06-02-2014 03:38 AM - edited 07-05-2021 12:56 AM
I got a site that has stand alone access points and we use a tablet lenovo with windows 8.
I have tested the tablet in all the site and with one Ap works fine but with all the rest it gave us the limited connectivity error.
We have confirm the configs in all the Access points and is the same. We have installed a new ap for the tablet to get better cover.
And we tested the tablet in motorola infra-structure and works fine.
Can anyone give me a help?
Thanks
06-02-2014 03:51 AM
Please post the config.
06-02-2014 03:59 AM
Building configuration...
Current configuration : 11932 bytes
!
! Last configuration change at 17:43:47 PT Tue May 27 2014 by cardosoaa1
! NVRAM config last updated at 17:43:47 PT Tue May 27 2014 by cardosoaa1
!
version 12.3
no service pad
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
!
hostname AP-06
!
logging buffered 40000 debugging
enable secret 5 ************************
!
clock timezone CET 1
clock summer-time PT recurring last Sun Mar 2:00 last Sun Oct 3:00
ip subnet-zero
no ip domain lookup
!
!
aaa new-model
!
!
aaa group server radius rad_eap
server 10.126.103.5 auth-port 1645 acct-port 1646
server 10.126.103.6 auth-port 1645 acct-port 1646
!
aaa group server radius rad_mac
!
aaa group server radius rad_acct
server 10.126.103.6 auth-port 1645 acct-port 1646
!
aaa group server radius rad_admin
!
aaa group server tacacs+ tac_admin
!
aaa group server radius rad_pmip
!
aaa group server radius dummy
!
aaa authentication login default group tacacs+ local
aaa authentication login taxacao none
aaa authentication login eap_methods group rad_eap
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization network default none
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 2 default start-stop group tacacs+
aaa accounting commands 3 default start-stop group tacacs+
aaa accounting commands 4 default start-stop group tacacs+
aaa accounting commands 5 default start-stop group tacacs+
aaa accounting commands 6 default start-stop group tacacs+
aaa accounting commands 7 default start-stop group tacacs+
aaa accounting commands 8 default start-stop group tacacs+
aaa accounting commands 9 default start-stop group tacacs+
aaa accounting commands 10 default start-stop group tacacs+
aaa accounting commands 11 default start-stop group tacacs+
aaa accounting commands 12 default start-stop group tacacs+
aaa accounting commands 13 default start-stop group tacacs+
aaa accounting commands 14 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting network acct_methods start-stop group rad_acct
aaa session-id common
dot11 syslog
!
dot11 ssid U%/5P3M(=-15si-(
vlan 6
authentication open
!
dot11 ssid U%5P3M(=-15si-(ED
vlan 5
authentication open eap eap_methods
authentication key-management wpa
accounting acct_methods
guest-mode
!
dot11 ssid wireless%enter-ac
vlan 50
authentication open
authentication key-management wpa
wpa-psk ascii 7 *************************
!
!
crypto pki trustpoint TP-self-signed-1667691355
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1667691355
revocation-check none
rsakeypair TP-self-signed-1667691355
!
!
crypto ca certificate chain TP-self-signed-1667691355
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31363637 36393133 3535301E 170D3134 30343131 30393539
35395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 36363736
39313335 3530819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B788 F30AB970 5E817CDF A03A8F8C AF49C847 DDCD8311 D7EA01A0 65D5132A
6456AF56 AEB4DCEB 96E984CC 480460DF 869CE873 4F9EF49A 2A4A889B 3E5A7CB5
924B0E3A 0AF6A789 1F651008 5F5B302E 3F54569D 91BB74FF 3E4E889A 71F9B2C6
51CE60DF 8EEC181D 908A3E02 3C01ED60 F9353A4B A65E4A2C BEFB63C1 A99F2994
32070203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 143BA26C C74F5170 A0A90DC2 81653CD1 57569A09 5E301D06
03551D0E 04160414 3BA26CC7 4F5170A0 A90DC281 653CD157 569A095E 300D0609
2A864886 F70D0101 04050003 8181005E 31CA37CD CA4361EC 3784A343 2CEF2684
866E5906 697A1C51 1527D251 708A555D 2A8A5E5B 7C19DC89 EC8FDF08 53E0CD51
DAE4ECFE 283F163C 5D9068C3 F134B4B8 B0E534F6 8DEEDBFA 38006607 EF2E956B
350D9189 7E27FDBD ECA9ED8B 6272084B B1E117D0 C9EDCBEC 8E60CBD2 84F4D407
F760520D 05ACF081 A47E9277 94B832
quit
dot1x timeout reauth-period server
username **** password 7 *****
!
bridge irb
!
