

At random intervals, a controller crashes on a WISM1 blade running 7.0.235.0 image.

CSCud05299

WGB client entry leak at radio driver level.

CSCud47994

Continuous RNG test for SP800-90 DRBG seed.

CSCud90781

Controller crashes after loading test image.

CSCue13451

A new 7500 series controller fails to boot a 7.0 image.

CSCud65237

Voice disruption after roaming when a wrong TID is sent on the block ACK sent by the client.

CSCto02968

Memory leak issue.

http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7_0_240_0.html

Tuesday
Jan292013

What does the RTD-1-ADDR_FLAP system message mean?

I ran into this very issue many moons ago. Good post by Vinay! 

By: Vinay Sharma - Cisco 
  

Introduction

What does the RTD-1-ADDR_FLAP system message mean?

Resolution

The RTD-1-ADDR_FLAP error message indicates that a MAC address is moving consistently between different ports. This error message is only applicable on the Catalyst 2900XL and 3500XL switches. 

If users move from one Access Point (AP) to another and the MAC address shows up on a  different switch port, the error messages are displayed. These messages do not necessarily mean that there is a problem. They are displayed for informational purposes only.

It is part of normal operation for a  switch to re-learn the MAC address every time it is seen on a different port. This action always generates this message. The RTD-1-ADDR_FLAP system status messages should not necessarily be considered errors,  particularly on ports where there are APs attached.

For example, if there are APs attached to ports 3/4 and 3/5, and clients associated to those APs are roaming back and forth between the two APs, the MAC addresses of the clients are truly moving back and forth between those two switch ports. The status messages are accurate, and there is no cause for alarm.

Additional Information

Error Message

RTD-1-ADDR_FLAP [chars] relearning [dec] addrs per min

Explanation

Normally, MAC addresses are learned once on a port. Occasionally, when a switched network reconfigures, due to either manual or STP reconfiguration, addresses learned on one port are relearned on a different port. However, if there is a port anywhere in the switched domain that is looped back to itself, addresses will jump back and forth between the real port and the port that is in the path to the looped back port. In this message, [chars] is the interface, and [dec] is the number of addresses being learnt.

Recommended Action

Determine the real path (port) to the MAC address. Use the debug ethernet-controller addr command to see the alternate path-port on which the address is being learned. Go to the switch attached to that port. Note that the show cdp neighbors command is useful in determining the next switch. Repeat this procedure until the port is found that is receiving what it is transmitting, and remove that port from the network.

Problem Type

Error message

Products

Access point

Reference

Runtime diagnostic error messages

 

Sunday
Jan132013

End-of-Sale and End-of-Life Announcement for the Cisco Secure Access Control System 5.2 (CSACS-5.2) Software

Cisco announces the end-of-sale and end-of life dates for the Cisco Secure Access Control System 5.2 (CSACS-5.2) Software. The last day to order the affected product(s) is July 12, 2013. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract.

http://www.cisco.com/en/US/prod/collateral/netmgtsw/ps5698/ps6767/ps9911/eol_C51-726115.html 

Table 1. End-of-Life Milestones and Dates for the Cisco Secure Access Control System 5.2 (CSACS-5.2) Software

 

Milestone

Definition

Date

End-of-Life Announcement Date

The date the document that announces the end of sale and end of life of a product is distributed to the general public.

January 11, 2013

End-of-Sale Date

The last date to order the product through Cisco point-of-sale mechanisms. The product is no longer for sale after this date.

July 12, 2013

Last Ship Date:
App. SW

The last-possible ship date that can be requested of Cisco and/or its contract manufacturers. Actual ship date is dependent on lead time.

October 10, 2013

End of SW Maintenance Releases Date:
App. SW

The last date that Cisco Engineering may release any final software maintenance releases or bug fixes. After this date, Cisco Engineering will no longer develop, repair, maintain, or test the product software.

July 12, 2014

End of New Service Attachment Date:
App. SW

For equipment and software that is not covered by a service-and-support contract, this is the last date to order a new service-and-support contract or add the equipment and/or software to an existing service-and-support contract.

