Rockwell Automation 1783-WAPxxx Stratix 5100 Wireless Access Point User Manual User Manual
Page 588
588
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
Appendix C
Error and Event Messages
DOT11-7-CCKM_AUTH_FAILED: “Station %e
CCKM authentication failed.”
The indicated station failed CCKM authentication.
Verify that the topology of the access points
configured to use the WDS access point is
functional.
DOT11-4-CCMP_REPLAY: “AES-CCMP TSC replay
was detected on packet (TSC 0x%11x
received from &e).”
AES-CCMP TSC replay was indicated on a frame. A replay
of the AES-CCMP TSC in a received packet almost indicates
an active attack.
None.
DOT11-4-CKIP_MIC_FAILURE: “CKIP MIC
failure was detected on a packet (Digest
0x%x) received from %e).”
CKIP MIC failure was detected on a frame. A failure of the
CKIP MIC in a received packet almost indicates an active
attack.
None.
DOT11-4-CKIP_REPLAY: “CKIP SEQ replay was
detected on a packet (SEQ 0x&x) received
from %e.”
CKIP SEQ replay was detected on a frame. A replay of the
CKIP SEQ in a received packet almost indicates an active
attack.”
None.
DOT11-4-TKIP_MIC_FAILURE: “Received TKIP
Michael MIC failure report from the
station %e on the packet (TSC=0x%11x)
encrypted and protected by %s key.”
TKIP Michael MIC failure was detected from the indicated
station on a unicast frame decrypted locally with the
indicated pairwise key.
A failure of the Michael MIC in a received
packet can indicate an active attack on your
network. Search for and remove potential
rogue devices from your wireless LAN. This
failure can also indicate a misconfigured
client or a faulty client.
DOT11-4-TKIP_MIC_FAILURE_REPORT:
“Received TKIP Michael MIC failure report
from the station %e on the packet
(TSC=0x0) encrypted and protected by %s
key
The access point received an EAPOL-key from the
indicated station notifying the access point that TKIP
Michael MIC failed on a packet transmitted by this access
point.
None.
DOT11-3-TKIP_MIC_FAILURE_REPEATED: “Two
TKIP Michael MIC failures were detected
within %s seconds on %s interface. The
interface will be put on MIC failure hold
state for next %d seconds”
Two TKIP Michael MIC failures were detected within the
indicated time on the indicated interface. Because this
usually indicates an active attack on your network, the
interface is put on hold for the indicated time. During this
hold time, stations by using TKIP ciphers are disassociated
and cannot reassociate until the hold time ends. At the
end of the hold time, the interface operates normally.
MIC failures usually indicate an active attack
on your network. Search for and remove
potential rogue devices from your wireless
LAN. If this is a false alarm and the interface
must not be on hold this long, use the
countermeasure tkip hold-
time
command to adjust the hold time.
DOT11-4-TKIP_REPLAY: “TKIP TSC replay was
detected on a packet (TSC 0x%ssx received
from %e).”
TKIP TSC replay was detected on a frame. A replay of the
TKIP TSC in a received packet almost indicates an active
attack.
None.
DOT11-4-WLAN_RESOURCE_LIMIT: “WLAN limit
exceeded on interface %s and network-id
%d.”
This access point has reached its limit of 16 VLANs or
WLANs.
Unconfigure or reduce static VLANS if access
point is trying to associate with RADIUS
assigned Network-ID turned on.
SOAP-3-WGB_CLIENT_VLAN_SOAP: “Workgroup
Bridge Ethernet client VLAN not
configured.”
No VLAN is configured for client devices attached to the
workgroup bridge.
Configure a VLAN to accommodate client
devices attached to the workgroup bridge.
DOT11-4-NO_VLAN_NAME: “VLAN name %s from
RADIUS server is not configured for
station %e.”
The VLAN name returned by the RADIUS server must be
configured in the access point.
Configure the VLAN name in the access point.
DOT11-4-NO_VLAN_ID: “VLAN id %d from
Radius server is not configured for
station %e.”
The VLAN ID returned by the Radius server must be
configured on the access point.
Configure the VLAN ID on the access point.
SOAP-3-ERROR: “Reported on line %d in
file %s.%s.”
An internal error occurred on the indicated line number in
the indicated filename in the controller ASIC.
None.
SOAP_FIPS-2-INIT_FAILURE: “SOAP FIPS
initialization failure: %s.”
SOAP FIPS initialization failure.
None.
SOAP_FIPS-4-PROC_FAILURE: “SOAP FIPS test
failure: %s.”
SOAP FIPS test critical failure.
None.
SOAP_FIPS-4-PROC_WARNING: “SOAP FIPS test
warning: %s.”
SOAP FIPS test non-critical failure.
SOAP_FIPS-2-SELF_TEST_IOS_FAILURE: “IOS
crypto FIPS self test failed at %s.”
SOAP FIPS self test on IOS crypto routine failed.
Check IOS image.
Table 6 - Subsystem Messages (Continued)
Message
Explanation
Recommended Action