!
interface Dot11Radio0
no ip address
no ip route-cache
!
encryption vlan 6 key 1 size 128bit 7 F3031DB3DCEE7F8CCDF4083CB339 transmit-key
encryption vlan 6 key 2 size 128bit 7 2595C52A17A735911C6CD7329BBE
encryption vlan 6 key 3 size 128bit 7 0FC4073146CBCF2CF0521625322A
encryption vlan 6 key 4 size 128bit 7 3055C40C4236A00E7E49B8425524
encryption vlan 6 mode wep mandatory
!
encryption vlan 50 mode ciphers tkip
!
encryption vlan 5 mode ciphers tkip
!
ssid U%/5P3M(=-15si-(
!
ssid U%5P3M(=-15si-(ED
!
ssid wireless%enter-ac
!
countermeasure tkip hold-time 0
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0
channel 2462
station-role root fallback shutdown
rts threshold 2312
antenna receive right
antenna transmit right
l2-filter bridge-group-acl
no cdp enable
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
!
interface Dot11Radio0.5
encapsulation dot1Q 5
no ip route-cache
no cdp enable
bridge-group 5
bridge-group 5 subscriber-loop-control
bridge-group 5 block-unknown-source
no bridge-group 5 source-learning
no bridge-group 5 unicast-flooding
bridge-group 5 spanning-disabled
!
interface Dot11Radio0.6
encapsulation dot1Q 6
ip access-group WEP in
no ip route-cache
no cdp enable
bridge-group 6
bridge-group 6 subscriber-loop-control
bridge-group 6 block-unknown-source
no bridge-group 6 source-learning
no bridge-group 6 unicast-flooding
bridge-group 6 spanning-disabled
!
interface Dot11Radio0.50
encapsulation dot1Q 50
ip access-group WPA in
no ip route-cache
no cdp enable
bridge-group 50
bridge-group 50 subscriber-loop-control
bridge-group 50 block-unknown-source
no bridge-group 50 source-learning
no bridge-group 50 unicast-flooding
bridge-group 50 spanning-disabled
!
interface FastEthernet0
no ip address
no ip route-cache
duplex auto
speed auto
!
interface FastEthernet0.1
encapsulation dot1Q 1 native
no ip route-cache
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
!
interface FastEthernet0.5
encapsulation dot1Q 5
no ip route-cache
bridge-group 5
no bridge-group 5 source-learning
bridge-group 5 spanning-disabled
!
interface FastEthernet0.6
encapsulation dot1Q 6
no ip route-cache
bridge-group 6
no bridge-group 6 source-learning
bridge-group 6 spanning-disabled
!
interface FastEthernet0.50
encapsulation dot1Q 50
no ip route-cache
bridge-group 50
no bridge-group 50 source-learning
bridge-group 50 spanning-disabled
!
interface BVI1
ip address 10.76.119.116 255.255.255.0
no ip route-cache
!
ip default-gateway 10.76.119.254
no ip http server
ip http authentication aaa login-authentication default
ip http authentication aaa exec-authorization default
ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip tacacs source-interface BVI1
ip radius source-interface BVI1
!