July 12, 2014

End of Service Contract Renewal Date:
App. SW

The last date to extend or renew a service contract for the product.

October 8, 2015

Last Date of Support:
App. SW

The last date to receive applicable service and support for the product as entitled by active service contracts or by warranty terms and conditions. After this date, all support services for the product are unavailable, and the product becomes obsolete.

July 31, 2016

 

Wednesday
Jan022013

Cisco WLC Code 7.0.98.0 Deferred Status

It has come to my attention that code 7.0.98.0 was moved to "deferred status".

 

This is pretty relevant information as customers are still on this revision. Perhaps it may be because of the number of related bugs in this release ? Please comment if you have any details .. Thanks

 

 

http://software.cisco.com/download/release.html?mdfid=282600534&flowid=7012&softwareid=280926587&release=7.4.100.0&relind=AVAILABLE&rellifecycle=ED&reltype=latest

 

Sunday
Dec232012

Did you miss the Cisco WLC Multicast Ask The Expert Session? 

Did you miss the Cisco WLC Multicast Ask The Expert Session? 

After reviewing the video it covers an overview of topics on basic muticast-multicast, multicast-unicast and broadcast forwarding. It includes both wired and wireless config examples. 

 

 

Video  

https://supportforums.cisco.com/videos/5147

 

Slides

https://supportforums.cisco.com/docs/DOC-28753

Friday
Dec212012

BUG: CSCud65237 - IMPACTING ASCOM 802.11N HANDSET

I received 2 emails from colleagues who were hit by this bug while using the Ascom i62. 

Apparently there is a BA ack issue, as noted in the bug. Its not clear if this is only impacting Ascom as the bug id references 802.11n handsets. I asked for frame captures and will post the result when I have them. 

 

CSCud65237 Bug Details

Encryption key corruption on BA ack with wrong ID
Symptom:
Voice disruption after roaming

Conditions:
Third party 11n phone
This is triggered by wrong TID sent on Block ACK by client. AP is incorrectly handling the invalid frame

Workaround:
roam to another AP



Status Status 
Open 
(More) 
Severity Severity 
2 - severe 

Last Modified Last Modified 
In Last 3 Days 

Product Product 
Cisco IOS software 

Technology Technology 
Wireless, LAN (WLAN) 

1st Found-In 1st Found-in 
7.0(230.0)
7.4(1.54) 


Component(s) Component 
ap-ampdu 

Wednesday
Dec192012

End-of-Sale and End-of-Life Announcement for the Cisco Aironet 1520 Series

Title End-of-Sale and End-of-Life Announcement for the Cisco Aironet 1520 Series
Description Cisco announces the end-of-sale and end-of-life dates for the Cisco Aironet 1520 Series. The last day to order the affected product(s) is March 30, 2013. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available under the terms and conditions of customers' service contract.
Date

18-DEC-2012

 

 

NOTE: March 30, 2013: The last date that Cisco Engineering may release any final software maintenance releases or bug fixes. After this date, Cisco Engineering will no longer develop, repair, maintain, or test the product software.

Tuesday
Dec182012

End-of-Sale and End-of-Life Announcement for the Cisco Unified Wireless Network Software Release 6.0

Title: End-of-Sale and End-of-Life Announcement for the Cisco Unified Wireless Network Software Release 6.0

Url: http://www.cisco.com/en/US/prod/collateral/wireless/ps5755/ps6301/ps7305/end_of_life_notice_c51-722058.html


Description: Cisco announces the end-of-sale and end-of-life dates for the Cisco Unified Wireless Network Software Release 6.0. The last day to order the affected product(s) is May 31, 2013. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available until the termination date of the contract, even if this date exceeds the Last Date of Support shown in Table 1.
Date: 2012-11-30 15:28:30.0

