02-03-2022 09:54 AM - edited 02-03-2022 09:59 AM
I have the following APs running on Unleashed 200.12:
1xR650
2xH550
Network type: WPA2-PSK/Open
The problem statement:
All clients disconnect after about 5000 minutes (300000 sec / 83.3 hours / about 3.5 days) on all APs/SSIDs/Radios due to "idle timeout". All clients have been active on the network.
As soon as they hit this magic 5000 minutes connected time, Ruckus disconnected them, which forced client re-authentication and auto re-connect.
Redacted log records:
Feb 3, 2022 @ 12:38:37.089 message:<134>Feb 3 12:38:37 syslog: eventd_to_syslog():User[74:ac:b9:9f:XX:XX] idle timeout and disconnected from WLAN[XX-unifi] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Feb 3, 2022 @ 12:38:37.089 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:xFeqwH4BvDkMnPG_qioG _index:ruckus-2022.02.03 _score: - _type:_doc
Feb 3, 2022 @ 11:53:16.871 message:<134>Feb 3 11:53:16 syslog: eventd_to_syslog():User[00:71:47:0a:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-kitchen@58:fb:96:3f:47:XX] @timestamp:Feb 3, 2022 @ 11:53:16.871 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:5tKBwH4BLqL6RsELKLQs _index:ruckus-2022.02.03 _score: - _type:_doc
Feb 3, 2022 @ 11:50:57.971 message:<134>Feb 3 11:50:57 syslog: eventd_to_syslog():User[f0:45:da:3b:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-lounge@8c:7a:15:3f:40:XX] @timestamp:Feb 3, 2022 @ 11:50:57.971 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:qtJ_wH4BLqL6RsELCbSX _index:ruckus-2022.02.03 _score: - _type:_doc
Feb 3, 2022 @ 11:42:24.967 message:<134>Feb 3 11:42:24 syslog: eventd_to_syslog():User[3c:22:fb:a5:XX:XX] idle timeout and disconnected from WLAN[XX] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Feb 3, 2022 @ 11:42:24.967 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:29J3wH4BLqL6RsELNbKt _index:ruckus-2022.02.03 _score: - _type:_doc
Jan 31, 2022 @ 01:18:15.150 message:<134>Jan 31 01:18:15 syslog: eventd_to_syslog():User[74:ac:b9:9f:XX:XX] idle timeout and disconnected from WLAN[XX-unifi] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Jan 31, 2022 @ 01:18:15.150 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:QtDIrn4BLqL6RsELsTJT _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:31:47.931 message:<134>Jan 31 00:31:47 syslog: eventd_to_syslog():User[00:71:47:0a:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-kitchen@58:fb:96:3f:47:XX] @timestamp:Jan 31, 2022 @ 00:31:47.931 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:JdCern4BLqL6RsELKS7A _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:30:45.231 message:<134>Jan 31 00:30:45 syslog: eventd_to_syslog():User[f0:45:da:3b:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-lounge@8c:7a:15:3f:40:XX] @timestamp:Jan 31, 2022 @ 00:30:45.231 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:_tCdrn4BLqL6RsELNC3U _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:30:45.031 message:<134>Jan 31 00:30:45 syslog: eventd_to_syslog():User[f0:45:da:40:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-kitchen@58:fb:96:3f:47:XX] @timestamp:Jan 31, 2022 @ 00:30:45.031 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:_dCdrn4BLqL6RsELNC0L _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:22:13.127 message:<134>Jan 31 00:22:13 syslog: eventd_to_syslog():User[3c:22:fb:a5:XX:XX] idle timeout and disconnected from WLAN[XX] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Jan 31, 2022 @ 00:22:13.127 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:PdCVrn4BLqL6RsELZC1s _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:21:58.627 message:<134>Jan 31 00:21:58 syslog: eventd_to_syslog():User[50:ed:3c:ee:XX:XX] idle timeout and disconnected from WLAN[XX] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Jan 31, 2022 @ 00:21:58.627 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:L9CVrn4BLqL6RsELKy3J _index:ruckus-2022.01.31 _score: - _type:_doc
Note: due to supply shortage, I had to buy the gear from 3rd parties as it wasn't available from 3 local official distributors. Because of that, Ruckus won't take my money for support coverage, so I can't file a ticket and would appreciate if somebody can provide an advise here.
02-11-2022 07:46 AM
Hi sgg222
Some recommendations:
-You can configure the idle time on the WLAN in advanced options > others and check the configured idle
-I see that the logs are from a syslog, we can also see the reason for disconnection in the aps logs
Access Points > show AP info > Support logs
Like this example:
RuckusAP daemon.warn Eved: STA-DISASSOC-REASON [ieee80211_input(),2547,received IEEE80211_FC0_SUBTYPE_DISASSOC] rx_rssi=43,ack_rssi=0,reason=8,freq=2412,chan=1
-You can also check the IP lease from the DHCP server
02-16-2022 02:45 PM
Thank you for the suggestions but it's not it...
