Hi Don,
No TKIP enabled, I think it would be safe to give it a try and see if
the messages went away. :-)
# config wlan security tkip hold-down 0 the_wlan_ID
# show wlan the_wlan_ID
oldTkip MIC Countermeasure Hold-down Timer... 60
new Tkip MIC Countermeasure Hold-down Timer..
Concerning this error - " The AP '??' received a WPA MIC error on protocol '0'
from Station '68:a8:6d:3c:63:dc'. Counter measures have been activated and
traffic has been suspended for 60 seconds." - Whats the general take about
disabling the Client Exclusion feature in WCS? I do not have TKIP
;
> Lee Badman
>
> From: The EDUCAUSE Wireless Issues Constituent Group Listserv [
> wireless-...@listserv.educause.edu] On Behalf Of Jonn Martell [
> j...@martell.ca]
> Sent: Friday, October 22, 2010 5:16 PM
> To: WIRELESS-LAN@LISTSERV.EDUCAUSE.ED
u] On Behalf Of Jonn Martell [j...@martell.ca]
Sent: Friday, October 22, 2010 5:16 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WCS Error
Hi Chris,
MIC (message integrity check) was really a "patch" for TKIP to prevent
replay attacks. I happened to be in the I
On Behalf Of Jonn Martell
Sent: Friday, October 22, 2010 2:17 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WCS Error
Hi Chris,
MIC (message integrity check) was really a "patch" for TKIP to prevent
replay attacks. I happened to be in the IEEE TGI working group w
Hi Chris,
MIC (message integrity check) was really a "patch" for TKIP to prevent
replay attacks. I happened to be in the IEEE TGI working group when
this feature was heavily discussed. Many felt that the
countermeasures were more harmful than beneficial. I still remember
the notion passing after
Hello All,
We have been seeing a lot of MIC errors on WCS this semester, "The AP
'xx' received a WPA MIC error on protocol '0' from Station
'xx.xx.xx.xx.xx.xx'. Counter measures have been activated and traffic has
been suspended for 60 seconds".
What I have read is that this may be a problem w