Shumon,

We used to have the same problem when we had the Aironet solution a couple of years back. It was actually due to the APs sending a re-association packet/frame to the device, even if that device was directly underneath the AP. What type of platform are you currently running your infrastructure on? How dense is your environment? Do you have dynamic channel/power assignment or are you doing it statically? Then we had a similar problem, when we deployed to the Airespace solution, which was due to 2 bugs; one on the controller and another on the router. Those are things you might want to look at a little bit.

Although the authentication mechanism is what is being impacted, it does not seem to be the source of your problem, for the simple fact that people are authenticating. Have you sniffed the air? You could try running some tests by leaving a device connected and monitoring it and what type of traffic it is receiving. Look to see what is happening with the device when it is disconnecting. Check to see if it is happening at random intervals, or the intervals are more periodic. Whatever you do, do not ignore it because there are no complaints. I am sure that are many of us here in the group whom in ignoring small problems have gotten burnt.

Let us know how it works out.

Thanks.

Jorge

Shumon Huque wrote:
We rolled out a WPA/802.1x authenticated WLAN to our student
residences this semester. We're using EAP-TTLS with PAP as the inner authentication protocol. The EAP servers are a set of centralized RADIUS servers that perform Kerberos5 password verification to our KDCs in the backend.

We've noticed several problems that we didn't observe when we had it running on a much smaller scale in our own offices.
A large number of users seem to be repeatedly authenticating,
some of them as frequently as every 30 seconds or every few
minutes. Some debugging revealed that these users are frequently
oscillating their associations between a number of different
access points. A smaller number of users keep reassociating with
the same access point. This is causing a very large load on the
authentication server infrastructure, which we've temporarily
worked around by load balancing the APs across additional RADIUS servers. However, we're also assuming that this is causing lots of user visible performance problems due to roaming latency (scan, reassociate, authenticate, 802.11i handshake, DHCP address acquisition etc). Surprisingly, not many users have complained. Perhaps they are only browsing the web or using other non- interactive apps which can tolerate delay. Or they might simultaneously have a wired ethernet connection.

Is frequent reassociation the normal behavior in a dense
deployment of APs? I can understand that it might be for
highly mobile stations like wireless VoIP phones. But our environment is composed of mostly stationary wireless laptops in student rooms. My assumption was that roaming typically happened when a user moves towards a stronger signal AP and at some configured signal quality threshold, the station started
scanning for a better AP. Am I wrong?

Or is this more likely something in our radio environment or
insufficient coverage etc? Our wireless LAN engineers are
currently investigating this, but I'd be interested to hear
the experience of others.

Do we need a fast roaming solution to deal with this? Having
access points and stations able to cache the PMK (Pairwise
Master Key) would probably help the best, as that would allow
them to often establish a secure association without conducting a heavyweight authentication dialog with the RADIUS server. But I'm not sure if access points or typical endstations support this. TLS session resumption will probably help a bit also (if supported).
We use cisco aironet 1200/1100 access points. The clients are
mostly PCs running SecureW2, Macs running with the built-in
EAP-TTLS/802.1x support in Mac OS X, and a smaller number of
Linux machines.

Thanks for any advice!
---
Shumon Huque                            3401 Walnut Street, Suite 221A,
Network Engineering                     Philadelphia, PA 19104-6228, USA.
Information Systems & Computing             (215)898-2477, (215)898-9348 (Fax)
University of Pennsylvania / MAGPI.     E-mail: shuque -at- isc.upenn.edu

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.




--------------------

This electronic message is intended to be for the use only of the named 
recipient, and may contain information that is confidential or privileged.  If 
you are not the intended recipient, you are hereby notified that any 
disclosure, copying, distribution or use of the contents of this message is 
strictly prohibited.  If you have received this message in error or are not the 
named recipient, please notify us immediately by contacting the sender at the 
electronic mail address noted above, and delete and destroy all copies of this 
message.  Thank you.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to