cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1044
Views
0
Helpful
13
Replies

7921G roaming fail

CSCO12180461
Level 1
Level 1

We've recently upgraded our CUCM environment to 11.5. Everything is working normally except for our few 7921G phones. We were running CUCM 7.1.5 with 1.3.3 as the firmware version for the phones. They worked as expected with this setup. Once we upgraded, the phones are now running 1.4.6.3, and the phones will not roam from ap to ap. If I restart a phone, it will connect to the ap that it was originally connected to when I set it up, but once I walk around with it, it drops the connection. Please advise.

Thanks in advance.

13 Replies 13

Leo Laohoo
Hall of Fame
Hall of Fame

Describe the wireless network.

This fails in both of the following environments.

1. At one campus we have a 5760 with 3602I APs. Most devices connect with 802.1x, however, we left a WLAN using WPA2, AES.

2. At the other we have a 4404 using 1142 APs. Again, most devices connect with 802.1x, but we left one WLAN that uses WPA, TKIP.

Let me know if you need more info.

I should clarify that the 7921 phones connect to the WPA networks.

Does the 7921 work with OPEN authentication?

Unfortunately, no. It won't connect at all. Not even after a restart.

Hold on, the phone won't connect with OPEN authentication????

Run a debug.

Sorry. I made the change to OPEN, but forgot to save the changes. Yes, it does connect with OPEN authentication, but it behaves the exact same way. Once I leave the original APs range, I lose the connection. Thanks for the help.

Once I leave the original APs range, I lose the connection.

1.  Maybe there is not enough coverage; 

2.  Check the APs transmit power to see if they are all running full power or not.

I know that there is enough coverage for sure. I can check the power settings today. Keep in mind, these phones were working fine with CUCM 7.1.5 and running firmware version 1.3.3.

running firmware version 1.3.3.

I can assure you 792X firmware 1.3(3) has significant shortcomings when it comes to roaming.  

The roaming algorithm was significantly improved starting from 1.4(3), and later.  

Post the complete output to the WLC command of "sh wlan <VOICE SSID number>".

This is just one of the controllers. (The 5760)

WLAN Profile Name : BC_Secure
================================================
Identifier : 5
Network Name (SSID) : BC_Secure
Status : Enabled
Broadcast SSID : Enabled
Max Associated Clients per WLAN : 0
Max Associated Clients per AP per WLAN : 0
Max Associated Clients per AP Radio per WLAN : 0
AAA Policy Override : Disabled
Network Admission Control
NAC-State : Disabled
Number of Active Clients : 2
Exclusionlist Timeout : 60
Session Timeout : Infinity
CHD per WLAN : Enabled
Webauth DHCP exclusion : Disabled
Interface : 159
Interface Status : Up
Multicast Interface : Unconfigured
WLAN IPv4 ACL :
WLAN IPv6 ACL : unconfigured
DHCP Server : Default
DHCP Address Assignment Required : Disabled
DHCP Option 82 : Disabled
DHCP Option 82 Format : ap-mac
DHCP Option 82 Ascii Mode : Disabled
DHCP Option 82 Rid Mode : Disabled
Local Profiling -Policy Name : Disabled
Device Classification : Disabled
QoS Service Policy - Input
Policy Name : unknown
Policy State : None
QoS Service Policy - Output
Policy Name : unknown
Policy State : None
QoS Client Service Policy
Input Policy Name : unknown
Output Policy Name : unknown
WMM : Allowed
WifiDirect : Disabled
Channel Scan Defer Priority:
Priority (default) : 4
Priority (default) : 5
Priority (default) : 6
Scan Defer Time (msecs) : 100
Media Stream Multicast-direct : Disabled
CCX - AironetIe Support : Enabled
CCX - Gratuitous ProbeResponse (GPR) : Disabled
CCX - Diagnostics Channel Capability : Disabled
Dot11-Phone Mode (7920) : Invalid
Wired Protocol : None
Peer-to-Peer Blocking Action : Disabled
Radio Policy : All
DTIM period for 802.11a radio : 1
DTIM period for 802.11b radio : 1
Local EAP Authentication : Disabled
Mac Filter Authorization list name : Disabled
Accounting list name : Disabled
802.1x authentication list name : Disabled
Security
802.11 Authentication : Open System
Static WEP Keys : Disabled
802.1X : Disabled
Wi-Fi Protected Access (WPA/WPA2) : Enabled
WPA (SSN IE) : Disabled
WPA2 (RSN IE) : Enabled
TKIP Cipher : Disabled
AES Cipher : Enabled
Auth Key Management
802.1x : Disabled
PSK : Enabled
CCKM : Disabled
FT dot1x : Disabled
FT PSK : Disabled
PMF dot1x : Disabled
PMF PSK : Disabled
FT Support : Disabled
FT Reassociation Timeout : 20
FT Over-The-DS mode : Enabled
PMF Support : Disabled
PMF Association Comeback Timeout : 1
PMF SA Query Time : 200
CKIP : Disabled
IP Security : Disabled
L2TP : Disabled
Web Based Authentication : Disabled
Conditional Web Redirect : Disabled
Splash-Page Web Redirect : Disabled
Auto Anchor : Disabled
Sticky Anchoring : Enabled
Cranite Passthru : Disabled
Fortress Passthru : Disabled
PPTP : Disabled
Infrastructure MFP protection : Enabled
Client MFP : Optional
Webauth On-mac-filter Failure : Disabled
Webauth Authentication List Name : Disabled
Webauth Parameter Map : Disabled
Tkip MIC Countermeasure Hold-down Timer : 60
Call Snooping : Disabled
Passive Client : Disabled
Non Cisco WGB : Disabled
Band Select : Disabled
Load Balancing : Disabled
IP Source Guard : Disabled
Local HTTP Profiling Status : Disabled
Radius HTTP Profiling Status : Disabled
Assisted-Roaming
Neighbor List : Disabled
Prediction List : Disabled
Dual Band Support : Disabled
AVC Visibility : Disabled
Universal Admin : Disabled

I'm assuming that there is no hope for these phones.

Yes, all the APs are running full power for the tx power.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: