<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Client deauth when Force DHCP enabled [issue ER-4992 is back] in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20072#M4205</link>
    <description>Great, please open a ticket and provide your information, so one of our TSEs can assist with tracing the activity.</description>
    <pubDate>Wed, 08 Aug 2018 16:00:02 GMT</pubDate>
    <dc:creator>michael_brado</dc:creator>
    <dc:date>2018-08-08T16:00:02Z</dc:date>
    <item>
      <title>Client deauth when Force DHCP enabled [issue ER-4992 is back]</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20068#M4201</link>
      <description>Android client is deauthenticated when roaming within same subnet. This behaviour is reproducible when Force DHCP enabled.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Issue ER-4992 was fixed in firmware 9.13.3 (MR3 Refresh4) but is back in latest firmware 10.1.1.0 for ZD1200.&lt;BR /&gt;&lt;BR /&gt;When Force DHCP is disabled, no issues with roaming. But this will cause unwanted clients with static IPs connecting to our network.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Background of ER-4992:&lt;BR /&gt;&lt;I&gt;Resolved an issue where, if Force DHCP was enabled, clients would be deauthenticated after roaming to another AP if the VLAN after roaming was the same as the previous VLAN. [ER-4992]&lt;/I&gt;</description>
      <pubDate>Mon, 16 Jul 2018 09:10:39 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20068#M4201</guid>
      <dc:creator>zalora_my</dc:creator>
      <dc:date>2018-07-16T09:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: Client deauth when Force DHCP enabled [issue ER-4992 is back]</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20069#M4202</link>
      <description>That's definitely a bug!&amp;nbsp; Do you have a case, and I would insist on an image with the bug fix?</description>
      <pubDate>Tue, 17 Jul 2018 16:51:09 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20069#M4202</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2018-07-17T16:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: Client deauth when Force DHCP enabled [issue ER-4992 is back]</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20070#M4203</link>
      <description>&lt;B alt="" name="" rel="" target="" title="" type="" value=""&gt;Here's the case number: Case #00822526&lt;/B&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;&lt;B alt="" name="" rel="" target="" title="" type="" value=""&gt;Steps to reproduce:&lt;/B&gt;&lt;/P&gt;&lt;OL alt="" name="" rel="" target="" title="" type="1" value=""&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Setup the topology as attached in picture below. Everything in the SAME subnet.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Setup ZD1200 with firmware 10.1.1.0 build 42. Configure your WLAN SSID using the config below.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Go to Wireless LANs &amp;gt; Edit WLAN &amp;gt; enable “Enable Force DHCP, disconnect client if client does not obtain valid IP in 30 secs”. See screenshot below.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Your wifi should be internet enabled (means user can browse any internet websites from their device)&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Connect an Android device to your wifi. Open Terminal on Android and ping your router IP continously.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Make the Android device roam from one AP to another. If you have space constraints, contact Ruckus Development/Engineering team lead on best practices to test device roaming.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Notice after roaming to another AP, the Android device cannot ping router IP. Android device has NO internet. [Not OK].&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Go to Wireless LANs &amp;gt; Edit WLAN &amp;gt; DISABLE “Enable Force DHCP, disconnect client if client does not obtain valid IP in 30 secs”.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Android device immediately resumes pinging router IP.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Go to Wireless LANs &amp;gt; Edit WLAN &amp;gt; ENABLE “Enable Force DHCP, disconnect client if client does not obtain valid IP in 30 secs”.&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Immediately, Android device cannot ping router IP. Android device has NO internet. [Not OK].&lt;/LI&gt;
&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Question: Why does “Enable Force DHCP” affects android devices?&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c43a135b77e2479ccfc4_b16b9f51e97bf245dc8d9450e2221fd7_RackMultipart201808081564323uw-358387f5-49b1-4551-b81f-90797f2ae042-540205114.png1533717743"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/641i1714AB9450942B25/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c43a135b77e2479ccfc4_b16b9f51e97bf245dc8d9450e2221fd7_RackMultipart201808081564323uw-358387f5-49b1-4551-b81f-90797f2ae042-540205114.png1533717743" alt="Image_ images_messages_5f91c43a135b77e2479ccfc4_b16b9f51e97bf245dc8d9450e2221fd7_RackMultipart201808081564323uw-358387f5-49b1-4551-b81f-90797f2ae042-540205114.png1533717743" /&gt;&lt;/span&gt;
&lt;/LI&gt;
&lt;/OL&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c43a135b77e2479ccfc4_2d850120842238de5724c3775d3f4f08_RackMultipart2018080838882ouy8-e9e41c2c-4d64-452d-911f-bcf812a244d8-2111960574.png1533717859"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/642i005C650BBC387EBD/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c43a135b77e2479ccfc4_2d850120842238de5724c3775d3f4f08_RackMultipart2018080838882ouy8-e9e41c2c-4d64-452d-911f-bcf812a244d8-2111960574.png1533717859" alt="Image_ images_messages_5f91c43a135b77e2479ccfc4_2d850120842238de5724c3775d3f4f08_RackMultipart2018080838882ouy8-e9e41c2c-4d64-452d-911f-bcf812a244d8-2111960574.png1533717859" /&gt;&lt;/span&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;
&lt;P alt="" name="" rel="" target="" title="" type="" value=""&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/P&gt;
