<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Why are some WLANs not tunneling traffic on all access points? in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59917#M5052</link>
    <description>Hello Micah, &lt;BR /&gt;
&lt;BR /&gt;
Were you able to resolve this issue? &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Tue, 20 Feb 2018 20:00:00 GMT</pubDate>
    <dc:creator>Doug</dc:creator>
    <dc:date>2018-02-20T20:00:00Z</dc:date>
    <item>
      <title>Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59909#M5044</link>
      <description>Hello everyone,&lt;BR /&gt;
&lt;BR /&gt;
I have an RFS-4000 cluster managing a mix of 6532 and 6562 access points. I have 5 WLANs, all of which are enabled on all radios, and using the default profile for each access point type. All WLAN traffic is tunneled through the controller. The configuration is quite basic, and it has been up and running for several years, without any significant adjustments.&lt;BR /&gt;
&lt;BR /&gt;
We had a UPS failure several months ago, and the primary controller, as well as about half of the access points lost power. After restoring power, we have two WLANs (out of five) that are acting funny. The main problem I am having is that sometimes, when clients are successfully associated on one of the affected WLANs, no traffic seems to be tunneled out to the rest of the network. DHCP fails immediately, and even when assigning a static IP address and DNS, the wireless client is unable to communicate with anything else on the network.&lt;BR /&gt;
&lt;BR /&gt;
The thing that makes this particularly confusing is that other WLANs on the same access point function fine at the same time. And functionality on the affected WLAN can be rock solid when associating with a different access point. Given that the WLAN and AP policies are the same across the entire configuration, and all traffic is tunneled, I'm not understanding why the issue would only affect a subset of the WLANs on a subset of the APs.&lt;BR /&gt;
&lt;BR /&gt;
My ability to perform trial and error troubleshooting is very limited, as I am not located at the site, and the facility operates 24/7. Therefore I'm trying to line up some specific ideas about thing I can investigate or try when I am able to schedule a maintenance window.&lt;BR /&gt;
&lt;BR /&gt;
Has anyone else seen an issue like this before?  Any thoughts on a good way to start investigating?&lt;BR /&gt;
&lt;BR /&gt;
Thank you,&lt;BR /&gt;
Micah&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 02:17:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59909#M5044</guid>
      <dc:creator>Micah</dc:creator>
      <dc:date>2018-02-15T02:17:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59910#M5045</link>
      <description>Sometimes the config isn't as basic as one might think.&lt;BR /&gt;
Post the config for all to comment on.  The problem might be obvious.</description>
      <pubDate>Thu, 15 Feb 2018 03:11:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59910#M5045</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2018-02-15T03:11:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59911#M5046</link>
      <description>Hi Andrew,&lt;BR /&gt;
&lt;BR /&gt;
Here's the config. I replaced some passwords with stars.&lt;BR /&gt;
&lt;BR /&gt;
!### show running-config&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of RFS4000 version 5.4.4.0-007R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.2&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;
 permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt;
 deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt;
 deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt;
 deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast"&lt;BR /&gt;
 permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;
!&lt;BR /&gt;
mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt;
 permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos ipspoof&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 no ip-mac conflict&lt;BR /&gt;
 no firewall enable&lt;BR /&gt;
 no stateful-packet-inspection-l2&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
!&lt;BR /&gt;
meshpoint-qos-policy default&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
!&lt;BR /&gt;
wlan AFUS-DMZ&lt;BR /&gt;
 ssid AFUS-DMZ&lt;BR /&gt;
 vlan 120&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 ***************&lt;BR /&gt;
!&lt;BR /&gt;
wlan AFUS-GUEST&lt;BR /&gt;
 ssid AFUS-GUEST&lt;BR /&gt;
 vlan 100&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 ***************&lt;BR /&gt;
!&lt;BR /&gt;
wlan AFUS-OFFICE&lt;BR /&gt;
 ssid AFUS-OFFICE&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 ***************&lt;BR /&gt;
!&lt;BR /&gt;
wlan AFUS-PROD&lt;BR /&gt;
 ssid AFUS-PROD&lt;BR /&gt;
 vlan 30&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 ***************&lt;BR /&gt;
