EWC Check WASSP / CAPWAP Tunnel Status ?


Userlevel 6
Hi,

is there a way to check the CAPWAP Tunnel Status of all connected APs ?

Currently i do only know the AP Availability Report which show the tunnel status with green / brown color.

But i fear that if the AP looses the Tunnel for a short period of time or Tunnel is flapping - the report is to slow to show that. Also i need to know how long is the tunnel active! How many Tunnel up/downs are occuring.

It will be also interessting to see some counters regarding Tunnel status - like RX / TX Tunnel Probe packet (i hope they exists - i do not know exactly) or any other.

Any hints for me ?

9 replies

Userlevel 7
The "active APs" report has the information for tunnel uptime.
I don't think that the other information is shown in a report.
Userlevel 6
Hi Ronald,

i am looking for a CLI Command because i think this is easier to check (for several APs) and the information is getting directer and faster than via a web-report.

Regards
Userlevel 6
I expect snmp is the best way to check that. APs are reported as interfaces. Interface down means ap not connected. There should be also OID for the tunel duration
Userlevel 6
Hi Pala,

is there no "debug" command to check and investigate tunnel issues (like on a firewall to check VPN tunnel status) ?

Regards
Userlevel 4
I'm not sure about the CLI commands, but there is a Tunnel alarm OID apTunnelAlarm=1.3.6.1.4.1.4329.15.3.19.4

You can also probably create an alarm in netsight based on RU session manager syslog events, if you just want to see when a backup tunnel is activated e.g.

"RU Session Manager Wireless AP activated backup tunnel"
Userlevel 4
Here is the link to the Controller documentation. You can find the CLI guide for your respective controller under the software guides:

https://extranet.extremenetworks.com/downloads/Pages/WirelessControllers.aspx
Userlevel 2
We have a script, that greps the syslog file and counts the session poll disconnects (tunnel down) messages. Then we manually check APs that have more than 20 disconnects per day.

Oct 12 01:01:13 192.168.1.9 events: RU Session Manager Wireless AP session poll disconnect Wireless AP session timed out. (AP SN 12345678910 AP NAME xyz AP IP 192.168.15.115 timeout 45 secs (active tunnel)) 2

Oct 12 01:01:21 192.168.1.10 events: RU Session Manager Wireless AP session poll disconnect Wireless AP session timed out. (AP SN 12345678910 AP NAME xyz AP IP 192.168.15.115 timeout 60 secs (backup tunnel)) 2
Userlevel 4
Tony wrote:

We have a script, that greps the syslog file and counts the session poll disconnects (tunnel down) messages. Then we manually check APs that have more than 20 disconnects per day.

Oct 12 01:01:13 192.168.1.9 events: RU Session Manager Wireless AP session poll disconnect Wireless AP session timed out. (AP SN 12345678910 AP NAME xyz AP IP 192.168.15.115 timeout 45 secs (active tunnel)) 2

Oct 12 01:01:21 192.168.1.10 events: RU Session Manager Wireless AP session poll disconnect Wireless AP session timed out. (AP SN 12345678910 AP NAME xyz AP IP 192.168.15.115 timeout 60 secs (backup tunnel)) 2

Would you be willing to share the script? 🙂
Userlevel 2
Tony wrote:

We have a script, that greps the syslog file and counts the session poll disconnects (tunnel down) messages. Then we manually check APs that have more than 20 disconnects per day.

Oct 12 01:01:13 192.168.1.9 events: RU Session Manager Wireless AP session poll disconnect Wireless AP session timed out. (AP SN 12345678910 AP NAME xyz AP IP 192.168.15.115 timeout 45 secs (active tunnel)) 2

Oct 12 01:01:21 192.168.1.10 events: RU Session Manager Wireless AP session poll disconnect Wireless AP session timed out. (AP SN 12345678910 AP NAME xyz AP IP 192.168.15.115 timeout 60 secs (backup tunnel)) 2

Hello Joshua,

I've asked the responsible colleagues. They use syslog-ng and it's possible to define filters in syslog-ng and create specific actions when these filters apply.

We use the following filter and write into MySQL database:



filter f_wlan_session_poll {



message('session poll disconnect')



;};

Reply