<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Channel List RRM - interference - Interface Dot11Radio0, changed state to down in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/channel-list-rrm-interference-interface-dot11radio0-changed/m-p/2982584#M164102</link>
    <description>&lt;P&gt;Dear,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm APs CISCO AIR-CAP1532E-Z-K9 in the external environment, outdoor (waterfront). And even with the APs "LOCAL MODE", the interfaces are flappando.&lt;BR /&gt;I have a WLC 5500, with the RRM &amp;gt;&amp;gt; GENERAL &amp;gt;&amp;gt; Channel List &amp;gt;&amp;gt; ALL&lt;BR /&gt;And I'm Active Rogue APs 1781, is that this is the offender of these flaps?&lt;BR /&gt;Follow the AP configuration, and the eventlog as an example:&lt;/P&gt;
&lt;P&gt;Today:&lt;/P&gt;
&lt;P&gt;*Aug 12 04:04:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:04:14.183: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:12:08.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:12:08.403: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:12:08.403: %CAPWAP-5-SENDJOIN: sending Join Request to 200.x.x.x&lt;BR /&gt;*Aug 12 04:12:13.403: %CAPWAP-5-SENDJOIN: sending Join Request to 200.x.x.x&lt;BR /&gt;*Aug 12 04:12:13.931: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:13.939: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset&lt;BR /&gt;*Aug 12 04:12:14.579: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller WLC-XXX&lt;BR /&gt;*Aug 12 04:12:14.651: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 04:12:14.931: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:14.971: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down&lt;BR /&gt;*Aug 12 04:12:14.975: %WIDS-6-ENABLED: IDS Signature is loaded and enabled&lt;BR /&gt;*Aug 12 04:12:14.979: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset&lt;BR /&gt;*Aug 12 04:12:15.651: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down&lt;BR /&gt;*Aug 12 04:12:15.963: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 04:12:16.011: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up&lt;BR /&gt;*Aug 12 04:12:16.019: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:16.039: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset&lt;BR /&gt;*Aug 12 04:12:17.011: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up&lt;BR /&gt;*Aug 12 04:12:17.019: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:17.063: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 04:12:18.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 07:11:27.111: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:f0b2.e5dc.336f&lt;BR /&gt;*Aug 12 07:11:30.123: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:f0b2.e5dc.336f&lt;BR /&gt;*Aug 12 07:21:30.547: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 07:21:40.643: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 08:29:02.987: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 08:33:55.127: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 08:47:52.071: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 08:52:58.459: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:02:59.095: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:08:22.851: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:18:23.547: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:21:39.499: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:31:40.283: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:32:18.455: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:34:04.063: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:46:40.511: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:47:00.611: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 10:28:45.527: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 11:22:18.815: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 11:32:19.043: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 11:35:28.019: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 11:46:48.379: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 11:50:06.163: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 12:00:06.955: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And Configuration:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 21287 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 04:12:14 UTC Fri Aug 12 2016&lt;BR /&gt;version 15.3&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname WMRJCPBOUT00021&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging rate-limit console 9&lt;BR /&gt;enable secret 5 $1$7OvR$5I6xjbkdxP5x8REZa68Q4/&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;aaa session-id common&lt;BR /&gt;no ip routing&lt;BR /&gt;no ip cef&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;eap