<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Apple devices choosing wrong encryption in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204880#M162795</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When discovering "S-Guest-Wifi" and then connecting, the device prompts for username and password. There is no username and password that is authorised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I enter the network manual I set it to personal and enter the correct password. It connect ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to simplifiy the join process for the user. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't even mind if I have to get users to have a username and password for guest access. That would stop me having to rotate my Guest PSK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Apr 2013 14:19:00 GMT</pubDate>
    <dc:creator>martinbuffleo</dc:creator>
    <dc:date>2013-04-15T14:19:00Z</dc:date>
    <item>
      <title>Apple devices choosing wrong encryption</title>
      <link>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204878#M162791</link>
      <description>&lt;P&gt;I have two Cisco 1200AP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have it configured with two SSIDs, one corporate (802.1x) one using WPA2 Personal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no issues on the corporate, but I have found that Apple devices appear to detect it as a WPA2 Enterprise, and request a username and password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I enter the network manualy as WPA2Personal the devices joins the network ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then ocasionaly the device looses its link to the network and fails to pass traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 5134 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.2&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname BCB-WIFI-ENG&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable secret 5 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username Cisco password 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;username spectra privilege 15 secret 5 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;username CiscoCA privilege 15 secret 5 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip domain name spectra.local&lt;/P&gt;&lt;P&gt;ip name-server 10.0.1.2&lt;/P&gt;&lt;P&gt;ip name-server 10.0.2.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_eap&lt;/P&gt;&lt;P&gt;server 10.0.1.5 auth-port 1645 acct-port 1646&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_mac&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_acct&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_admin&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ tac_admin&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius rad_pmip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa group server radius dummy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login eap_methods group rad_eap&lt;/P&gt;&lt;P&gt;aaa authentication login mac_methods local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;aaa authorization ipmobile default group rad_pmip &lt;/P&gt;&lt;P&gt;aaa accounting network acct_methods start-stop group rad_acct&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;dot11 network-map&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge irb&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;encryption mode ciphers tkip &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;encryption vlan 5 mode ciphers tkip &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;encryption vlan 1001 mode ciphers tkip &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ssid S-Guest-Wifi&lt;/P&gt;&lt;P&gt;vlan 5&lt;/P&gt;&lt;P&gt;authentication open &lt;/P&gt;&lt;P&gt;authentication key-management wpa&lt;/P&gt;&lt;P&gt;guest-mode&lt;/P&gt;&lt;P&gt;wpa-psk ascii 7 062702245E470A180B361E180D10232A2A7A67657041574751&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ssid s&lt;/P&gt;&lt;P&gt;vlan 1001&lt;/P&gt;&lt;P&gt;authentication open eap eap_methods&lt;/P&gt;&lt;P&gt;authentication key-management wpa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;speed basic-1.0 2.0 5.5 6.0 9.0 11.0 12.0 18.0 24.0 36.0 48.0 54.0&lt;/P&gt;&lt;P&gt;rts threshold 2312&lt;/P&gt;&lt;P&gt;station-role root&lt;/P&gt;&lt;P&gt;no dot11 extension aironet&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.5&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 5&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;bridge-group 5&lt;/P&gt;&lt;P&gt;bridge-group 5 subscriber-loop-control&lt;/P&gt;&lt;P&gt;bridge-group 5 block-unknown-source&lt;/P&gt;&lt;P&gt;no bridge-group 5 source-learning&lt;/P&gt;&lt;P&gt;no bridge-group 5 unicast-flooding&lt;/P&gt;&lt;P&gt;bridge-group 5 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.1001&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 1001 native&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;bridge-group 1&lt;/P&gt;&lt;P&gt;bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt;bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt;no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt;no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt;bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;encryption mode ciphers tkip &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;encryption vlan 5 mode ciphers tkip &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;encryption vlan 1001 mode ciphers tkip &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssid S-Guest-Wifi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vlan 5&lt;/P&gt;&lt;P&gt;authentication open &lt;/P&gt;&lt;P&gt;authentication key-management wpa&lt;/P&gt;&lt;P&gt;wpa-psk ascii 7 047A06031D284F4F07380904131F0505247970786167724255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ssid s&lt;/P&gt;&lt;P&gt;vlan 1001&lt;/P&gt;&lt;P&gt;authentication open eap eap_methods&lt;/P&gt;&lt;P&gt;authentication key-management wpa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;speed basic-6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0&lt;/P&gt;&lt;P&gt;rts threshold 2312&lt;/P&gt;&lt;P&gt;station-role root&lt;/P&gt;&lt;P&gt;no dot11 extension aironet&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio1.5&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 5&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;bridge-group 5&lt;/P&gt;&lt;P&gt;bridge-group 5 subscriber-loop-control&lt;/P&gt;&lt;P&gt;bridge-group 5 block-unknown-source&lt;/P&gt;&lt;P&gt;no bridge-group 5 source-learning&lt;/P&gt;&lt;P&gt;no bridge-group 5 unicast-flooding&lt;/P&gt;&lt;P&gt;bridge-group 5 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio1.1001&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 1001 native&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;no