cancel
Showing results for 
Search instead for 
Did you mean: 

All clients reconnect every 3.5 days [200.12]

sgg222
New Contributor

I have the following APs running on Unleashed 200.12:

1xR650

2xH550

Network type: WPA2-PSK/Open

The problem statement:

All clients disconnect after about 5000 minutes (300000 sec / 83.3 hours / about 3.5 days) on all APs/SSIDs/Radios due to "idle timeout". All clients have been active on the network.

As soon as they hit this magic 5000 minutes connected time, Ruckus disconnected them, which forced client re-authentication and auto re-connect.

Redacted log records:

Feb 3, 2022 @ 12:38:37.089 message:<134>Feb 3 12:38:37 syslog: eventd_to_syslog():User[74:ac:b9:9f:XX:XX] idle timeout and disconnected from WLAN[XX-unifi] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Feb 3, 2022 @ 12:38:37.089 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:xFeqwH4BvDkMnPG_qioG _index:ruckus-2022.02.03 _score: - _type:_doc
Feb 3, 2022 @ 11:53:16.871 message:<134>Feb 3 11:53:16 syslog: eventd_to_syslog():User[00:71:47:0a:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-kitchen@58:fb:96:3f:47:XX] @timestamp:Feb 3, 2022 @ 11:53:16.871 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:5tKBwH4BLqL6RsELKLQs _index:ruckus-2022.02.03 _score: - _type:_doc
Feb 3, 2022 @ 11:50:57.971 message:<134>Feb 3 11:50:57 syslog: eventd_to_syslog():User[f0:45:da:3b:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-lounge@8c:7a:15:3f:40:XX] @timestamp:Feb 3, 2022 @ 11:50:57.971 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:qtJ_wH4BLqL6RsELCbSX _index:ruckus-2022.02.03 _score: - _type:_doc
Feb 3, 2022 @ 11:42:24.967 message:<134>Feb 3 11:42:24 syslog: eventd_to_syslog():User[3c:22:fb:a5:XX:XX] idle timeout and disconnected from WLAN[XX] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Feb 3, 2022 @ 11:42:24.967 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:29J3wH4BLqL6RsELNbKt _index:ruckus-2022.02.03 _score: - _type:_doc

Jan 31, 2022 @ 01:18:15.150 message:<134>Jan 31 01:18:15 syslog: eventd_to_syslog():User[74:ac:b9:9f:XX:XX] idle timeout and disconnected from WLAN[XX-unifi] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Jan 31, 2022 @ 01:18:15.150 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:QtDIrn4BLqL6RsELsTJT _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:31:47.931 message:<134>Jan 31 00:31:47 syslog: eventd_to_syslog():User[00:71:47:0a:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-kitchen@58:fb:96:3f:47:XX] @timestamp:Jan 31, 2022 @ 00:31:47.931 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:JdCern4BLqL6RsELKS7A _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:30:45.231 message:<134>Jan 31 00:30:45 syslog: eventd_to_syslog():User[f0:45:da:3b:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-lounge@8c:7a:15:3f:40:XX] @timestamp:Jan 31, 2022 @ 00:30:45.231 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:_tCdrn4BLqL6RsELNC3U _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:30:45.031 message:<134>Jan 31 00:30:45 syslog: eventd_to_syslog():User[f0:45:da:40:XX:XX] idle timeout and disconnected from WLAN[XX-iot] at AP[ap-r-kitchen@58:fb:96:3f:47:XX] @timestamp:Jan 31, 2022 @ 00:30:45.031 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:_dCdrn4BLqL6RsELNC0L _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:22:13.127 message:<134>Jan 31 00:22:13 syslog: eventd_to_syslog():User[3c:22:fb:a5:XX:XX] idle timeout and disconnected from WLAN[XX] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Jan 31, 2022 @ 00:22:13.127 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:PdCVrn4BLqL6RsELZC1s _index:ruckus-2022.01.31 _score: - _type:_doc
Jan 31, 2022 @ 00:21:58.627 message:<134>Jan 31 00:21:58 syslog: eventd_to_syslog():User[50:ed:3c:ee:XX:XX] idle timeout and disconnected from WLAN[XX] at AP[ap-r-2ndbed@58:fb:96:3f:3c:XX] @timestamp:Jan 31, 2022 @ 00:21:58.627 @version:1 host:192.168.12.11 tags:Ruckus type:Ruckus _id:L9CVrn4BLqL6RsELKy3J _index:ruckus-2022.01.31 _score: - _type:_doc

 

Note: due to supply shortage, I had to buy the gear from 3rd parties as it wasn't available from 3 local official distributors. Because of that, Ruckus won't take my money for support coverage, so I can't file a ticket and would appreciate if somebody can provide an advise here.