!&lt;BR /&gt;
wlan AFUS-VOICE&lt;BR /&gt;
 ssid AFUS-VOICE&lt;BR /&gt;
 vlan 60&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wpa-wpa2 psk 0 ***************&lt;BR /&gt;
!&lt;BR /&gt;
ap300 default-ap300&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
!&lt;BR /&gt;
smart-rf-policy default&lt;BR /&gt;
 sensitivity custom&lt;BR /&gt;
 smart-ocs-monitoring frequency 2.4GHz 120&lt;BR /&gt;
 smart-ocs-monitoring sample-count 2.4GHz 15&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 no http server&lt;BR /&gt;
 https server&lt;BR /&gt;
 ssh&lt;BR /&gt;
 user admin password 1 *************** role superuser access all&lt;BR /&gt;
 no snmp-server manager v2&lt;BR /&gt;
 snmp-server community 0 *************** ro&lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0 motorola&lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 motorola&lt;BR /&gt;
!&lt;BR /&gt;
l2tpv3 policy default&lt;BR /&gt;
!&lt;BR /&gt;
profile rfs4000 default-rfs4000&lt;BR /&gt;
 ip name-server 10.200.196.1&lt;BR /&gt;
 ip name-server 10.200.196.2&lt;BR /&gt;
 ip domain-name agrana.net&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface up1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  description "WLAN Trunk"&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 400&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1,30,60,100,120,400&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  description Management&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge3&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge4&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge5&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface wwan1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 cluster name USLYWLAN&lt;BR /&gt;
 cluster force-configured-state-delay 5&lt;BR /&gt;
 logging on&lt;BR /&gt;
 logging buffered debugging&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap81xx default-ap81xx&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface radio3&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface wwan1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap71xx default-ap71xx&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface radio3&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface wwan1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6532 default-ap6532&lt;BR /&gt;
 ip default-gateway 10.200.197.126&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan AFUS-GUEST bss 1 primary&lt;BR /&gt;
  wlan AFUS-OFFICE bss 2 primary&lt;BR /&gt;
  wlan AFUS-PROD bss 3 primary&lt;BR /&gt;
  wlan AFUS-VOICE bss 4 primary&lt;BR /&gt;
  wlan AFUS-DMZ bss 5 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan AFUS-GUEST bss 1 primary&lt;BR /&gt;
  wlan AFUS-OFFICE bss 2 primary&lt;BR /&gt;
  wlan AFUS-PROD bss 3 primary&lt;BR /&gt;
  wlan AFUS-VOICE bss 4 primary&lt;BR /&gt;
  wlan AFUS-DMZ bss 5 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  description Management&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 default-ap650&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6521 default-ap6521&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap621 default-ap621&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6511 default-ap6511&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface up1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface fe1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface fe2&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface fe3&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface fe4&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6562 default-ap6562&lt;BR /&gt;
 ip default-gateway 10.200.197.126&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
  wlan AFUS-GUEST bss 1 primary&lt;BR /&gt;
  wlan AFUS-OFFICE bss 2 primary&lt;BR /&gt;
  wlan AFUS-PROD bss 3 primary&lt;BR /&gt;
  wlan AFUS-VOICE bss 4 primary&lt;BR /&gt;
  wlan AFUS-DMZ bss 5 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
  wlan AFUS-GUEST bss 1 primary&lt;BR /&gt;
  wlan AFUS-OFFICE bss 2 primary&lt;BR /&gt;
  wlan AFUS-PROD bss 3 primary&lt;BR /&gt;
  wlan AFUS-VOICE bss 4 primary&lt;BR /&gt;
  wlan AFUS-DMZ bss 5 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 10&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  description Management&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6522 default-ap6522&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap622 default-ap622&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  ip dhcp trust&lt;BR /&gt;
  qos trust dscp&lt;BR /&gt;
  qos trust 802.1p&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain default&lt;BR /&gt;
 location Lysander&lt;BR /&gt;
 contact "Micah Clark"&lt;BR /&gt;
 country-code us&lt;BR /&gt;
 use smart-rf-policy default&lt;BR /&gt;
 control-vlan 10&lt;BR /&gt;
!&lt;BR /&gt;
rfs4000 B4-C7-99-DD-49-EC&lt;BR /&gt;
