<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: clients disconnect from guest wifi in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300132#M107269</link>
    <description>The auth when anchoring happens on the anchor controller along with dhcp. If the scope is getting obtained from the foreign then that’s your issue. So the ancho has to send the auth back to ISE and dhcp is on the local subnet where the anchor controller sits.</description>
    <pubDate>Thu, 21 Dec 2017 15:07:25 GMT</pubDate>
    <dc:creator>Scott Fella</dc:creator>
    <dc:date>2017-12-21T15:07:25Z</dc:date>
    <item>
      <title>clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3299958#M107264</link>
      <description>&lt;P&gt;clients disconnected from guest SSID,&lt;/P&gt;
&lt;P&gt;guest trafiic is through mobility anchor and authorization is from ISE&lt;/P&gt;
&lt;P&gt;i can see the tunnel data and control path is UP on anchor and foreign WLC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem # authentication takes place.. after the authentication IP is changed to 169. &amp;nbsp;and the client is disconnected.. i have attached the logs..&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;"&amp;nbsp;&lt;SPAN&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Change state to DHCP_REQD (7) last state RUN (20) "&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Re-applying interface policy for client&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 WEBAUTH_REQD (8) Changing IPv4 ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) --- (caller apf_policy.c:2641)&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 WEBAUTH_REQD (8) Changing IPv6 ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) --- (caller apf_policy.c:2662)&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Inserting AAA Override struct for mobile&lt;BR /&gt; MAC: 84:89:ad:80:e5:9c, source 48&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Setting session timeout 65595 on mobile 84:89:ad:80:e5:9c&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Session Timeout is 65595 - starting session timer for the mobile&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c AAA override is enabled and interface doesnot exist use the VLAN id inthe nac payload -1 for 84:89:ad:80:e5:9c&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 WEBAUTH_REQD (8) Change state to WEBAUTH_NOL3SEC (14) last state WEBAUTH_REQD (8)&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c apfMsRunStateInc&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 WEBAUTH_NOL3SEC (14) Change state to RUN (20) last stateWEBAUTH_NOL3SEC (14)&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Stopping deletion of Mobile Station: (callerId: 74)&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Session Timeout is 65595 - starting session timer for the mobile&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Reached PLUMBFASTPATH: from line 6928&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Plumbing duplex mobility tunnel to apfMmPeerIp:10.210.23.165,remTunIp:10.210.23.163&lt;BR /&gt; as Export Anchor (VLAN 941)&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c Tunnel id 1 found for ip 10.210.23.163&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Replacing Fast Path rule&lt;BR /&gt; type = Airespace AP Client&lt;BR /&gt; on AP 00:00:00:00:00:00, slot 0, interface = 13, QOS = 3&lt;BR /&gt; IPv4 ACL ID = 255, IPv6 ACL ID&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 0,TokenID = 15206, IntfId = 12 Local Bridging Vlan = 941, Local Bridging intf id = 12&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID= 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID= 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.161: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID= 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.162: 84:89:ad:80:e5:9c Accounting NAI-Realm: nc@gmail.com, from Mscb username : nc@gmail.com&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.162: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)&lt;BR /&gt;*ewmwebWebauth1: Dec 20 12:58:44.162: 84:89:ad:80:e5:9c Sending client update msg type 0 to foreign peer 10.210.23.165.&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.162: AAA Override QoS payload Build, Total Payload length 41&lt;/P&gt;
&lt;P&gt;*ewmwebWebauth1: Dec 20 12:58:44.162: 84:89:ad:80:e5:9c client mac = 84:89:AD:80:E5:9C AAA Override QoS Payload Build.&lt;/P&gt;
&lt;P&gt;*pemReceiveTask: Dec 20 12:58:44.164: 84:89:ad:80:e5:9c Set bi-dir guest tunnel for 84:89:ad:80:e5:9c as in Export Anchor role&lt;BR /&gt;*pemReceiveTask: Dec 20 12:58:44.164: 84:89:ad:80:e5:9c 172.22.1.167 Added NPU entry of type 1, dtlFlags 0x4&lt;BR /&gt;*pemReceiveTask: Dec 20 12:58:44.164: 84:89:ad:80:e5:9c Sending a gratuitous ARP for 172.22.1.167, VLAN Id 941&lt;BR /&gt;*mcListen: Dec 20 12:58:44.165: 84:89:ad:80:e5:9c Client Update Ack Done sent to IP: 172.22.0.5&lt;/P&gt;
&lt;P&gt;*mcListen: Dec 20 12:58:44.165: 84:89:ad:80:e5:9c Forwarding Client Update message to IP addr 10.210.23.163&lt;/P&gt;
&lt;P&gt;*mmMaListen: Dec 20 12:58:44.171: mmProcessInMsg:Rcvd ACK msg for client update msg from foreign wlc&lt;/P&gt;
&lt;P&gt;*mcListen: Dec 20 12:58:45.121: 84:89:ad:80:e5:9c Client Delete Ack Done sent to IP: 10.210.23.163&lt;/P&gt;
&lt;P&gt;*mcListen: Dec 20 12:58:45.121: 84:89:ad:80:e5:9c Forwarding Client Delete message to 1 IP addr 172.22.0.5&lt;/P&gt;
&lt;P&gt;*mmMaListen: Dec 20 12:58:45.121: 84:89:ad:80:e5:9c mm_exec_mobAgent_fsm:600 currState:Anchor, event:MM_MAFSM_EV_REMOTE_DELETE_CLIENT, caller mmProcessInMsg:1288&lt;BR /&gt;*apfReceiveTask: Dec 20 12:58:45.121: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) mobility role update request from Export Anchorto Handoff&lt;BR /&gt; Peer = 10.210.23.165, Old Anchor = 172.22.0.5, New Anchor = 0.0.0.0&lt;BR /&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Skipping TMP rule add&lt;BR /&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c apfMsRunStateDec&lt;BR /&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 RUN (20) Change state to DHCP_REQD (7) last state RUN (20)&lt;/P&gt;
