cancel
Showing results for 
Search instead for 
Did you mean: 

IdentiFi (HiPath) Wireless: Who sees 40:00:40:32:XX:XX MAC addresses?

IdentiFi (HiPath) Wireless: Who sees 40:00:40:32:XX:XX MAC addresses?

Christoph
Contributor
Hello Community

We see many AP3710 injecting a lot of packets on their wired Port with source addresses of the scope of 40:00:40:32:XX:XX. The APs itself seem the be the source of these frames, although their wired interfaces have different addresses from these ones.

We recognize the addresses in
"etsysMultiAuthSessionStationAuthStatus"
and in
"etsysMACLockingLockedEntryCause"

We'd like to know whether it is a specific issue to our environment or it's a general one.

Are there any other users of IdentiFi who recognize such addresses?
Maybe you could do a Compass search over all your switch ports for 40:00:40:32

Any feedback would be welcome!

Kind regards
Christoph

5 REPLIES 5

Frank_Kiess
New Contributor
Hello Community

the error only occurs when the APs encrypt traffic (Data & Control) to the controller.
Who wants to try it should in the Advanced properties of the Access Point to Secure Tunnel switch to "Encrypt control & data traffic between AP & Controller".

Greetings
Hendrik

Drew_C
Valued Contributor III
Welcome to The Hub!
It seems your question is unclear. I'd recommend that you create a new topic for this to include details on what you need assistance with.

Andre_Faupl
New Contributor
Hi Christoph,



do you have configured the Default Topology for all VNS’s?

You find this under VNS Configuration – WLAN Services – VNSxyz



Regards,

Andre



Christoph
Contributor
Because of port authentication they they don't get it in the FIB. But they fill up the MACLOCK first arrival station table.

RADAR is not licensed.

The MAC addresses are not listed in the wireless controllers client reports. And I'm pretty much sure they are not sourced by wireless stations.

We have bridged@Ctrl topologies, only.
GTM-P2G8KFN