cancel
Showing results for 
Search instead for 
Did you mean: 

cannot authenticate or get DHCP address

sparkis_greenbr
New Contributor III
New to Ruckus. Want to simply thorw a static IP on ruckus ap. Have Ruckus AP give out DHCP to clients on single wireless network. Route traffic through Ethernet 2 to firewall. 

Internet - assigned static ip w/ gateway IP as firewall
Local Subnet 1 - assigned static ip (same subnet as Internet) and enabled DHCP server Access VLAN 1
Radio 2G - configured Wireless. Packet Forward - Bridge to WAN
Ethernet Port2 - Enabled Access Port, Bridge to WAN Vlan1

Can someone please point me in the right direction as to what I am doing wrong. I cannot get the Wireless to provide a DHCP address - 

I can also give out DHCP addresses from Firewall. If I do that do I only need to configure Radio and Ethernet Port 2?

Thank you in advance

SJMP
47 REPLIES 47

Can u pls use the version I mention before? And post downgrade run the earlier command...that shud be it...and if it works then I think it's a bug in current code

Can u pls use the version I mention before? And post downgrade run the earlier command...that shud be it...and if it works then I think it's a bug in current code

I downgraded to the SW version you recommended. I reset the AP and reconfigured. Same problem

Feb 28 03:30:18 RuckusAP daemon.info channel-wifi0: set initial channel 3
Feb 28 03:30:18 RuckusAP daemon.debug channel-wifi0: No controller or backup mechanism
Feb 28 03:30:18 RuckusAP daemon.info init: starting pid 769, tty '': '/bin/cttyhack /usr/bin/-rkscli'
Feb 28 03:30:19 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (3)
Feb 28 03:30:20 RuckusAP daemon.info channel-wifi0: MTBC changed to 100 minutes
Feb 28 03:30:35 RuckusAP daemon.warn Eved: Last Reboot Reason: user reboot
Feb 28 03:30:35 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 3 to channel 2
Feb 28 03:30:37 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (2)
Feb 28 03:30:47 RuckusAP local2.err syslog: Parameter value L2 is invalid for parameter Tunnel-Mode 
Feb 28 03:30:51 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 2 to channel 4
Feb 28 03:30:53 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (4)
Feb 28 03:31:07 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 4 to channel 9
Feb 28 03:31:09 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (9)
Feb 28 03:31:23 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 9 to channel 1
Feb 28 03:31:25 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (1)
Feb 28 03:31:39 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 1 to channel 8
Feb 28 03:31:41 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (8)
Feb 28 03:32:10 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 8 to channel 7
Feb 28 03:32:12 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (7)
Feb 28 03:32:26 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 7 to channel 5
Feb 28 03:32:28 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (5)
Feb 28 03:32:42 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 5 to channel 11
Feb 28 03:32:44 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (11)
Feb 28 03:32:58 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 11 to channel 6
Feb 28 03:33:00 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (6)
Feb 28 03:33:14 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 6 to channel 10
Feb 28 03:33:16 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (10)
Feb 28 03:33:18 RuckusAP daemon.info hub_registrar: OCSP: 'unknown' on ap-registrar.ruckuswireless.com - withhold query
Feb 28 03:33:23 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: associated
Feb 28 03:33:30 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 10 to channel 9
Feb 28 03:33:32 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (9)
Feb 28 03:33:33 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 03:33:33 RuckusAP daemon.warn Eved: STA-DISASSOC-REASON,nimac=24:77:03:f9:dc:f4,func=domlme,line=6032,hint=domlme,rx_rssi=56,ack_rssi=0,reason=2,freq=2452,chan=9,stats=(8,968,11,1089)
Feb 28 03:33:33 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: disassociated
Feb 28 03:33:45 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: associated
Feb 28 03:33:45 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 WPA: pairwise key handshake completed (RSN)
Feb 28 03:33:46 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 9 to channel 5
Feb 28 03:33:47 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:33:47 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:33:48 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (5)
Feb 28 03:33:48 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:33:48 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:33:53 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:33:53 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:33:59 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:33:59 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:34:02 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 5 to channel 9
Feb 28 03:34:04 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (9)
Feb 28 03:34:33 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 9 to channel 3
Feb 28 03:34:35 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (3)
Feb 28 03:35:04 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 3 to channel 2
Feb 28 03:35:06 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (2)
Feb 28 03:35:18 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: associated
Feb 28 03:35:18 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 WPA: pairwise key handshake completed (RSN)
Feb 28 03:35:20 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 2 to channel 4
Feb 28 03:35:21 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:35:21 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:35:22 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (4)
Feb 28 03:35:26 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: associated
Feb 28 03:35:26 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 WPA: pairwise key handshake completed (RSN)
Feb 28 03:35:28 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:35:28 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:35:36 RuckusAP daemon.info channel-wifi0: channelfly detects interference on radio 11g/n and switches from channel 4 to channel 2
Feb 28 03:35:38 RuckusAP daemon.warn Eved: wifi0: CHANNEL-CHANGE.indication: Channel (2)
Feb 28 03:35:45 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: associated
Feb 28 03:35:45 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 WPA: pairwise key handshake completed (RSN)
Feb 28 03:35:56 RuckusAP daemon.info dnsmasq[453]: DHCPDISCOVER(br1) 24:77:03:f9:dc:f4 
Feb 28 03:35:56 RuckusAP daemon.info dnsmasq[453]: DHCPOFFER(br1) 172.20.5.104 24:77:03:f9:dc:f4 
Feb 28 03:36:04 RuckusAP daemon.info hostapd: wlan0: STA 24:77:03:f9:dc:f4 IEEE 802.11: disassociated

So windows machine has connected. Linux and Droid will not. They are both disassociated from the AP after a successful key handshake completion. Any insight would be appreciated. I am stumped. 

From my linux machine:

[23106.443255] wlan0: associated[23106.443331] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
[23107.445804] wlan0: deauthenticating from 2c:e6:cc:02:ff:b8 by local choice (reason=2)
[23107.454131] wlan0: authenticate with 2c:e6:cc:02:ff:b8
[23107.469530] wlan0: send auth to 2c:e6:cc:02:ff:b8 (try 1/3)
[23107.470954] cfg80211: Calling CRDA to update world regulatory domain
[23107.471348] wlan0: authenticated
[23107.475344] cfg80211: World regulatory domain updated:
[23107.475349] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
[23107.475353] cfg80211:   (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23107.475356] cfg80211:   (2457000 KHz - 2482000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23107.475358] cfg80211:   (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
[23107.475361] cfg80211:   (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23107.475363] cfg80211:   (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23107.476141] wlan0: associate with 2c:e6:cc:02:ff:b8 (try 1/3)
[23107.479697] wlan0: RX AssocResp from 2c:e6:cc:02:ff:b8 (capab=0x431 status=0 aid=3)
[23107.487665] wlan0: associated
[23107.644553] userif-3: sent link down event.
[23107.644560] userif-3: sent link up event.
[23152.616909] wlan0: deauthenticating from 2c:e6:cc:02:ff:b8 by local choice (reason=3)
[23152.638978] cfg80211: Calling CRDA to update world regulatory domain
[23152.640968] cfg80211: World regulatory domain updated:
[23152.640970] cfg80211:   (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp)
[23152.640971] cfg80211:   (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23152.640972] cfg80211:   (2457000 KHz - 2482000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23152.640973] cfg80211:   (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm)
[23152.640974] cfg80211:   (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23152.640975] cfg80211:   (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm)
[23152.826252] userif-3: sent link down event.
[23152.826261] userif-3: sent link up event.