profile lwapp_eap_profile&lt;BR /&gt;method fast&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint cisco-m2-root-cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_M2_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint Cisco_IOS_M2_MIC_cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_M2_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint airespace-old-root-cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint airespace-device-root-cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint Cisco_IOS_MIC_cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain cisco-m2-root-cert&lt;BR /&gt;certificate ca 01&lt;BR /&gt;30820313 308201FB A0030201 02020101 300D0609 2A864886 F70D0101 0B050030&lt;BR /&gt;&lt;BR /&gt;quit&lt;BR /&gt;crypto pki certificate chain Cisco_IOS_M2_MIC_cert&lt;BR /&gt;certificate 1694EACB00000005982F&lt;BR /&gt;3082046F 30820357 A0030201 02020A16 94EACB00 00000598 2F300D06 092A8648&lt;BR /&gt;86F70D01 010B0500 3036310E 300C0603 55040A13 05436973 636F3124 30220603&lt;BR /&gt;&lt;BR /&gt;quit&lt;BR /&gt;certificate ca 02&lt;BR /&gt;30820465 3082034D A0030201 02020102 300D0609 2A864886 F70D0101 0B050030&lt;BR /&gt;2B310E30 0C060355 040A1305 43697363 6F311930 17060355 04031310 43697363&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto pki certificate chain airespace-old-root-cert&lt;BR /&gt;certificate ca 00&lt;BR /&gt;30820406 3082032F A0030201 02020100 300D0609 2A864886 F70D0101 04050030&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto pki certificate chain airespace-device-root-cert&lt;BR /&gt;certificate ca 03&lt;BR /&gt;3082047F 308203A8 A0030201 02020103 300D0609 2A864886 F70D0101 04050030&lt;BR /&gt;81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto pki certificate chain Cisco_IOS_MIC_cert&lt;BR /&gt;certificate 1E11DA840000000E12E0&lt;BR /&gt;30820470 30820358 A0030201 02020A1E 11DA8400 00000E12 E0300D06 092A8648&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;certificate ca 6A6967B3000000000003&lt;BR /&gt;308204D9 308203C1 A0030201 02020A6A 6967B300 00000000 03300D06 092A8648&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;username &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;lldp run&lt;BR /&gt;bridge irb&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;antenna gain 0&lt;BR /&gt;ampdu transmit priority 1&lt;BR /&gt;ampdu transmit priority 2&lt;BR /&gt;ampdu transmit priority 3&lt;BR /&gt;mbssid&lt;BR /&gt;speed basic-1.0 2.0 5.5 11.0 basic-6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.&lt;BR /&gt;power client local&lt;BR /&gt;packet retries 64 drop-packet&lt;BR /&gt;station-role root&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1&lt;BR /&gt;no ip route-cache&lt;BR /&gt;antenna gain 0&lt;BR /&gt;peakdetect&lt;BR /&gt;ampdu transmit priority 1&lt;BR /&gt;ampdu transmit priority 2&lt;BR /&gt;ampdu transmit priority 3&lt;BR /&gt;mbssid&lt;BR /&gt;speed basic-6.0 9.0 basic-12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.&lt;BR /&gt;power client local&lt;BR /&gt;packet retries 64 drop-packet&lt;BR /&gt;station-role root&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;bridge-group 1&lt;BR /&gt;bridge-group 1 spanning-disabled&lt;BR /&gt;no bridge-group 1 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;mac-address 84b8.02ad.2ab6&lt;BR /&gt;ip address 10.10.1.24 255.255.255.0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;ipv6 address dhcp&lt;BR /&gt;ipv6 address autoconfig&lt;BR /&gt;ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-WLAN0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 10.10.1.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging trap emergencies&lt;BR /&gt;logging origin-id string AP:84b8.02ad.2ab6&lt;BR /&gt;logging facility kern&lt;BR /&gt;logging host 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;bridge 1 protocol ieee&lt;BR /&gt;bridge 1 route ip&lt;BR /&gt;parser view capwap-config-view&lt;BR /&gt;secret 5 $1$7OvR$5I6xjbkdxP5x8REZa68Q4/&lt;BR /&gt;commands configure include all capwap&lt;BR /&gt;commands exec include all enable&lt;BR /&gt;commands exec include configure terminal&lt;BR /&gt;commands exec include configure&lt;BR /&gt;commands exec include all show capwap&lt;BR /&gt;commands exec include show running-config&lt;BR /&gt;commands exec include show&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 198&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 12:37:40 GMT</pubDate>
    <dc:creator>joand3512004</dc:creator>
    <dc:date>2021-07-05T12:37:40Z</dc:date>
    <item>
      <title>Channel List RRM - interference - Interface Dot11Radio0, changed state to down</title>
      <link>https://community.cisco.com/t5/wireless/channel-list-rrm-interference-interface-dot11radio0-changed/m-p/2982584#M164102</link>