3 REPLIES 3

Vásquez_Fer
New Contributor III

Hi  sgg222

Some recommendations:

-You can configure the idle time on the WLAN in advanced options > others and check the configured idle

-I see that the logs are from a syslog, we can also see the reason for disconnection in the aps logs

Access Points > show AP info > Support logs

Like this example:

RuckusAP daemon.warn Eved: STA-DISASSOC-REASON [ieee80211_input(),2547,received IEEE80211_FC0_SUBTYPE_DISASSOC] rx_rssi=43,ack_rssi=0,reason=8,freq=2412,chan=1

-You can also check the IP lease from the DHCP server

Thank you for the suggestions but it's not it...

1) Idle timeout is 5 min, not 5000 min

2) I have two different DHCP servers on the network with different lease timeouts, all clients are affected the same way, so it's not DHCP.

3) I don't have any STA-DISASSOC-REASON in the app logs. When I download "Debug logs", I only see syslog messages, same goes for viewing the logs via Unleashed UI.

Anyway, it looks like I tracked down the issue by downloading debug logs and zooming in on my clients in Log analyzer:

===============

Client Information : 3c:22:fb:a5:XX:XX


Station 3c:22:fb:a5:XX:XX AID 69 Listen Interval 10 Ref Cnt=1, IP =10.0.51.147, IPv6 =::, SSID = <redacted>
VAP = 58:fb:96:3f:XX:XX radio 11a/n/ac name = (Null) Connect since Mon Feb 14 23:59:48 2022

Hostname = <Redacted> Dvcinfo = Mac OS
rename = , favourite = false
DHCP assigned IP = 10.0.51.147 DHCP lease time = 393 DHCP xID= 5631ed4e
Flags = Auth Assoc Authorized Added to AP Session Key installed Counted WMM MappingV4_added
VLAN = 151
Venue =
DPSK id = 0
facebook token = , wechat openid = , wechat tid =
role-id = 0, vlan_id = 0, is_deny = 0, uplink_rate = 0, downlink_rate = 0
device policy: vlan_id = 0, is_deny = 3, uplink_rate = 0, downlink_rate = 0

stats -- last update Wed Feb 16 17:15:54 2022

 

rx_pktstx_pktsrx_bytestx_byteslast_rx_pktslast_tx_pktslast_rx_byteslast_tx_bytesretriesrssitx_powertx_ratedbmnoise

73561336043466
74063027886029859457
00
00
052
135240
-44-96

 

MQ_stats Qued ovrflw enq deq reenq deact XRetries XTlimitsvoice(3):video(2):data(1):bkgnd(0):

59760599359935976000
00000000
548560603749760374972807326000
00000000


Use WPA2/RSN
WPA Pairwise Cipher = CCMP
WPA PTK state = PTK Init Done
WPA PTK Group state = Idle
Current WPA Passphrase: <redacted>
Outstanding timers:
AP timer - expires in 151390 sec 500000 usec, next state = STA Null Func

===============

What is that "AP timer" and how can I get it changed? When I calculate connected time + AP timer expiration, I get that 5000 mins interval that forces all client to disconnect. I checked it and it holds true for all clients.

Any help here will be appreciated, hope it narrows it down. 

sgg222
New Contributor

Reposting here as my previous response disappeared.

I tracked it down (via Debug log and Log analyzer) to an Outstanding "AP Timer" attached to each client. Connected time + timer expiration is 5000 min. Could somebody explain what this AP timer is and how to override it / turn it off?

Details below:

Client Information : 3c:22:fb:a5:XX:XX

Station 3c:22:fb:a5:XX:XX AID 69 Listen Interval 10 Ref Cnt=1, IP =10.0.51.147, IPv6 =::, SSID = redacted
VAP = 58:fb:96:3f:XX:XX radio 11a/n/ac name = (Null) Connect since Mon Feb 14 23:59:48 2022

Hostname = redacted Dvcinfo = Mac OS
rename = , favourite = false
DHCP assigned IP = 10.0.51.147 DHCP lease time = 393 DHCP xID= 5631ed4e
Flags = Auth Assoc Authorized Added to AP Session Key installed Counted WMM MappingV4_added
VLAN = 151
Venue =
DPSK id = 0
facebook token = , wechat openid = , wechat tid =
role-id = 0, vlan_id = 0, is_deny = 0, uplink_rate = 0, downlink_rate = 0
device policy: vlan_id = 0, is_deny = 3, uplink_rate = 0, downlink_rate = 0
stats -- last update Wed Feb 16 17:15:54 2022

Use WPA2/RSN
WPA Pairwise Cipher = CCMP
WPA PTK state = PTK Init Done
WPA PTK Group state = Idle
Current WPA Passphrase: redacted
Outstanding timers:
AP timer - expires in 151390 sec 500000 usec, next state = STA Null Func

@syamantakomer maybe?