ip access-list extended WEP
remark *** DCServicos ***
permit udp any eq bootpc any eq bootps
permit udp any eq bootpc any eq bootpc
permit tcp any any eq domain
permit udp any any eq domain
permit udp any any eq ntp
permit udp any any eq netbios-ns
permit udp any any eq 987
remark *** SMS ***
permit tcp any host 10.128.157.84
permit tcp any host 10.128.6.35
remark *** RETEK ***
permit tcp any 10.128.16.32 0.0.0.31
remark *** PORTAL MOVEL ***
permit tcp any 10.128.6.24 0.0.0.7
permit tcp any host 10.126.63.52
remark *** SOTI ***
permit tcp any host 10.126.136.10
remark *** WRT ***
permit tcp any host 10.126.71.72
permit tcp any host 10.126.56.54
remark *** XAREVISION ***
permit tcp any 10.126.105.32 0.0.0.15
permit udp any 10.126.105.32 0.0.0.15
remark *** SHOPPERS ***
permit tcp any host 10.194.34.145
permit tcp any host 10.126.56.42
permit tcp any host 10.128.2.22
remark *** ICMP ***
permit icmp any any
remark *** MU-MU ***
permit tcp any 10.129.162.0 0.0.0.255 eq www
permit tcp any 10.76.112.0 0.0.15.255 eq www
permit tcp any 10.120.152.0 0.0.0.255 eq www
permit tcp any 10.120.153.0 0.0.0.255 eq www
deny tcp any any
ip access-list extended WPA
remark *** DCServicos ***
permit udp any eq bootpc any eq bootps
permit udp any eq bootpc any eq bootpc
permit tcp any any eq domain
permit udp any any eq domain
permit udp any any eq ntp
permit udp any any eq netbios-ns
permit udp any any eq 987
remark *** DCServers ***
remark *** SMS ***
permit tcp any host 10.128.157.84
permit tcp any host 10.128.6.35
remark *** RETEK ***
permit tcp any 10.128.16.32 0.0.0.31
remark *** PORTAL MOVEL ***
permit tcp any 10.128.6.24 0.0.0.7
permit tcp any host 10.126.63.52
remark *** SOTI ***
permit tcp any host 10.126.136.10
remark *** WRT ***
permit tcp any host 10.126.71.72
permit tcp any host 10.126.56.54
remark *** XAREVISION ***
permit tcp any 10.126.105.32 0.0.0.15
permit udp any 10.126.105.32 0.0.0.15
remark *** SHOPPERS ***
permit tcp any host 10.194.34.145
permit tcp any host 10.126.56.42
permit tcp any host 10.128.2.22
remark *** ICMP ***
permit icmp any any
remark *** MU-MU ***
permit tcp any 10.129.162.0 0.0.0.255
permit tcp any 10.76.112.0 0.0.15.255
permit tcp any 10.120.152.0 0.0.0.255
permit tcp any 10.120.153.0 0.0.0.255
deny tcp any any
logging trap debugging
logging origin-id hostname
logging facility local2
logging source-interface BVI1
logging 10.128.18.28
access-list 99 remark *** SNMP ***
access-list 99 permit 10.128.23.0 0.0.0.255
access-list 99 permit 10.128.1.0 0.0.0.255
access-list 99 permit 10.126.101.0 0.0.0.255
access-list 99 permit 10.125.0.0 0.0.0.255
access-list 99 permit 10.128.21.160 0.0.0.15
access-list 99 permit 10.126.17.0 0.0.0.255
access-list 99 permit 10.126.103.0 0.0.0.15
access-list 99 deny any
access-list 201 permit 0x0800 0x0000
access-list 201 permit 0x0806 0x0000
access-list 201 permit 0x888E 0x0000
access-list 201 deny 0x0000 0xFFFF
access-list 700 deny 0000.0000.0000 ffff.ffff.ffff
snmp-server engineID local 0000000902000008A3B91100
snmp-server community ****** RO 99
snmp-server trap-source BVI1
snmp-server location *************
snmp-server contact networking@sonaedistribuicao.pt
snmp-server enable traps snmp authentication linkdown linkup coldstart
snmp-server enable traps tty
snmp-server enable traps entity
snmp-server enable traps config
snmp-server host 10.126.103.14 ******
snmp-server host 10.128.1.10 ******
snmp-server tftp-server-list 99
tacacs-server host 10.126.103.6
tacacs-server directed-request
tacacs-server key 7 ******
radius-server attribute 32 include-in-access-req format %h
radius-server host 10.126.103.6 auth-port 1645 acct-port 1646 key 7 **************************
radius-server host 10.126.103.5 auth-port 1645 acct-port 1646 key 7 **************************
radius-server vsa send accounting
bridge 1 route ip
!
!
!
line con 0
session-timeout 5
exec-timeout 5 0
transport preferred telnet
stopbits 1
line vty 0 4
session-timeout 30
exec-timeout 5 0
privilege level 15
password 7 13091E1C00010178180A0503
transport preferred telnet
transport input telnet ssh
line vty 5 15
privilege level 15
password 7 13091E1C00010178180A0503
transport preferred telnet
transport input telnet ssh
!
sntp server *************
sntp server *************
end
06-02-2014 04:29 AM
What AP is this? Is this a 1231 with only a single antenna?
You have three SSID here. Are you saying Windows 8 clients are unable to connect to either of the three including the SSID with OPEN authentication?
06-02-2014 04:32 AM
Yes they are AIR-AP1231G-E-K9, they have 3 ssid but the tablet is just to connect to te ED because has AD credentials.
06-02-2014 04:46 AM
Tablet? What kind of tablet? Surface Pro?
Have you tried to disable BlueTooth? There are known issues in regards to MS Surface Pro and wireless. This can be rectified as long as BlueTooth is disabled.
06-02-2014 05:52 AM
It's a lenovo tablet
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide