07-12-2013 05:20 AM - edited 07-04-2021 12:24 AM
Hi, users are reporting frequent dropouts from the wireless network. The logs show some of the events below:
*apfReceiveTask: Jul 12 08:51:10.854: %SIM-3-DHCP_SERVER_NO_REPLY: sim_interface.c:1039 Failed to get DHCP response on interface 'suguest'. Marking interface dirty.
AP 'AP4c4e.3557.8bf7', MAC: 20:bb:c0:65:dc:40 disassociated previously due to AP Reset. Uptime: 0 days, 05 h 11 m 54 s . Last reset reason: operator changed 11g mode.
Rogue AP : c4:0a:cb:a4:7f:71 removed from Base Radio MAC : a4:18:75:64:07:30 Interface no:0(802.11b/g)
Rogue AP : 00:08:30:38:01:b1 detected on Base Radio MAC : 3c:ce:73:57:f1:10 Interface no:0(802.11b/g) on Channel 1 with RSSI: -88 and SNR: 9 and Classification: unclassified
Rogue AP : 08:d0:9f:86:fe:71 detected on Base Radio MAC : b4:e9:b0:af:cf:80 Interface no:0(802.11b/g) on Channel 11 with RSSI: -88 and SNR: 5 and Classification: unclassified
Rogue AP : c4:0a:cb:2c:0c:c0 detected on Base Radio MAC : b4:e9:b0:af:cf:80 Interface no:0(802.11b/g) on Channel 11 with RSSI: -83 and SNR: 12 and Classification: unclassified
Rogue AP : c4:0a:cb:2c:2f:c0 removed from Base Radio MAC : b4:e9:b0:af:cd:70 Interface no:0(802.11b/g)
Rogue AP : 82:7d:5e:79:35:6f removed from Base Radio MAC : b4:e9:b0:af:cd:70 Interface no:0(802.11n(2.4 GHz))
IDS Signature attack detected. Signature Type: Standard, Name: Auth flood, Description: Authentication Request flood, Track: per-signature, Detecting AP Name: AP0006.f616.e8de, Radio Type: 802.11b/g, Preced: 5, Hits: 500, Channel: 1, srcMac: 82:7D:5E:79:35:6F
IDS Signature attack detected. Signature Type: Standard, Name: Auth flood, Description: Authentication Request flood, Track: per-Mac, Detecting AP Name: AP0006.f616.e8de, Radio Type: 802.11b/g, Preced: 5, Hits: 300, Channel: 1, srcMac: 82:7D:5E:79:35:6F
Rogue AP : 0c:85:25:32:1d:40 removed from Base Radio MAC : b4:e9:b0:af:cf:80 Interface no:0(802.11b/g)
Can anyone help me troubleshoot?
Thanks.
Solved! Go to Solution.