&lt;PRE alt="" name="" rel="" target="" title="" type="" value=""&gt;WLAN Service:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp; ID:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  NAME = Employees&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Tx. Rate of Management Frame(2.4GHz) = 24.0Mbps&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Tx. Rate of Management Frame(5GHz)&amp;nbsp;&amp;nbsp; = 24.0Mbps&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Beacon Interval = 100ms&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  SSID = Employees&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Description = Employees&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Type = Standard Usage&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Authentication = open&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Encryption = wpa2&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Algorithm = aes&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Passphrase = hidden&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  FT Roaming = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  802.11k Neighbor report = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Web Authentication = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Authentication Server = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Called-Station-Id type = wlan-bssid&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Tunnel Mode = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Background Scanning = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Max. Clients = 500&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Isolation per AP = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Isolation across AP = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Zero-IT Activation = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Priority = High&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Load Balancing = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Band Balancing = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Dynamic PSK = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Rate Limiting Uplink = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  PerSSID Rate Limiting Uplink = 0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Rate Limiting Downlink = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  PerSSID Rate Limiting Downlink = 0&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Auto-Proxy configuration:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Status = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  &amp;nbsp;&amp;nbsp;Inactivity Timeout:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Status = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Timeout = 30 Minutes&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  VLAN-ID = 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Dynamic VLAN = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Closed System = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Https Redirection = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  OFDM-Only State = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Multicast Filter State = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  802.11d State = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Force DHCP State = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Force DHCP Timeout = 30&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  DHCP Option82:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Status = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Option82 sub-Option1 = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Option82 sub-Option2 = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Option82 sub-Option150 = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Option82 sub-Option151 = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Ignore unauthorized client statistic = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  STA Info Extraction State = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  BSS Minrate = 24.0 Mbps&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  DTIM period = 1&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Directed MC/BC Threshold = 5&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Call Admission Control State = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  PMK Cache Timeout= 720 minutes&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  PMK Cache for Reconnect= Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  NAS-ID Type= wlan-bssid&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Roaming Acct-Interim-Update= Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  PAP Message Authenticator = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Send EAP-Failure = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  L2/MAC = Blacklist&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  L3/L4/IP Address = No ACLS&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  L3/L4/IPv6 Address = No ACLS&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Precedence = Default&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Proxy ARP = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Device Policy = No ACLS&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Vlan Pool = No Pools&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Role based Access Control Policy = Disabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  SmartRoam = Enabled&amp;nbsp; Roam-factor = 4&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  White List = No ACLS&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Application Recognition &amp;amp; Control = Enabled&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Apply ARC Policy = NO POLICY&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
  Client Flow Data Logging = Disabled&lt;/PRE&gt;
&lt;PRE alt="" name="" rel="" target="" title="" type="" value=""&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 08 Aug 2018 08:43:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20070#M4203</guid>
      <dc:creator>zalora_my</dc:creator>
      <dc:date>2018-08-08T08:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Client deauth when Force DHCP enabled [issue ER-4992 is back]</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20071#M4204</link>
      <description>Hi Michael, See my reply below.</description>
      <pubDate>Wed, 08 Aug 2018 08:43:33 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20071#M4204</guid>
      <dc:creator>zalora_my</dc:creator>
      <dc:date>2018-08-08T08:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Client deauth when Force DHCP enabled [issue ER-4992 is back]</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20072#M4205</link>
      <description>Great, please open a ticket and provide your information, so one of our TSEs can assist with tracing the activity.</description>
      <pubDate>Wed, 08 Aug 2018 16:00:02 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20072#M4205</guid>
      <dc:creator>michael_brado</dc:creator>
      <dc:date>2018-08-08T16:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Client deauth when Force DHCP enabled [issue ER-4992 is back]</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20073#M4206</link>
      <description>The ticket is&amp;nbsp;&lt;B alt="" name="" rel="" target="" title="" type="" value=""&gt;Case #00822526.&amp;nbsp;&lt;/B&gt;﻿It's been open for sometime. Apparently, they are having trouble finding a large lab space to setup APs to simulate roaming scenarios.</description>
      <pubDate>Fri, 10 Aug 2018 05:50:10 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Client-deauth-when-Force-DHCP-enabled-issue-ER-4992-is-back/m-p/20073#M4206</guid>
      <dc:creator>zalora_my</dc:creator>
      <dc:date>2018-08-10T05:50:10Z</dc:date>
    </item>
  </channel>
</rss>