 use profile default-rfs4000&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYWLAN1&lt;BR /&gt;
 license AP DEFAULT-6AP-LICENSE&lt;BR /&gt;
 license AAP ************************&lt;BR /&gt;
 license ADSEC DEFAULT-ADV-SEC-LICENSE&lt;BR /&gt;
 ip default-gateway 10.200.197.126&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  description Management&lt;BR /&gt;
  ip address 10.200.197.51/25&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
 cluster name USLYWLAN&lt;BR /&gt;
 cluster mode active&lt;BR /&gt;
 cluster member ip 10.200.197.51&lt;BR /&gt;
 cluster member ip 10.200.197.52&lt;BR /&gt;
 cluster member vlan 10&lt;BR /&gt;
 cluster master-priority 250&lt;BR /&gt;
 cluster handle-stp&lt;BR /&gt;
 cluster force-configured-state-delay 5&lt;BR /&gt;
 logging on&lt;BR /&gt;
 logging console warnings&lt;BR /&gt;
 logging buffered warnings&lt;BR /&gt;
!&lt;BR /&gt;
rfs4000 B4-C7-99-DD-4F-46&lt;BR /&gt;
 use profile default-rfs4000&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYWLAN2&lt;BR /&gt;
 license AP DEFAULT-6AP-LICENSE&lt;BR /&gt;
 license ADSEC DEFAULT-ADV-SEC-LICENSE&lt;BR /&gt;
 ip default-gateway 10.200.197.126&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.52/25&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
 cluster mode standby&lt;BR /&gt;
 cluster member ip 10.200.197.51&lt;BR /&gt;
 cluster member ip 10.200.197.52&lt;BR /&gt;
 cluster member vlan 10&lt;BR /&gt;
!&lt;BR /&gt;
ap6532 84-24-8D-16-AF-94&lt;BR /&gt;
 use profile default-ap6532&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP21&lt;BR /&gt;
 area "Maintenance Office"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 17&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.41/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6532 B4-C7-99-9F-82-EC&lt;BR /&gt;
 use profile default-ap6532&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP01&lt;BR /&gt;
 area "Front Office - Cubes"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 17&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.21/25&lt;BR /&gt;
 interface vlan100&lt;BR /&gt;
  ip address 172.22.194.21/24&lt;BR /&gt;
!&lt;BR /&gt;
ap6532 B4-C7-99-9F-91-C8&lt;BR /&gt;
 use profile default-ap6532&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP20&lt;BR /&gt;
 area "Receiving Office"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 2&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.40/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6532 B4-C7-99-A0-5D-60&lt;BR /&gt;
 use profile default-ap6532&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP03&lt;BR /&gt;
 area "Training Room"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 8&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.23/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6532 B4-C7-99-A0-5D-68&lt;BR /&gt;
 use profile default-ap6532&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP02&lt;BR /&gt;
 area "Front Office - Break Rm."&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 17&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.22/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-28-8C&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP04&lt;BR /&gt;
 area "Flavor Room"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 6&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.24/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-29-5C&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP09&lt;BR /&gt;
 area "Tote Wash"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.29/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-29-94&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP14&lt;BR /&gt;
 area "Thaw Room"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.34/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-29-C4&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP05&lt;BR /&gt;
 area "Dry Storage"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.25/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-2A-3C&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP16&lt;BR /&gt;
 area "Cooler (SW)"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 6&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.36/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-2A-60&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP13&lt;BR /&gt;
 area "Processing (SE)"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.33/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-3E-34&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP12&lt;BR /&gt;
 area Freezer&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 6&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.32/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-48-1C&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP11&lt;BR /&gt;
 area "Processing (NW)"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 6&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.31/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-48-B8&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP19&lt;BR /&gt;
 area SPARE&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.39/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-49-A0&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP10&lt;BR /&gt;
 area Allergen&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.30/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-4A-A0&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP07&lt;BR /&gt;
 area Unitizing&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 6&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.27/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-4A-A8&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP15&lt;BR /&gt;
 area "Cooler (NE)"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 11&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.35/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-7D-74&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP08&lt;BR /&gt;
 area Shipping&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.28/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-7E-04&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP17&lt;BR /&gt;
 area "Ext. Tote Storage"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.37/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-7E-F8&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP06&lt;BR /&gt;
 area "Dry Receiving"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  shutdown&lt;BR /&gt;
  channel 6&lt;BR /&gt;
  power 8&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
  antenna-gain 0.0&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.26/25&lt;BR /&gt;
!&lt;BR /&gt;
ap6562 FC-0A-81-17-97-28&lt;BR /&gt;
 use profile default-ap6562&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname USLYAP18&lt;BR /&gt;
 area "Tote Receiving"&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  channel 1&lt;BR /&gt;
  power 30&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address 10.200.197.38/25&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
end&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 06:29:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59911#M5046</guid>
      <dc:creator>Micah</dc:creator>
      <dc:date>2018-02-15T06:29:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59912#M5047</link>
      <description>Hi Micah,&lt;BR /&gt;
The first thing I would check are the network switches into which the RFS4000s are connected to be sure that the VLAN settings on the ports weren't lost because of the power outage.&lt;BR /&gt;
&lt;BR /&gt;
After that, there are a number of potential "issues" with the config; here are some things to think about...&lt;BR /&gt;
I noticed that the configuration in the RFS4000 profile seems to indicate that the RFS4000s are possibly connected into the network with more than one port.  This type of connection should be avoided as it can cause ports to be shutdown unexpectedly because of spanning-tree.&lt;BR /&gt;
A better configuration is to only use the UP1 port and have it configured with all the VLANs, including AP adoption VLAN.  In your case it appears as if UP1 is only for AP adoption and GE1 is for everything else.  &lt;BR /&gt;
&lt;BR /&gt;
There are some unusual power settings on some of the APs, some are at minimum power, others at maximum, and one is even shut down.  Check and review power settings to ensure that the RF signal is covering the space adequately.  Consider having an "exit survey" done by a wireless professional.&lt;BR /&gt;
&lt;BR /&gt;
I noticed that radio 2 (5GHz) isn't configured anywhere, meaning it will use smart-rf to auto channel/power.  If you don't physically have 5GHz antennas connected to the AP6562, or use 5GHz wireless clients, consider shutting down the radio, as dual-band clients could see the 5GHz radio when very close by, but won't get any usability out of it.&lt;BR /&gt;
&lt;BR /&gt;
Other troubleshooting tips&lt;BR /&gt;
Is the cluster working properly?  Check output of "show cluster members".  &lt;BR /&gt;
If the cluster becomes broken (or one of the RFSes is no longer in cluster), the license pool only lasts 100 days, after which they revert to their native license quantities.  Check output of "show licenses".&lt;BR /&gt;
Check output of "show adoption status" to ensure that all the expected APs are showing up.</description>
      <pubDate>Thu, 15 Feb 2018 21:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59912#M5047</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2018-02-15T21:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59913#M5048</link>
      <description>Thank you so much for all of the suggestions, Andrew!!&lt;BR /&gt;
&lt;BR /&gt;
Some responses and additional questions:&lt;BR /&gt;