Friday
Dec142012

Live Expert Webcast: Multicast on Cisco Wireless LAN Controllers

Live Expert Webcast: Multicast on Cisco Wireless LAN Controllers 
Tuesday, December 18, at 11:30 a.m. IST
Multicast on Cisco Wireless LAN Controllers
Cisco Expertwith Customer Support Engineer
Maithri B.
Discover basics on wireless multicast and why we need it as more and more customers and partners are looking to implement BYOD. This session will include wired-side configuration requirements, troubleshooting, and Lab setup live demo.
Register for this event ! Link...
Thursday
Dec132012

End-of-Sale and End-of-Life Announcement for the Cisco Wireless Controller Software for ISM 300 and SRE 700, 710, 900, and 910

Title: End-of-Sale and End-of-Life Announcement for the Cisco Wireless Controller Software for ISM 300 and SRE 700, 710, 900, and 910

Url: http://www.cisco.com/en/US/prod/collateral/modules/ps2706/end_of_life_notice_c51-722050.html

 Description: Cisco announces the end-of-sale and end-of-life dates for the Cisco Wireless Controller Software for ISM 300 and SRE 700, 710, 900, and 910. The last day to order the affected product(s) is May 31, 2013. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available until the termination date of the contract, even if this date exceeds the Last Date of Support shown in Table 1.

Date: 2012-11-30 15:25:15.0

Thursday
Oct252012

APPLE ACKNOWLEDGES 802.11r and 802.11k

Note that apple states the following devices work with 802.11r and 802.11k:

http://images.apple.com/iphone/business/docs/iOS_6_Wifi_Sept12.pdf

 

*iPhone 4S, iPhone 5, new iPad, and 5th-generation iPod touch support 802.11k and 802.11r. 

Wednesday
Oct242012

cisco ISE 1.1.1 - Default Login Change

Cisco ISE Application <GUI> default login change.

Previous ISE versions the application <GUI> login/password was <admin> <cisco>. However, with version ISE 1.1.1, the application login is setup during the initial installation under APPLICATION. 

 

ISE DEPLOYMENT GUIDE 1.1.1

You must configure the Cisco ISE Admin password at the time you install the Cisco ISE. The previous Cisco ISE Admin default login credentials (admin/cisco) are no longer valid.

http://www.cisco.com/en/US/docs/security/ise/1.1.1/user_guide/ise_dis_deploy.html

 

Need to reset the Application <GUI> Login / Password 

Should you forget or need to reset this login and password you can via the CLI with the following command:

ise111/admin# application reset-psswd ise admin 

 

Friday
Oct192012

BUG CSCua29504: Upgrade that code if you want Windows 8 to work! #CISCO # WLC

This is from Cisco CSC 

Microsoft will launch Windows 8 in late October. Along with a slew of other features, it will be among the first to support the 802.11w standard to protect Management Frames for client devices on Wi-Fi networks.

Customers running old Cisco unified releases (between 4.2 to 7.2) in local, Flex or mesh mode will run into an interoperability bug (CSCua29504, to be exact) that prevents 802.11w enabled clients from connecting to a Cisco WLAN with Management Frame Protection (MFP) enabled. This bug does not affect customers running autonomous access point deployments or customers running Cisco unified releases older than 4.2.

What are the possible solutions for you?

1. Please upgrade your production environment to one of the following releases, which will interoperate with Windows 8.

  • 7.3.101.0
  • 7.2.111.3
  • 7.0.235.3

2. Roll back to pre-windows 8 drivers as identified in the Microsoft Knowledge Base article.
3. Fall back to TKIP
4. Sign up for a beta release for Cisco’s upcoming feature release 7.4 (beta available now!) that supports the 802.11w feature in local mode.

What is 802.11w ?

 802.11w is an IEEE standard based on Cisco’s Management Frame Protection(MFP), a feature that was first supported on autonomous access points in release 12.3(8)JA in 2006 and in the unified release 4.0.155.5 in 2008. 802.11w isn’t a new standard. IEEE ratified the 802.11w standard in 2009, however the adoption has been slow to date, but that is expected to change with Windows 8.

The WFA has announced that it will position the Protected Management Frame interoperability certification program as a feature update to its Wi-Fi Protected Access(WPA2) program.

Why do I care about 802.11w ?

I joined Cisco Wireless Networking Business Unit (WNBU) early 2006 as a Product Manager for Autonomous Access Points and the first software release that I managed was the 12.3(8)JA. One of the coolest features in that release was a Cisco innovation around protecting management frames. As many of you may know, 802.11 frames such as Authenticate, De-authenticate, Associate, Dis-associate are sent in the clear (a.k.a. in an unsecured manner). This could allow a potential attacker to spoof management frames from a valid device and run Denial of Service (DOS) attack by sending de-authenticate/disassociate frames.

When MFP is enabled, the sending device adds a cryptographic hash to create a message integrity check (MIC) and embeds that within the Information Element (IE) of every management frame. Thus when another device in the network receives the frame, it is able to verify that the authenticity of the source. In case a single invalid frame is received on the network, it will be dropped, as well as, an Intrusion Detection System alert will be received -this means zero day protection!

What about clients that don’t support 802.11w ?

There are two components to Management Frame Protection:

-         Infrastructure MFP: When the wireless Controller and Access point infrastructure support the 802.11w capability, any frames from a hacker masquerading as an infrastructure AP and attempting to communicate with other APs will be dropped.

-         Client MFP: When a client ALSO supports this feature; it is able to secure communications with the infrastructure. This means any frames from a hacker masquerading as an infrastructure AP and sending disconnect messages to the clients will be dropped.

So what’s the bottom-line?

To enable that your network is ready for 802.11w and Windows 8 ensure that you are running the latest Cisco Unified releases in your wireless controller network.

 

For more information, visit https://supportforums.cisco.com/docs/DOC-27213

Monday
Oct152012

BUG CSCuc32335: Local Mode Aps on 7.0.220.0 lose configs and get defaulted after power loss

This is a bug I discovered and I understand another customer is reporting the same issue. Still providing TAC config info and testing. 

CSCuc32335 Bug Details

Local Mode Aps on 7.0.220.0 lose configs and get defaulted.
Symptom:
Local mode Aps on wlc lose config and get defaulted


Conditions:
when Local when it loses power or shut no- shut is done to the POE port.


Workaround:
Reconfigure or rename the AP
Status Status 
Open 

Severity Severity 
3 - moderate 

Last Modified Last Modified 
In Last 3 Days 

Product Product 
Cisco 5500 Series Wireless Controllers

Technology Technology 


1st Found-In 1st Found-in 
7.0(220.0) 

Monday
Sep242012

End-of-Sale and End-of-Life Announcement for the Cisco 3310 Mobility Services Engine

Title: End-of-Sale and End-of-Life Announcement for the Cisco 3310 Mobility Services Engine

Url: http://www.cisco.com/en/US/prod/collateral/wireless/ps9733/ps9742/ps10093/end_of_life_notice_c51-716505.html


Description: Cisco announces the end-of-sale and end-of-life dates for the Cisco 3310 Mobility Services Engine. The last day to order the affected product(s) is March 19, 2013. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin. Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available until the termination date of the contract, even if this date exceeds the Last Date of Support shown in Table 1.
Date: 2012-09-18 16:45:00.0

Friday
Sep212012

BUG CSCtt38270: 7925 sometimes takes 1+ second to respond to WPA M1 key message

Heads up if you're having wireless voice issues with 7925 handsets with WPA2/PSK. Problems with roaming, gap in voice bug.

7925 sometimes takes 1+ second to respond to WPA M1 key message
Symptom:
A wireless phone call may experience a voice gap of 1.5 - 2 seconds when it roams if using WPA2-PSK.

Conditions:
7925G is configured to use WPA2/AES PSK.

Workaround:
Configure some key management method to avoid performing a full WPA2 key exchange
at each roam time. For example, EAP with CCKM, or static WEP.
If using PSK, then reducing the WPA key retransmission timeout (e.g., on a WLC,
via "config advanced eap eapol-key-timeout 250", may ameliorate the problem
somewhat (e.g. bring the outage duration down from 2.5 to 1.7 seconds.)

1.4.3ES.1 containing the fix for CSCtz48689 may be helpful as well.