&lt;P&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 DHCP_REQD (7) Change state to DHCP_REQD (7) last state DHCP_REQD (7)&lt;/P&gt;
&lt;P&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 DHCP_REQD (7) Plumbing duplex mobility tunnel to apfMmPeerIp:0.0.0.0,remTunIp:0.0.0.0&lt;BR /&gt; as Export Anchor (VLAN 941)&lt;BR /&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 DHCP_REQD (7) Replacing Fast Path rule&lt;BR /&gt; type = Airespace AP - Learn IP address&lt;BR /&gt; on AP 00:00:00:00:00:00, slot 0, interface = 13, QOS = 3&lt;BR /&gt; IPv4 ACL ID =&lt;BR /&gt;*apfReceiveTask: Dec 20 12:58:45.122: 84:89:ad:80:e5:9c 172.22.1.167 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP= 0, TokenID = 15206, IntfId = 12 Local Bridging Vlan = 941, Local Bridging intf id = 12&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 15:00:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3299958#M107264</guid>
      <dc:creator>Alwin Dsouza</dc:creator>
      <dc:date>2021-07-05T15:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3299963#M107265</link>
      <description>This is not a wireless issue.  &lt;BR /&gt;If the clients' IP address changes from 172.22.1.X to a 169.254.X.X then I'd be looking at the DHCP server first. &lt;BR /&gt;Logs show a lot of "DHCP_REQD".</description>
      <pubDate>Thu, 21 Dec 2017 10:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3299963#M107265</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2017-12-21T10:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3299995#M107266</link>
      <description>&lt;P&gt;Hello Leo,&lt;/P&gt;
&lt;P&gt;Initially when they connect the ip is assigned from the internal dhcp server created on anchor, my case it was 172.22.1.167, the ip changed to 169 once the login is done on the guest portal, but the login is success.. also i checked authentication on ISE.. shows success..&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 11:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3299995#M107266</guid>
      <dc:creator>Alwin Dsouza</dc:creator>
      <dc:date>2017-12-21T11:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300000#M107267</link>
      <description>&lt;P&gt;If wireless clients are getting 169.254.X.X address then ISE has nothing to do with it.&amp;nbsp; Check the DHCP server based on the anchor controller.&amp;nbsp; Maybe the dynamic interface of the anchor controller is pointing to the wrong DHCP server?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 11:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300000#M107267</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2017-12-21T11:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300035#M107268</link>
      <description>&lt;P&gt;wireless client are initially getting ip from 172.22.1.X pool.. and the ip is changed after successful login..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;as suggested by you i will check the dhcp settings..on the dynamic interface..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 12:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300035#M107268</guid>
      <dc:creator>Alwin Dsouza</dc:creator>
      <dc:date>2017-12-21T12:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300132#M107269</link>
      <description>The auth when anchoring happens on the anchor controller along with dhcp. If the scope is getting obtained from the foreign then that’s your issue. So the ancho has to send the auth back to ISE and dhcp is on the local subnet where the anchor controller sits.</description>
      <pubDate>Thu, 21 Dec 2017 15:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3300132#M107269</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2017-12-21T15:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3304457#M107270</link>
      <description>&lt;P&gt;Is changing the end-points IPv4 address after authentication your intention? If not, check for interface override configuration as authentication result within ISE. My recommendation is don't do this with webauth since the end-point is not aware that the VLAN changed and might not even restart its DHCP process and simply disassociate from the network.&lt;BR /&gt;&lt;BR /&gt;In case you mean that the end-points are getting another IPv4 address in same the VLAN, I recommend to verify the DHCP relay and server configuration on the anchor side. Things to check are scope space and lease duration (should be in syn with the session-time on the controllers).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;Please rate useful posts... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jan 2018 13:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3304457#M107270</guid>
      <dc:creator>Freerk Terpstra</dc:creator>
      <dc:date>2018-01-01T13:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: clients disconnect from guest wifi</title>
      <link>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3309742#M107271</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;
&lt;P&gt;thanks all for your post, i was on holidays hence could not test.. now i removed the allow AAA override and seems to be working fine..&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2018 13:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/clients-disconnect-from-guest-wifi/m-p/3309742#M107271</guid>
      <dc:creator>Alwin Dsouza</dc:creator>
      <dc:date>2018-01-11T13:03:00Z</dc:date>
    </item>
  </channel>
</rss>