&lt;BR /&gt;
1. I checked the switch port configurations, and they are as they should be. Identical for both controllers, and matching the controller configuration.&lt;BR /&gt;
&lt;BR /&gt;
2. I will look for an opportunity to move the adoption VLAN onto the same port with everything else, as a best practice. I don't think spanning tree has been hurting me so far though, so I have not seen an indication in the logs of spanning tree adjustments or of ports going up/down while experiencing these issues on the network.&lt;BR /&gt;
&lt;BR /&gt;
3. The unusual power settings are the result of a relatively long process of tweaking things to fix coverage issues in and around the building. There are a lot of concrete and metal walls with large doors that open and close, which leads to a constantly varying footprint for many of the access points. It took a lot of tuning to optimize the footprint of each AP, but we finally got it to a good place where client connectivity was stable, which was quite a while before this problem started. We did have a wireless professional help us with that, using real-time heat map measurements.&lt;BR /&gt;
&lt;BR /&gt;
4. The issues we had that required extensive tuning only seemed to be impacting our 2.4GHz clients. We do have 5GHz clients, but we never seemed to have any connectivity issues with them, so I never messed with those radio settings. I think this is perhaps because the 5GHz band has more non-overlapping channels, so the smart-rf is better able to handle that automatically?&lt;BR /&gt;
&lt;BR /&gt;
5. From what you say about cluster licensing, I think this may be the root of our problem. Right now the secondary controller is offline. I thought these units acted in a simple active/standby manner, and had no idea licensing would be affected when one of them is offline. We had a packet storm several months ago, and shutting down the switch ports to the standby controller resolved the issue. I haven't had an opportunity for a maintenance window to reboot it and bring it back online since then, so it has just been sitting offline for several months, possibly more than 100 days. I have a maintenance window this Sunday, so I can bring it back online then. Do you know if the cluster will automatically sort out its licensing status when the second unit comes back online, or is there something I need to do to get them synced up again on licensing?&lt;BR /&gt;
&lt;BR /&gt;
Here's the output regarding cluster and licensing:&lt;BR /&gt;
&lt;BR /&gt;
USLYWLAN1#show cluster configuration&lt;BR /&gt;
&lt;BR /&gt;
Cluster Configuration Information&lt;BR /&gt;
 Name                         : USLYWLAN&lt;BR /&gt;
 Configured Mode              : Active&lt;BR /&gt;
 Master Priority              : 250&lt;BR /&gt;
 Force configured state       : Disabled&lt;BR /&gt;
 Force configured state delay : 5 minutes&lt;BR /&gt;
 Handle STP                   : Enabled&lt;BR /&gt;
USLYWLAN1#show cluster status&lt;BR /&gt;
&lt;BR /&gt;
Cluster Runtime Information&lt;BR /&gt;
 Protocol version             : 1&lt;BR /&gt;
 Cluster operational state    : active&lt;BR /&gt;
 AP license                   : 12&lt;BR /&gt;
 AAP license                  : 12&lt;BR /&gt;
 AP count                     : 0&lt;BR /&gt;
 AAP count                    : 19&lt;BR /&gt;
 Max AP adoption capacity     : 36&lt;BR /&gt;
 Number of connected member(s): 0&lt;BR /&gt;
USLYWLAN1#show cluster members&lt;BR /&gt;
------------------------------------------------------------------------------------------&lt;BR /&gt;
   HOSTNAME     MEMBER-ID            MAC           MASTER  OPERATIONAL-STATE   LAST-SEEN&lt;BR /&gt;
------------------------------------------------------------------------------------------&lt;BR /&gt;
  USLYWLAN1    19.DD.49.EC    B4-C7-99-DD-49-EC    True     active             self&lt;BR /&gt;
  USLYWLAN2                   B4-C7-99-DD-4F-46    False    down&lt;BR /&gt;
------------------------------------------------------------------------------------------&lt;BR /&gt;
USLYWLAN1#show licenses&lt;BR /&gt;
Serial Number : 13158522400016&lt;BR /&gt;
&lt;BR /&gt;
Device Licenses:&lt;BR /&gt;
  AP-LICENSE&lt;BR /&gt;
    String     : DEFAULT-6AP-LICENSE&lt;BR /&gt;
    Value      : 6&lt;BR /&gt;
  AAP-LICENSE&lt;BR /&gt;
    String     : ***************************&lt;BR /&gt;
    Value      : 12&lt;BR /&gt;
  ADVANCED-SECURITY&lt;BR /&gt;
    String     : DEFAULT-ADV-SEC-LICENSE&lt;BR /&gt;
&lt;BR /&gt;
Cluster Licenses:&lt;BR /&gt;
  AP-LICENSE&lt;BR /&gt;
    Value      : 12&lt;BR /&gt;
    Used       : 7&lt;BR /&gt;
  AAP-LICENSE&lt;BR /&gt;
    Value      : 12&lt;BR /&gt;
    Used       : 12&lt;BR /&gt;
&lt;BR /&gt;
Active Members:&lt;BR /&gt;
--------------------------------------------------------------------------------&lt;BR /&gt;
        MEMBER            SERIAL       AP LIC   AAP LIC   NO.APS     NO.AAPS&lt;BR /&gt;
