Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual

Page 588

Advertising
background image

588

Rockwell Automation Publication 1783-UM006A-EN-P - May 2014

Appendix C

Error and Event Messages

DOT11-7-CCKM_AUTH_FAILED: “Station %e

CCKM authentication failed.”

The indicated station failed CCKM authentication.

Verify that the topology of the access points
configured to use the WDS access point is
functional.

DOT11-4-CCMP_REPLAY: “AES-CCMP TSC replay

was detected on packet (TSC 0x%11x

received from &e).”

AES-CCMP TSC replay was indicated on a frame. A replay
of the AES-CCMP TSC in a received packet almost indicates
an active attack.

None.

DOT11-4-CKIP_MIC_FAILURE: “CKIP MIC

failure was detected on a packet (Digest

0x%x) received from %e).”

CKIP MIC failure was detected on a frame. A failure of the
CKIP MIC in a received packet almost indicates an active
attack.

None.

DOT11-4-CKIP_REPLAY: “CKIP SEQ replay was

detected on a packet (SEQ 0x&x) received

from %e.”

CKIP SEQ replay was detected on a frame. A replay of the
CKIP SEQ in a received packet almost indicates an active
attack.”

None.

DOT11-4-TKIP_MIC_FAILURE: “Received TKIP

Michael MIC failure report from the

station %e on the packet (TSC=0x%11x)

encrypted and protected by %s key.”

TKIP Michael MIC failure was detected from the indicated
station on a unicast frame decrypted locally with the
indicated pairwise key.

A failure of the Michael MIC in a received
packet can indicate an active attack on your
network. Search for and remove potential
rogue devices from your wireless LAN. This
failure can also indicate a misconfigured
client or a faulty client.

DOT11-4-TKIP_MIC_FAILURE_REPORT:

“Received TKIP Michael MIC failure report

from the station %e on the packet

(TSC=0x0) encrypted and protected by %s

key

The access point received an EAPOL-key from the
indicated station notifying the access point that TKIP
Michael MIC failed on a packet transmitted by this access
point.

None.

DOT11-3-TKIP_MIC_FAILURE_REPEATED: “Two

TKIP Michael MIC failures were detected

within %s seconds on %s interface. The

interface will be put on MIC failure hold

state for next %d seconds”

Two TKIP Michael MIC failures were detected within the
indicated time on the indicated interface. Because this
usually indicates an active attack on your network, the
interface is put on hold for the indicated time. During this
hold time, stations by using TKIP ciphers are disassociated
and cannot reassociate until the hold time ends. At the
end of the hold time, the interface operates normally.

MIC failures usually indicate an active attack
on your network. Search for and remove
potential rogue devices from your wireless
LAN. If this is a false alarm and the interface
must not be on hold this long, use the

countermeasure tkip hold-
time

command to adjust the hold time.

DOT11-4-TKIP_REPLAY: “TKIP TSC replay was

detected on a packet (TSC 0x%ssx received

from %e).”

TKIP TSC replay was detected on a frame. A replay of the
TKIP TSC in a received packet almost indicates an active
attack.

None.

DOT11-4-WLAN_RESOURCE_LIMIT: “WLAN limit

exceeded on interface %s and network-id

%d.”

This access point has reached its limit of 16 VLANs or
WLANs.

Unconfigure or reduce static VLANS if access
point is trying to associate with RADIUS
assigned Network-ID turned on.

SOAP-3-WGB_CLIENT_VLAN_SOAP: “Workgroup

Bridge Ethernet client VLAN not

configured.”

No VLAN is configured for client devices attached to the
workgroup bridge.

Configure a VLAN to accommodate client
devices attached to the workgroup bridge.

DOT11-4-NO_VLAN_NAME: “VLAN name %s from

RADIUS server is not configured for

station %e.”

The VLAN name returned by the RADIUS server must be
configured in the access point.

Configure the VLAN name in the access point.

DOT11-4-NO_VLAN_ID: “VLAN id %d from

Radius server is not configured for

station %e.”

The VLAN ID returned by the Radius server must be
configured on the access point.

Configure the VLAN ID on the access point.

SOAP-3-ERROR: “Reported on line %d in

file %s.%s.”

An internal error occurred on the indicated line number in
the indicated filename in the controller ASIC.

None.

SOAP_FIPS-2-INIT_FAILURE: “SOAP FIPS

initialization failure: %s.”

SOAP FIPS initialization failure.

None.

SOAP_FIPS-4-PROC_FAILURE: “SOAP FIPS test

failure: %s.”

SOAP FIPS test critical failure.

None.

SOAP_FIPS-4-PROC_WARNING: “SOAP FIPS test

warning: %s.”

SOAP FIPS test non-critical failure.

SOAP_FIPS-2-SELF_TEST_IOS_FAILURE: “IOS

crypto FIPS self test failed at %s.”

SOAP FIPS self test on IOS crypto routine failed.

Check IOS image.

Table 6 - Subsystem Messages (Continued)

Message

Explanation

Recommended Action

Advertising