Yep, I noticed this too. Unfortunately we jumped onto 8.3.133.0 prior to the
discovering of the catastrophic bug. Hopefully they publically release a fixed
version soon.
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of
Hi Brahim,
This is a great resource and something that I already use to help me translate
the debugs when troubleshooting issues like this.
Thanks
Sean
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Brahim Bouchaiba
Hi Christina,
Thanks for the suggestion, it's certainly a very similar issue, the only
difference is this is a Qualcomm NIC, rather than Intel. I'll take a look
through the available settings on the NIC and see if it improves things.
Thanks
Sean
-Original Message-
From: The EDUCAUSE
This sounds like a specific client issue but TAC does have warning out about
any 8.3.13x code:
https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/200046-tac-recommended-aireos.html#anc9
You can request the 8.3.133.10 escalation code and also sign up for the
You may be running into the same Windows 10 "feature" that we did a few months
ago. Here is the document we wrote up: https://www.ias.edu/wireless-resources
RE:
https://www.intel.com/content/www/us/en/support/network-and-i-o/wireless-networking/05544.html
Good luck,
Christina
-
Hi,
Can you run debug client < mac address> then parse it here:
https://cway.cisco.com/tools/WirelessDebugAnalyzer/
On Wed, Jan 31, 2018 at 1:34 PM, Gray, Sean wrote:
> Hi Craig,
>
>
>
> Sorry I should have mentioned that, our WLC is a 5520 running 8.3.133.0
> code
>
>
>
Hi Craig,
Sorry I should have mentioned that, our WLC is a 5520 running 8.3.133.0 code
Sean
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Craig Eyre
Sent: January-31-18 11:30 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Sean,
I would fully uninstall the Symantec software, not just disable it.
Symantec even makes a software uninstaller for their products for their
extra stubborn apps:
https://support.symantec.com/en_US/article.HOWTO74877.html
Honestly, whenever their is network weirdness with these types of
Sean,
What version of controller software are you running?
Craig Eyre
On Wed, Jan 31, 2018 at 11:17 AM, Gray, Sean wrote:
> Hi Everyone,
>
>
>
> I just wanted to throw this weirdness out to the group to see if anyone
> has experienced the same issue and has found a
Hi Everyone,
I just wanted to throw this weirdness out to the group to see if anyone has
experienced the same issue and has found a solution or work around.
We have a student on campus who intermittently cannot connect to our 802.1x
Student WLAN when trying to connect to a Cisco 702w access
By any
chance, are you max’ing the pmk-cache on your WLC (“show pmk-cache all”)?
Dave
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
on behalf of "Gray, Sean"
Reply-To: The EDUCAUSE Wireless Issues Constituent Group
Hi Jeff,
Thanks for the suggestions.
We are running a single controller, so inter-controller roaming isn’t an issue.
On both 802.11a/n/ac & 802.11b/g/n the lowest data rate supported is 12 Mbps,
and we have that set to mandatory. So I think we are also good there.
Thanks
Sean
From: The
In addition to the reports listed we also create triggers for mac addresses
from devices reported lost or stolen to Campus Police.
this has been very successful over the years.
M
On Jan 31, 2018, at 10:05 AM, Chris Hart
> wrote:
We report
We report on –
RADIUS Authentication Issues by client
Top bandwidth APs
Top APs user counts
User Session reports to verify a good distribution of 5/2.4
RF Health report with most options included in the pre-canned report
Guest SSID users count and bandwidth
Monthly and Quarterly reports that show
14 matches
Mail list logo