Jorge,
Thanks for the response. We are using Cisco AP 1131 and AP 1242 - we
don't use a controller, only WLSE to manage. We have the basic default
radio settings enabled. We tried turning off the non-aironet extensions
and the problem still persists. The intervals seem to be regular - for
some it's about every 30 sec and for others it's about every few
minutes. We have dynamic channels set so the AP will search for the
least congested channel. And the strange thing is that this problem
occurs on some APs and not on others with some clients and not with all
of them. We have been trying the driver update and that seems to only
fix the problem for a little while and then it comes back.
Colleen Szymanik
----------------------------
University of Pennsylvania
Network Engineer
Jorge Bodden wrote:
Shumon,
We used to have the same problem when we had the Aironet solution a
couple of years back. It was actually due to the APs sending a
re-association packet/frame to the device, even if that device was
directly underneath the AP. What type of platform are you currently
running your infrastructure on? How dense is your environment? Do
you have dynamic channel/power assignment or are you doing it
statically? Then we had a similar problem, when we deployed to the
Airespace solution, which was due to 2 bugs; one on the controller and
another on the router. Those are things you might want to look at a
little bit.
Although the authentication mechanism is what is being impacted, it
does not seem to be the source of your problem, for the simple fact
that people are authenticating. Have you sniffed the air? You could
try running some tests by leaving a device connected and monitoring it
and what type of traffic it is receiving. Look to see what is
happening with the device when it is disconnecting. Check to see if
it is happening at random intervals, or the intervals are more
periodic. Whatever you do, do not ignore it because there are no
complaints. I am sure that are many of us here in the group whom in
ignoring small problems have gotten burnt.
Let us know how it works out.
Thanks.
Jorge
Shumon Huque wrote:
We rolled out a WPA/802.1x authenticated WLAN to our student
residences this semester. We're using EAP-TTLS with PAP as the inner
authentication protocol. The EAP servers are a set of centralized
RADIUS servers that perform Kerberos5 password verification to our
KDCs in the backend.
We've noticed several problems that we didn't observe when we had it
running on a much smaller scale in our own offices.
A large number of users seem to be repeatedly authenticating,
some of them as frequently as every 30 seconds or every few
minutes. Some debugging revealed that these users are frequently
oscillating their associations between a number of different
access points. A smaller number of users keep reassociating with
the same access point. This is causing a very large load on the
authentication server infrastructure, which we've temporarily
worked around by load balancing the APs across additional RADIUS
servers.
However, we're also assuming that this is causing lots of user
visible performance problems due to roaming latency (scan,
reassociate, authenticate, 802.11i handshake, DHCP address
acquisition etc). Surprisingly, not many users have complained.
Perhaps they are only browsing the web or using other non-
interactive apps which can tolerate delay. Or they might
simultaneously have a wired ethernet connection.
Is frequent reassociation the normal behavior in a dense
deployment of APs? I can understand that it might be for
highly mobile stations like wireless VoIP phones. But our environment
is composed of mostly stationary wireless laptops in student rooms.
My assumption was that roaming typically happened when a user moves
towards a stronger signal AP and at some configured signal quality
threshold, the station started
scanning for a better AP. Am I wrong?
Or is this more likely something in our radio environment or
insufficient coverage etc? Our wireless LAN engineers are
currently investigating this, but I'd be interested to hear
the experience of others.
Do we need a fast roaming solution to deal with this? Having
access points and stations able to cache the PMK (Pairwise
Master Key) would probably help the best, as that would allow
them to often establish a secure association without conducting a
heavyweight authentication dialog with the RADIUS server. But
I'm not sure if access points or typical endstations support this.
TLS session resumption will probably help a bit also (if supported).
We use cisco aironet 1200/1100 access points. The clients are
mostly PCs running SecureW2, Macs running with the built-in
EAP-TTLS/802.1x support in Mac OS X, and a smaller number of
Linux machines.
Thanks for any advice!
---
Shumon Huque 3401 Walnut Street, Suite 221A,
Network Engineering Philadelphia, PA 19104-6228, USA.
Information Systems & Computing (215)898-2477, (215)898-9348
(Fax)
University of Pennsylvania / MAGPI. E-mail: shuque -at- isc.upenn.edu
**********
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.
--------------------
This electronic message is intended to be for the use only of the
named recipient, and may contain information that is confidential or
privileged. If you are not the intended recipient, you are hereby
notified that any disclosure, copying, distribution or use of the
contents of this message is strictly prohibited. If you have received
this message in error or are not the named recipient, please notify us
immediately by contacting the sender at the electronic mail address
noted above, and delete and destroy all copies of this message. Thank
you.
**********
Participation and subscription information for this EDUCAUSE
Constituent Group discussion list can be found at
http://www.educause.edu/groups/.
**********
Participation and subscription information for this EDUCAUSE Constituent Group
discussion list can be found at http://www.educause.edu/groups/.