06-26-2019 03:48 PM
Since the upgrade to 19.5.1.7-NGVA, we noticed that users who enter a wrong PPSK (type SERVICE) are being locked for 1 hour immediately. Previously, they had a few tries before being locked.
Is this a new/expected behaviour? Is there a way to change it?
Thanks,
carsten
07-25-2019 01:47 PM
Thanks for letting me know, I've submitted that request for you now.
07-25-2019 01:02 PM
Yes, I think this would be a useful feature. Thank you Sam!
07-25-2019 12:39 PM
Unfortunately we don't have a way to edit those lock out setting currently, but I can submit a feature request for this if you'd like?
07-25-2019 11:22 AM
Sorry for late answer - Doug, looks like your guess was right. The client is trying 3 times, so if a wrong key is entered 2 times, it's enough to lock the Client:
2019-07-25 13:14:02LAS-VT-F0-IT-OfficeE01C4106B168Basic
Rx auth <open> (frame 1, rssi -54dB)2019-07-25 13:14:02LAS-VT-F0-IT-OfficeE01C4106B168Basic
Tx auth <open> (frame 2, status 0, pwr 10dBm)2019-07-25 13:14:02LAS-VT-F0-IT-OfficeE01C4106B168Basic
Rx assoc req (rssi -54dB)2019-07-25 13:14:02LAS-VT-F0-IT-OfficeE01C4106B168Basic
Tx assoc resp <accept> (status 0, pwr 10dBm)2019-07-25 13:14:02LAS-VT-F0-IT-OfficeE01C4106B168Info
Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)2019-07-25 13:14:02LAS-VT-F0-IT-OfficeE01C4106B168Info
Received 2/4 msg of 4-Way Handshake (at if=wifi1.1)2019-07-25 13:14:06LAS-VT-F0-IT-OfficeE01C4106B168Info
Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)2019-07-25 13:14:06LAS-VT-F0-IT-OfficeE01C4106B168Info
Received 2/4 msg of 4-Way Handshake (at if=wifi1.1)2019-07-25 13:14:10LAS-VT-F0-IT-OfficeE01C4106B168Info
Sending 1/4 msg of 4-Way Handshake (at if=wifi1.1)2019-07-25 13:14:10LAS-VT-F0-IT-OfficeE01C4106B168Info
Received 2/4 msg of 4-Way Handshake (at if=wifi1.1)
Is there any way to change the number of 5 wrong tries to something else?