This feature is disabled by default, and prevents clients from quickly moving from one WLAN to another. Most Apple iOS devices tend to move quickly between WLANs and therefore have issues with the default ‘fast ssid change disabled’ on Cisco WLCs.
The setting causes the controller to deauthenticate the client from the existing WLAN once the client attempts to associate to another.
The typical result is an ‘Unable to join the network’ message on the iOS device.
2) WISPr Protocol: iOS Clients and Web Authentication
WISPr is a draft protocol that enables users to roam between different wireless service providers. Some devices, such as Apple iOS devices, use a mechanism which can determine if the device is connected to Internet, based on an HTTP WISPr request made to a designated URL. This mechanism is used for the device to automatically open a web browser when a direct connection to the Internet is not possible. This enables the user to provide his credentials to access the Internet. The actual authentication is done in the background every time the device connects to a new SSID.
This HTTP request triggers a Web Authentication interception in the controller as any other page requests are performed by a wireless client. This interception leads to a Web Authentication process, which will be completed normally. If the Web Authentication is being used with any of the controller's splash page features (URL provided by a configured RADIUS server), the splash page may never be displayed. This is because the WISPr requests are made at very short intervals, and as soon as one of the queries is able to reach the designated server, any web redirection or splash page display process that is performed in the background is aborted. The device then processes the page request, thus breaking the splash page process.
You can now configure the controller to bypass WISPr detection process, so the Web Authentication interception is only done when a user requests a web page leading to splash page load in user context, without the WISPr detection being performed in the background.
CSCug64750 ARP request unicast is dropped on anchor scenario
5) iOS Process Backgrounding
On any iOS device that has an activated cellular/4g interface, Cisco Jabber (VoIP) App + AnyConnect (SSL VPN) App works as expected. However, on iOS device that only has a single network interface (iPod Touch, iPad WIFI Only, iPad with 4g capability but has never been activated with SIM card), with AnyConnect connected, Jabber in background mode, and let device rest, after about either 2 min 55 sec or 9 min 55 sec, the TCP connection between Jabber client and Jabber server is terminated by the iOS. We think that because traffic between Jabber client and Jabber server is encapsulated by AnyConnect, iOS is not recognizing the socket as a VoIP socket.
CSCul07315 iPad+VPN: Can't receive call when put app in background 15 minutes
6) iOS devices do not support Checkpoint Firewall clusters using IPV4 Mulicast MAC addresses
When the default gateway for iOS devices is a Checkpoint Firewall cluster (usually in Anchored use-case), the MAC address of the DG will be a multicast MAC address. This is not understood properly by the iOS devices, and the radio driver in iOS will drop all SYN-ACKs. This manifests to client as an inability to get to the Webauth login page. No known workaround.
CSCue71856 AP not send traffic indication to client in power saving mode in time - Resolved in 22.214.171.124 and 126.96.36.199
CSCug27515 Incorrect Block ACK segment calculation for winstart/winend
CSCub14854 Phone drops from wifi to 3G if standby awhile causing app to miss calls
CSCul41076 Apple devices cannot associate with country code Indonesia on 11a
CSCub82468 WLC should not allow disable of MCS rates on 800ns guard interval - Resolved in 188.8.131.52
CSCug32118 Apple iPad freeze up every 30 sec Resolved in 184.108.40.206, 220.127.116.11, and 18.104.22.168
Resolved in iOS 7
CSCud67358 Degraded Wi-Fi throughput w/ Apple iOS6 clients w/ 11n/CAC during BA neg - Resolved in iOS 7
CSCud88177 Apple iOS clients report two associated wlans with bssid mac overlap - Resolved in iOS 7
Hi All,How wide in feet/meters can I expect the coverage beam to be if I use a directional patch antenna with 8 gain on the 2.4gHz? I have a space I need to cover, which is 187 feet deep by 219 feet wide. I need the whole space covered. I was going ...
Hi there - hoping someone can help as its driving me a bit mental. I have a 2802 AIR-AP2802I-Z-K9 AP running as a mobility express controller version 22.214.171.124I have a 2602 AP CAP2602E-Z-K9 running lwap version Cisco IOS Software, C2600 Software (AP3...
Hi guys, If possible, please could I have your assistance. We currently have Access Points which are in flex connect mode and are split across 2 x Wireless controllers (5508) – The APs are in high availability mode and will fail over to the seco...
I'm going to add some AP 3800 to a wireless network in an officeI've have been always using internal antennas, even in vertical (wall) AP's, so I don't have any experience with external antennas.1) I see that external dipole antennas has less gain than th...
Hi All,Need helpUsers facing regular slowness and sometimes disconnection during peak office hours. We have enabled 80 MHz channel with Channel change interval of 10 minutes. Is it might cause issue. Its new deployment and facing on site where user use mo...