      <description>&lt;P&gt;Dear,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm APs CISCO AIR-CAP1532E-Z-K9 in the external environment, outdoor (waterfront). And even with the APs "LOCAL MODE", the interfaces are flappando.&lt;BR /&gt;I have a WLC 5500, with the RRM &amp;gt;&amp;gt; GENERAL &amp;gt;&amp;gt; Channel List &amp;gt;&amp;gt; ALL&lt;BR /&gt;And I'm Active Rogue APs 1781, is that this is the offender of these flaps?&lt;BR /&gt;Follow the AP configuration, and the eventlog as an example:&lt;/P&gt;
&lt;P&gt;Today:&lt;/P&gt;
&lt;P&gt;*Aug 12 04:04:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:04:14.183: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:12:08.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:12:08.403: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 200.x.x.x peer_port: 5246&lt;BR /&gt;*Aug 12 04:12:08.403: %CAPWAP-5-SENDJOIN: sending Join Request to 200.x.x.x&lt;BR /&gt;*Aug 12 04:12:13.403: %CAPWAP-5-SENDJOIN: sending Join Request to 200.x.x.x&lt;BR /&gt;*Aug 12 04:12:13.931: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:13.939: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset&lt;BR /&gt;*Aug 12 04:12:14.579: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller WLC-XXX&lt;BR /&gt;*Aug 12 04:12:14.651: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 04:12:14.931: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:14.971: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down&lt;BR /&gt;*Aug 12 04:12:14.975: %WIDS-6-ENABLED: IDS Signature is loaded and enabled&lt;BR /&gt;*Aug 12 04:12:14.979: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset&lt;BR /&gt;*Aug 12 04:12:15.651: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down&lt;BR /&gt;*Aug 12 04:12:15.963: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 04:12:16.011: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up&lt;BR /&gt;*Aug 12 04:12:16.019: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:16.039: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset&lt;BR /&gt;*Aug 12 04:12:17.011: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up&lt;BR /&gt;*Aug 12 04:12:17.019: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down&lt;BR /&gt;*Aug 12 04:12:17.063: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 04:12:18.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up&lt;BR /&gt;*Aug 12 07:11:27.111: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:f0b2.e5dc.336f&lt;BR /&gt;*Aug 12 07:11:30.123: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:f0b2.e5dc.336f&lt;BR /&gt;*Aug 12 07:21:30.547: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 07:21:40.643: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 08:29:02.987: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 08:33:55.127: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 08:47:52.071: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 08:52:58.459: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:02:59.095: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:08:22.851: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:18:23.547: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:21:39.499: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:31:40.283: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:32:18.455: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:34:04.063: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 09:46:40.511: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 09:47:00.611: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 10:28:45.527: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 11:22:18.815: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 11:32:19.043: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 11:35:28.019: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 11:46:48.379: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;BR /&gt;*Aug 12 11:50:06.163: %WIDS-4-SIG_ALARM: Attack is detected on Sig:Standard Id:9 Channel:153 Source MAC:2ce6.cc11.decc&lt;BR /&gt;*Aug 12 12:00:06.955: %WIDS-6-SIG_ALARM_OFF: Attack is cleared on Sig:Standard Id:9 Channel:153&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;And Configuration:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 21287 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 04:12:14 UTC Fri Aug 12 2016&lt;BR /&gt;version 15.3&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname WMRJCPBOUT00021&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging rate-limit console 9&lt;BR /&gt;enable secret 5 $1$7OvR$5I6xjbkdxP5x8REZa68Q4/&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;aaa session-id common&lt;BR /&gt;no ip routing&lt;BR /&gt;no ip cef&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;eap profile lwapp_eap_profile&lt;BR /&gt;method fast&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint cisco-m2-root-cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_M2_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint Cisco_IOS_M2_MIC_cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_M2_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint airespace-old-root-cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint airespace-device-root-cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint Cisco_IOS_MIC_cert&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair Cisco_IOS_MIC_Keys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain cisco-m2-root-cert&lt;BR /&gt;certificate ca 01&lt;BR /&gt;30820313 308201FB A0030201 02020101 300D0609 2A864886 F70D0101 0B050030&lt;BR /&gt;&lt;BR /&gt;quit&lt;BR /&gt;crypto pki certificate chain Cisco_IOS_M2_MIC_cert&lt;BR /&gt;certificate 1694EACB00000005982F&lt;BR /&gt;3082046F 30820357 A0030201 02020A16 94EACB00 00000598 2F300D06 092A8648&lt;BR /&gt;86F70D01 010B0500 3036310E 300C0603 55040A13 05436973 636F3124 30220603&lt;BR /&gt;&lt;BR /&gt;quit&lt;BR /&gt;certificate ca 02&lt;BR /&gt;30820465 3082034D A0030201 02020102 300D0609 2A864886 F70D0101 0B050030&lt;BR /&gt;2B310E30 0C060355 040A1305 43697363 6F311930 17060355 04031310 43697363&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto pki certificate chain airespace-old-root-cert&lt;BR /&gt;certificate ca 00&lt;BR /&gt;30820406 3082032F A0030201 02020100 300D0609 2A864886 F70D0101 04050030&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto pki certificate chain airespace-device-root-cert&lt;BR /&gt;certificate ca 03&lt;BR /&gt;3082047F 308203A8 A0030201 02020103 300D0609 2A864886 F70D0101 04050030&lt;BR /&gt;81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto pki certificate chain Cisco_IOS_MIC_cert&lt;BR /&gt;certificate 1E11DA840000000E12E0&lt;BR /&gt;30820470 30820358 A0030201 02020A1E 11DA8400 00000E12 E0300D06 092A8648&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;certificate ca 6A6967B3000000000003&lt;BR /&gt;308204D9 308203C1 A0030201 02020A6A 6967B300 00000000 03300D06 092A8648&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;username &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;lldp run&lt;BR /&gt;bridge irb&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;antenna gain 0&lt;BR /&gt;ampdu transmit priority 1&lt;BR /&gt;ampdu transmit priority 2&lt;BR /&gt;ampdu transmit priority 3&lt;BR /&gt;mbssid&lt;BR /&gt;speed basic-1.0 2.0 5.5 11.0 basic-6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.&lt;BR /&gt;power client local&lt;BR /&gt;packet retries 64 drop-packet&lt;BR /&gt;station-role root&lt;BR /&gt;!&lt;BR /&gt;interface Dot11Radio1&lt;BR /&gt;no ip route-cache&lt;BR /&gt;antenna gain 0&lt;BR /&gt;peakdetect&lt;BR /&gt;ampdu transmit priority 1&lt;BR /&gt;ampdu transmit priority 2&lt;BR /&gt;ampdu transmit priority 3&lt;BR /&gt;mbssid&lt;BR /&gt;speed basic-6.0 9.0 basic-12.0 18.0 24.0 36.0 48.0 54.0 m0. m1. m2. m3. m4. m5. m6. m7. m8. m9. m10. m11. m12. m13. m14. m15.&lt;BR /&gt;power client local&lt;BR /&gt;packet retries 64 drop-packet&lt;BR /&gt;station-role root&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;bridge-group 1&lt;BR /&gt;bridge-group 1 spanning-disabled&lt;BR /&gt;no bridge-group 1 source-learning&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;mac-address 84b8.02ad.2ab6&lt;BR /&gt;ip address 10.10.1.24 255.255.255.0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;ipv6 address dhcp&lt;BR /&gt;ipv6 address autoconfig&lt;BR /&gt;ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-WLAN0&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 10.10.1.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;logging trap emergencies&lt;BR /&gt;logging origin-id string AP:84b8.02ad.2ab6&lt;BR /&gt;logging facility kern&lt;BR /&gt;logging host 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;bridge 1 protocol ieee&lt;BR /&gt;bridge 1 route ip&lt;BR /&gt;parser view capwap-config-view&lt;BR /&gt;secret 5 $1$7OvR$5I6xjbkdxP5x8REZa68Q4/&lt;BR /&gt;commands configure include all capwap&lt;BR /&gt;commands exec include all enable&lt;BR /&gt;commands exec include configure terminal&lt;BR /&gt;commands exec include configure&lt;BR /&gt;commands exec include all show capwap&lt;BR /&gt;commands exec include show running-config&lt;BR /&gt;commands exec include show&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 198&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 12:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/channel-list-rrm-interference-interface-dot11radio0-changed/m-p/2982584#M164102</guid>
      <dc:creator>joand3512004</dc:creator>
      <dc:date>2021-07-05T12:37:40Z</dc:date>
    </item>
  </channel>
</rss>

