Security: Upstream AP is using an untrusted auth server
Installation and Configuration Guide, (CQW-AP108AG)
261
Usage:
This indicates that the AP has determined that the station authentication sequence
did not complete in time.
Examples:
For device-id AP_00-0A-F5-00-01-89 , the STA 00:0a:f5:00:05:f0 [0] on radio 0 with user
paul and SSID NewYorkRm did not complete its auth sequence in time with auth-type 4
and enc-type 6 due to reason code 6
See Also:
EAP User-ID timeout, EAP Response Timeout
Security: Upstream AP is using an untrusted auth server
Notification which indicates that the local BP has determined that the upstream AP is using an un-
trusted auth server.
Syntax:
"For device-id %s, the upstream AP %s with SSID %s authenticating via
local BP radio %d is using an untrusted auth server %s with certificate
SHA-1 thumbprint %s : IT MIGHT BE A ROGUE AP”
Description:
This notification is generated when the local BP has determined that the
upstream AP is using an un-trusted auth server.
Usage:
This indicates that the local BP has determined that the upstream AP is using an
un-trusted auth server. This may indicate that the upstream AP is a rogue AP. It is
safe to say that the upstream AP and the downstream AP are not enrolled in the
same network. If the downstream AP was previously enrolled elsewhere, then reset
it and re-enroll it in the new network.
Examples:
For device-id AP_00-0A-F5-00-01-89 , the upstream AP 00:0a:f5:00:06:22 with SSID
NewYorkRm authenticating via local BP radio 0 is using an untrusted auth server
00:0a:f5:00:01:45 with certificate SHA-1 thumbprint
98:72:a8:6d:56:f8:92:a8:f3:97:ec:3f:fa:0b:66:4e : IT MIGHT BE A ROGUE AP
See Also:
Alarm Parameters
DeviceId
The Device ID of the 108 Mbps Wireless AP
AP
The MAC address of the upstream AP.
SSID
Identifies the SSID on this AP that the STA has associated with.
Radio
Identifies Radio by interface ID on the Access Point
Node
The Device ID (X.509 Certificate CN) of the entity used by the
upstream AP as an auth server
Thumbprint
The SHA-1 Thumbprint of the certificate for this purported portal
Alarm Severity
Severity
Critical
Summary of Contents for CQW-AP108AG
Page 2: ......
Page 13: ...Preface xiii Installation and Configuration Guide CQW AP108AG ...
Page 67: ...3 Using the Configuration Interfaces 54 Installation and Configuration Guide CQW AP108AG ...
Page 113: ...4 Configuring Radio Settings 100 Installation and Configuration Guide CQW AP108AG ...
Page 141: ...5 Configuring Networking Settings 128 Installation and Configuration Guide CQW AP108AG ...
Page 149: ...6 Configuring a Wireless Backhaul 136 Installation and Configuration Guide CQW AP108AG ...
Page 167: ...7 Managing Security 154 Installation and Configuration Guide CQW AP108AG ...
Page 177: ...8 Configuring Guest Access 164 Installation and Configuration Guide CQW AP108AG ...
Page 223: ...9 Managing the Network 210 Installation and Configuration Guide CQW AP108AG ...
Page 241: ...10 Maintaining the Access Point 228 Installation and Configuration Guide CQW AP108AG ...
Page 245: ...A Using the Command Line Interface 232 Installation and Configuration Guide CQW AP108AG ...
Page 247: ...B Regulatory and License Information 234 Installation and Configuration Guide CQW AP108AG ...
Page 289: ...C Alarms 276 Installation and Configuration Guide CQW AP108AG ...