--------------------------------------------------------------------------------&lt;BR /&gt;
  B4-C7-99-DD-49-EC   13158522400016   6        12        0        19&lt;BR /&gt;
--------------------------------------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
Non-Active Members:&lt;BR /&gt;
--------------------------------------------------------------------------------&lt;BR /&gt;
        MEMBER              SERIAL        AP LIC   AAP LIC     VALIDITY(HRS)&lt;BR /&gt;
--------------------------------------------------------------------------------&lt;BR /&gt;
  B4-C7-99-DD-4F-46    13179522400028    6         0          1&lt;BR /&gt;
&lt;BR /&gt;
--------------------------------------------------------------------------------&lt;BR /&gt;
USLYWLAN1#&lt;BR /&gt;
&lt;BR /&gt;
Thank you!!&lt;BR /&gt;
Micah&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 23:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59913#M5048</guid>
      <dc:creator>Micah</dc:creator>
      <dc:date>2018-02-15T23:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59914#M5049</link>
      <description>Also, here is the current adoption status.&lt;BR /&gt;
&lt;BR /&gt;
USLYWLAN1#show adoption status&lt;BR /&gt;
----------------------------------------------------------------------------------------------------------&lt;BR /&gt;
AP-NAME           VERSION         CFG-STAT         ADOPTED-BY        LAST-ADOPTION                  UPTIME&lt;BR /&gt;
----------------------------------------------------------------------------------------------------------&lt;BR /&gt;
USLYAP21          5.4.4.0-007R    configured       USLYWLAN1         2017-11-09 17:43:17  97 days 20:48:42&lt;BR /&gt;
USLYAP01          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:26 105 days 08:35:51&lt;BR /&gt;
USLYAP20          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:30 113 days 19:54:07&lt;BR /&gt;
USLYAP02          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:29 105 days 08:35:49&lt;BR /&gt;
USLYAP04          5.4.4.0-007R    configured       USLYWLAN1         2017-11-06 22:08:12 100 days 16:23:11&lt;BR /&gt;
USLYAP09          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:25 105 days 08:35:53&lt;BR /&gt;
USLYAP14          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:31 910 days 01:23:09&lt;BR /&gt;
USLYAP05          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:30 105 days 08:35:52&lt;BR /&gt;
USLYAP16          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:32 910 days 01:35:15&lt;BR /&gt;
USLYAP13          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:26 910 days 01:26:17&lt;BR /&gt;
USLYAP12          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:36 910 days 01:28:08&lt;BR /&gt;
USLYAP11          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:36 910 days 01:24:08&lt;BR /&gt;
USLYAP10          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:25 105 days 08:35:53&lt;BR /&gt;
USLYAP07          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:22 105 days 08:35:42&lt;BR /&gt;
USLYAP15          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:26 910 days 01:29:38&lt;BR /&gt;
USLYAP08          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:30 910 days 01:31:17&lt;BR /&gt;
USLYAP17          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:22 113 days 20:00:59&lt;BR /&gt;
USLYAP06          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:21 105 days 08:35:53&lt;BR /&gt;
USLYAP18          5.4.4.0-007R    configured       USLYWLAN1         2017-11-02 07:05:21 113 days 19:39:13&lt;BR /&gt;
------------------------------------------------------------------------------------------------------------&lt;BR /&gt;
Total number of APs displayed: 19&lt;BR /&gt;
USLYWLAN1#&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Feb 2018 23:43:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59914#M5049</guid>
      <dc:creator>Micah</dc:creator>
      <dc:date>2018-02-15T23:43:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59915#M5050</link>
      <description>Hi Micah,&lt;BR /&gt;
&lt;BR /&gt;
It looks as if you have a total of 21 APs in your config, but only 19 APs are adopted.&lt;BR /&gt;
Use: "show wireless ap configured" and "show adoption offline" to see which ones are missing.&lt;BR /&gt;
On the primary RFS, You have a license for 18 APs (default 6 + 12 additional), and the default 6 APs on the secondary RFS, making a total of 24 when everything is working properly.&lt;BR /&gt;
However, the license pool (validity period) appears to be expiring in 1 hour (so it has been 100 days), in which case you will not be able to continue to adopt all 19 APs, and one AP will be dropped, so you are about to experience more problems.  &lt;BR /&gt;
&lt;BR /&gt;
