by Guest » Sat Sep 11, 2010 9:36 am
While one way to interpret that log output is a "de-auth" attack, another is hardware/software bug. The problem with clients losing connectivity to the WAP4410N is widely reported. I suspect many AP users would take issue with the explanation that they
e simply under attack and theres nothing wrong with the access point. The only way to really troubleshoot this is to temporarily substitute an AP from another vendor and see if the problem is resolved. In my environment, the substitution absolutely fixed the problem. Its unfortunate that Cisco can or (I hope this isn the case) won bother to try and duplicate these problems in their lab environment(s). If the dialog in this forum is the total of effort Cisco is putting in to resolving this issue, its pretty safe to say it will never be fixed.
While one way to interpret that log output is a "de-auth" attack, another is hardware/software bug. The problem with clients losing connectivity to the WAP4410N is widely reported. I suspect many AP users would take issue with the explanation that they
e simply under attack and theres nothing wrong with the access point. The only way to really troubleshoot this is to temporarily substitute an AP from another vendor and see if the problem is resolved. In my environment, the substitution absolutely fixed the problem. Its unfortunate that Cisco can or (I hope this isn the case) won bother to try and duplicate these problems in their lab environment(s). If the dialog in this forum is the total of effort Cisco is putting in to resolving this issue, its pretty safe to say it will never be fixed.