Further Problem Description:
A wireless packet capture, or a "debug client" on the WLC, will show that the WLC/AP
transmit the M1 key message to the phone (and the capture shows that the phone ACKs
it), but the phone does not send its M2 key. So the WLC/AP have to retransmit the M1 key,
till finally the phone responds.
Status Status 
Terminated 

Severity Severity 
3 - moderate 

Last Modified Last Modified 
In Last 2 weeks 

Product Product 
Cisco Unified IP Phone 7900 Series 

Technology Technology 
Wireless, Mobile 

1st Found-In 1st Found-in 
1.4(2)
1.4(1.1.1.7) 

 


Thursday
Sep202012

WILDPACKETS -- GESTALT IT #WFD3 #WILDPACKETS

 

When attending a field day event it’s a challenge to listen, take good notes, tweet and do a blog post all in a matter of 2 hours. Sorry, I’m good, just not that good! 

 

Wildpackets

My interest was peaked when I heard Wildpackets was a sponsor for #WFD3. Wildpackets was one of the first commercially supported wireless sniffier products available. Lets face it, most engineers didn’t understand the 802.11 frame structure back in 2002. A lot of the captures were greek to many engineers, including myself. I was an early adopter and used what was then called, Airopeek. 

Wildpackets offers a suite of application software (and appliances) that focus around layer 2 packet analysis, both on wired (802.3) and wireless (802.11). Our WFD event focused on and what I believe is their most important product, OMNIPEEK. 

Omnipeek can be very intimidating at first, but once you get comfortable with the interface the other bells and whistles await you. And let me just tell you, there is a wealth of bells and whistles.

The Wildpackets team shared with the WFD delegates their humble beginnings and later a video about a fiery blaze that destroy their office in 2002.  We then moved on to the tech stuff!

Jay Botelho did an overview of Omnipeek. Jay shared with the delegates how to use Omnipeek, put it into sniffer mode and how to conduct a multi channel capture. We then walked through a wireless capture briefly and discussed other rich features (watch the below video to get your Omnipeek fix). Jay also shared some of the other robust features like reporting, graphs and analysis tools, which are built into Omnipeek. We also looked at our first 802.11ac capture. It was my first peek at 802.11ac. 

I understand, Omnipeek support for 802.11ac will be in released in its next release in coming weeks. 

You can read an article about the Wildpackets fire here: http://www.internetnews.com/wireless/article.php/1433881/WildPackets+Survives+Fire.htm

 

Wildpackets Advantage

The Wildpacket advantage is simple.

Coming from my personal experience, Willpackets’ Omnipeek is the best commercially offered wireless sniffer on the market today. It is well developed, packed with features and well supported. It drives information to the wireless engineer and displays it in a manner that is intuitive and accurate. A wireless engineer can capture 2,3,4 or more channels simultaneously aiding in quicker fact gathering. To the untrained eye, Omnipeek has built reports and graphs that will bring blaring issues to the surface. 

All of these features do come at a cost. And if you are a consultant or work for a large enterprise it can easily be justified. 

If you ever need customer feedback and or justification for Omnipeek in a large enterprise, email me I will be happy to share my experience. 

My take away

Next time you’re troubleshooting a wireless issue at the frame layer and you’re using something other than Omnipeek you’re missing out on all the other rich features that only Omnipeek offers.

Also, take notice next time you are reading a 802.11 technical book or looking at published material that displays a 802.11 capture. Pay very close attention, its very likely you are looking at a capture done in Omnipeek.  

In closing, one other important take away I learned at Wildpackets is just how much they value their employees. Thats a company I want to do business with. 

Captures

Wildpackets provided us 802.11ac and 802.11u captures. Links to these captures are below:

http://www.my80211.com/storage/wfd3/WFD3.WILDPACKETS.CAPTURE.zip

 

Video

If you missed the event you can watch it here: 

An introduction to WildPackets from Stephen Foskett on Vimeo.

 

 

Wildpackets 

 

Website: http://www.wildpackets.com 

Twitter: @wildpackets