1) Idle timeout is 5 min, not 5000 min
2) I have two different DHCP servers on the network with different lease timeouts, all clients are affected the same way, so it's not DHCP.
3) I don't have any STA-DISASSOC-REASON in the app logs. When I download "Debug logs", I only see syslog messages, same goes for viewing the logs via Unleashed UI.
Anyway, it looks like I tracked down the issue by downloading debug logs and zooming in on my clients in Log analyzer:
Station 3c:22:fb:a5:XX:XX AID 69 Listen Interval 10 Ref Cnt=1, IP =10.0.51.147, IPv6 =::, SSID = <redacted>
VAP = 58:fb:96:3f:XX:XX radio 11a/n/ac name = (Null) Connect since Mon Feb 14 23:59:48 2022
Hostname = <Redacted> Dvcinfo = Mac OS
rename = , favourite = false
DHCP assigned IP = 10.0.51.147 DHCP lease time = 393 DHCP xID= 5631ed4e
Flags = Auth Assoc Authorized Added to AP Session Key installed Counted WMM MappingV4_added
VLAN = 151
Venue =
DPSK id = 0
facebook token = , wechat openid = , wechat tid =
role-id = 0, vlan_id = 0, is_deny = 0, uplink_rate = 0, downlink_rate = 0
device policy: vlan_id = 0, is_deny = 3, uplink_rate = 0, downlink_rate = 0
stats -- last update Wed Feb 16 17:15:54 2022
rx_pktstx_pktsrx_bytestx_byteslast_rx_pktslast_tx_pktslast_rx_byteslast_tx_bytesretriesrssitx_powertx_ratedbmnoise
7356133 | 6043466 |
7406302788 | 6029859457 |
0 | 0 |
0 | 0 |
0 | 52 |
13524 | 0 |
-44 | -96 |
MQ_stats Qued ovrflw enq deq reenq deact XRetries XTlimitsvoice(3):video(2):data(1):bkgnd(0):
5976 | 0 | 5993 | 5993 | 5976 | 0 | 0 | 0 |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
54856 | 0 | 6037497 | 6037497 | 2807326 | 0 | 0 | 0 |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Use WPA2/RSN
WPA Pairwise Cipher = CCMP
WPA PTK state = PTK Init Done
WPA PTK Group state = Idle
Current WPA Passphrase: <redacted>
Outstanding timers:
AP timer - expires in 151390 sec 500000 usec, next state = STA Null Func
What is that "AP timer" and how can I get it changed? When I calculate connected time + AP timer expiration, I get that 5000 mins interval that forces all client to disconnect. I checked it and it holds true for all clients.
Any help here will be appreciated, hope it narrows it down.
02-16-2022 02:46 PM - edited 02-16-2022 03:10 PM
Reposting here as my previous response disappeared.
I tracked it down (via Debug log and Log analyzer) to an Outstanding "AP Timer" attached to each client. Connected time + timer expiration is 5000 min. Could somebody explain what this AP timer is and how to override it / turn it off?
Details below:
Client Information : 3c:22:fb:a5:XX:XX
Station 3c:22:fb:a5:XX:XX AID 69 Listen Interval 10 Ref Cnt=1, IP =10.0.51.147, IPv6 =::, SSID = redacted
VAP = 58:fb:96:3f:XX:XX radio 11a/n/ac name = (Null) Connect since Mon Feb 14 23:59:48 2022
Hostname = redacted Dvcinfo = Mac OS
rename = , favourite = false
DHCP assigned IP = 10.0.51.147 DHCP lease time = 393 DHCP xID= 5631ed4e
Flags = Auth Assoc Authorized Added to AP Session Key installed Counted WMM MappingV4_added
VLAN = 151
Venue =
DPSK id = 0
facebook token = , wechat openid = , wechat tid =
role-id = 0, vlan_id = 0, is_deny = 0, uplink_rate = 0, downlink_rate = 0
device policy: vlan_id = 0, is_deny = 3, uplink_rate = 0, downlink_rate = 0
stats -- last update Wed Feb 16 17:15:54 2022
Use WPA2/RSN
WPA Pairwise Cipher = CCMP
WPA PTK state = PTK Init Done
WPA PTK Group state = Idle
Current WPA Passphrase: redacted
Outstanding timers:
AP timer - expires in 151390 sec 500000 usec, next state = STA Null Func
@syamantakomer maybe?
03-13-2024 06:53 PM
I'm having the same issue. Did you manage to solve it?