The fact that you mention that you had disabled switch ports because of a broadcast storm problem points back to the fact that the RFSes are connected in duplicate into the network...not ideal, but you'll have to live with it until you can change the topology.   I'd also be very careful of the 'cluster handle-stp' that is present in your configuration.&lt;BR /&gt;
One suggestion would be to restart the second RFS, enable the network ports, if only for a minute or two, just to re-sync the license pool until you can deal with the issue in a more permanent fashion.&lt;BR /&gt;
You could also look at your switches' spanning tree status on the ports facing the RFSes to ensure none are in blocking or alternate.&lt;BR /&gt;
&lt;BR /&gt;
I have seen issues with older versions of RFS4000 code (5.4.x specifically) where two cluster members would get into a shouting match with each other and send &amp;gt;10,000 packets/sec to the broadcast address, thus creating what appears to be a broadcast storm.  &lt;BR /&gt;
I would suggest you upgrade to a more recent firmware version, in part to stabilise the cluster and additionally to address the WPA2 KRACK vulnerability (your auditors will be happy... see: &lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000018005" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?n=000018005&lt;/A&gt;)&lt;BR /&gt;
The upgrade should be seamless, but use the RFS4000 LEAN image and  load AP firmware for AP6532 and AP6562 into the RFSes once they have been upgraded so that the APs can also be upgraded.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Feb 2018 01:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59915#M5050</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2018-02-16T01:50:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59916#M5051</link>
      <description>&lt;BR /&gt;
Andrew,&lt;BR /&gt;
&lt;BR /&gt;
Thank you so much for your observations!&lt;BR /&gt;
&lt;BR /&gt;
The two access points that were already offline were known (one is a spare). You pointed out the 18/19 issue just in time though, and I disabled one additional access point that is not needed right now, so I should be safe at 18 for the moment.&lt;BR /&gt;
&lt;BR /&gt;
During my maintenance window this weekend, I should be able to bring the secondary online to re-sync the license status, and to adjust the ports on both controllers to use just one trunk interface. I will also schedule a time to do a code upgrade, but that will probably have to wait a while longer. The shouting match scenario you mentioned seems plausible. I believe we have seen that issue twice over 4 years. The first time a reboot resolved it.&lt;BR /&gt;
&lt;BR /&gt;
I see the 'cluster handle-stp' line in the config, but it's not familiar to me. I am seeing some references to it online, but nothing explaining what it does. Would it be better if I disabled that, and just let the switches handle stp, especially after the controllers are only on a single interface each?&lt;BR /&gt;
&lt;BR /&gt;
Many thanks,&lt;BR /&gt;
Micah&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Feb 2018 08:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59916#M5051</guid>
      <dc:creator>Micah</dc:creator>
      <dc:date>2018-02-16T08:06:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59917#M5052</link>
      <description>Hello Micah, &lt;BR /&gt;
&lt;BR /&gt;
Were you able to resolve this issue? &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2018 20:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59917#M5052</guid>
      <dc:creator>Doug</dc:creator>
      <dc:date>2018-02-20T20:00:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59918#M5053</link>
      <description>Hi Doug, thank you for following up. I was able to repair the cluster over the weekend, but it doesn't seem to have helped with the main problem. My next step will be to upgrade the code to the latest version. It will probably take me several weeks to get another downtime window scheduled though.</description>
      <pubDate>Wed, 21 Feb 2018 01:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59918#M5053</guid>
      <dc:creator>Micah</dc:creator>
      <dc:date>2018-02-21T01:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: Why are some WLANs not tunneling traffic on all access points?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59919#M5054</link>
      <description>Extreme has just written an article specifically dealing with licenses across clusters.&lt;BR /&gt;
&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000021938" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?n=000021938&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2018 23:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/why-are-some-wlans-not-tunneling-traffic-on-all-access-points/m-p/59919#M5054</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2018-02-22T23:13:00Z</dc:date>
    </item>
  </channel>
</rss>