cdp enable&lt;/P&gt;&lt;P&gt;bridge-group 1&lt;/P&gt;&lt;P&gt;bridge-group 1 subscriber-loop-control&lt;/P&gt;&lt;P&gt;bridge-group 1 block-unknown-source&lt;/P&gt;&lt;P&gt;no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt;no bridge-group 1 unicast-flooding&lt;/P&gt;&lt;P&gt;bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;ntp broadcast client&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0.5&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 5&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;bridge-group 5&lt;/P&gt;&lt;P&gt;no bridge-group 5 source-learning&lt;/P&gt;&lt;P&gt;bridge-group 5 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0.1001&lt;/P&gt;&lt;P&gt;encapsulation dot1Q 1001 native&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;bridge-group 1&lt;/P&gt;&lt;P&gt;no bridge-group 1 source-learning&lt;/P&gt;&lt;P&gt;bridge-group 1 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;/P&gt;&lt;P&gt;ip address 10.0.1.203 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip route-cache&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ip http help-path &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100" target="_blank"&gt;http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip radius source-interface BVI1 &lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;access-list 22 remark SNMP Access List&lt;/P&gt;&lt;P&gt;access-list 22 permit 10.0.1.3 log&lt;/P&gt;&lt;P&gt;access-list 22 deny any log&lt;/P&gt;&lt;P&gt;snmp-server community &amp;lt;removed&amp;gt; RO 22&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps tty&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity&lt;/P&gt;&lt;P&gt;snmp-server enable traps disassociate&lt;/P&gt;&lt;P&gt;snmp-server enable traps deauthenticate&lt;/P&gt;&lt;P&gt;snmp-server enable traps authenticate-fail&lt;/P&gt;&lt;P&gt;snmp-server enable traps dot11-qos&lt;/P&gt;&lt;P&gt;snmp-server enable traps wlan-wep&lt;/P&gt;&lt;P&gt;snmp-server enable traps config&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;snmp-server enable traps aaa_server&lt;/P&gt;&lt;P&gt;snmp-server enable traps switch-over&lt;/P&gt;&lt;P&gt;snmp-server enable traps rogue-ap&lt;/P&gt;&lt;P&gt;snmp-server host 10.0.1.3 &amp;lt;removed&amp;gt; &lt;/P&gt;&lt;P&gt;radius-server host 10.0.1.5 auth-port 1645 acct-port 1646 key 7 &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server attribute 32 include-in-access-req format %h&lt;/P&gt;&lt;P&gt;radius-server authorization permit missing Service-Type&lt;/P&gt;&lt;P&gt;radius-server vsa send accounting&lt;/P&gt;&lt;P&gt;bridge 1 route ip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ntp server 91.208.177.20&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 06:55:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204878#M162791</guid>
      <dc:creator>martinbuffleo</dc:creator>
      <dc:date>2021-07-04T06:55:04Z</dc:date>
    </item>
    <item>
      <title>Apple devices choosing wrong encryption</title>
      <link>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204879#M162793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are you actually seeing... if they are trying to connect using 802.1x, the apple devices will ask for a username and password.&amp;nbsp; If the Apple devices detect the SSID as a preshared key, then it will just ask for a password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt; &lt;BR /&gt;Scott &lt;BR /&gt; &lt;BR /&gt;Help out other by using the rating system and marking answered questions as "Answered"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 14:10:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204879#M162793</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2013-04-15T14:10:37Z</dc:date>
    </item>
    <item>
      <title>Apple devices choosing wrong encryption</title>
      <link>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204880#M162795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When discovering "S-Guest-Wifi" and then connecting, the device prompts for username and password. There is no username and password that is authorised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I enter the network manual I set it to personal and enter the correct password. It connect ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to simplifiy the join process for the user. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't even mind if I have to get users to have a username and password for guest access. That would stop me having to rotate my Guest PSK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 14:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204880#M162795</guid>
      <dc:creator>martinbuffleo</dc:creator>
      <dc:date>2013-04-15T14:19:00Z</dc:date>
    </item>
    <item>
      <title>Apple devices choosing wrong encryption</title>
      <link>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204881#M162797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try to change the Guest SSID to: &lt;SPAN style="font-size: 10pt;"&gt;Guest-Wifi&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if this helps... might be the S causing issues, but want to make sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt; &lt;BR /&gt;Scott &lt;BR /&gt; &lt;BR /&gt;Help out other by using the rating system and marking answered questions as "Answered"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 16:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204881#M162797</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2013-04-15T16:19:49Z</dc:date>
    </item>
    <item>
      <title>Apple devices choosing wrong encryption</title>
      <link>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204882#M162798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I would first hghly recommend upgrading the IOS image on the 1200 Access Points. The current image installed 12.2 is no longer even available for download from Cisco. The latest 12.3 image available for the 1200 is c1200-k9w7-tar.123-8.JEE.tar with a release date of &lt;STRONG&gt;10-DEC-2010&lt;/STRONG&gt;. The first non-deferred release available is c1200-k9w7-tar.123-4.JA2.tar with a release date of &lt;STRONG&gt;06-APR-2006.&lt;/STRONG&gt;&amp;nbsp; The 12.3 IOS image will allow you to define each SSID globally instead of on each radio interface which will allow you to define guest-mode on both radios.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="overflow: hidden; height: 1px; position: absolute; left: -10000px; top: 0px; width: 1px;"&gt;﻿&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 01:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/apple-devices-choosing-wrong-encryption/m-p/2204882#M162798</guid>
      <dc:creator>wjenkins</dc:creator>
      <dc:date>2013-04-16T01:47:10Z</dc:date>
    </item>
  </channel>
</rss>

