IdentiFi (HiPath) Wireless: Who sees 40:00:40:32:XX:XX MAC addresses?
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-10-2014 01:22 PM
Hello Community
We see many AP3710 injecting a lot of packets on their wired Port with source addresses of the scope of 40:00:40:32:XX:XX. The APs itself seem the be the source of these frames, although their wired interfaces have different addresses from these ones.
We recognize the addresses in
"etsysMultiAuthSessionStationAuthStatus"
and in
"etsysMACLockingLockedEntryCause"
We'd like to know whether it is a specific issue to our environment or it's a general one.
Are there any other users of IdentiFi who recognize such addresses?
Maybe you could do a Compass search over all your switch ports for 40:00:40:32
Any feedback would be welcome!
Kind regards
Christoph
We see many AP3710 injecting a lot of packets on their wired Port with source addresses of the scope of 40:00:40:32:XX:XX. The APs itself seem the be the source of these frames, although their wired interfaces have different addresses from these ones.
We recognize the addresses in
"etsysMultiAuthSessionStationAuthStatus"
and in
"etsysMACLockingLockedEntryCause"
We'd like to know whether it is a specific issue to our environment or it's a general one.
Are there any other users of IdentiFi who recognize such addresses?
Maybe you could do a Compass search over all your switch ports for 40:00:40:32
Any feedback would be welcome!
Kind regards
Christoph
5 REPLIES 5
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎02-12-2016 09:01 AM
Hello Community
the error only occurs when the APs encrypt traffic (Data & Control) to the controller.
Who wants to try it should in the Advanced properties of the Access Point to Secure Tunnel switch to "Encrypt control & data traffic between AP & Controller".
Greetings
Hendrik
the error only occurs when the APs encrypt traffic (Data & Control) to the controller.
Who wants to try it should in the Advanced properties of the Access Point to Secure Tunnel switch to "Encrypt control & data traffic between AP & Controller".
Greetings
Hendrik
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎02-12-2016 09:01 AM
Welcome to The Hub!
It seems your question is unclear. I'd recommend that you create a new topic for this to include details on what you need assistance with.
It seems your question is unclear. I'd recommend that you create a new topic for this to include details on what you need assistance with.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-12-2014 08:23 AM
Hi Christoph,
do you have configured the Default Topology for all VNS’s?
You find this under VNS Configuration – WLAN Services – VNSxyz
Regards,
Andre
do you have configured the Default Topology for all VNS’s?
You find this under VNS Configuration – WLAN Services – VNSxyz
Regards,
Andre
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎12-11-2014 01:34 PM
Because of port authentication they they don't get it in the FIB. But they fill up the MACLOCK first arrival station table.
RADAR is not licensed.
The MAC addresses are not listed in the wireless controllers client reports. And I'm pretty much sure they are not sourced by wireless stations.
We have bridged@Ctrl topologies, only.
RADAR is not licensed.
The MAC addresses are not listed in the wireless controllers client reports. And I'm pretty much sure they are not sourced by wireless stations.
We have bridged@Ctrl topologies, only.
