User's Manual
Security: Auth Server Improperly configured on this SSID
Installation and Configuration Guide: Airgo Access Point 255
authentication on a given SSID, but no WPA pre-shared key is setup for that SSID.
Usage: This indicates that the AP has determined that a STA is attempting to perform
WPA-PSK authentication – but no WPA Pre-shared Key has been configured on
this AP for that SSID. Recall that WPA PSK’s are configured per SSID.
Examples: For device-id AP_00-0A-F5-00-01-89 , the STA 00:0a:f5:00:05:f0 on radio 0 attempted to
do WPA-PSK based auth on the SSID NewYorkRm but no pre-shared key is set.
See Also:
Security: Auth Server Improperly configured on this SSID
Notification which indicates that the AP has determined that a STA requires authentication servers
– and these are not configured properly on this SSID.
Syntax: "For device-id %s, Auth servers are improperly configured for the SSID %s
and are needed for authenticating STA %s on radio %d with RADIUS usage
%d"
Description: This notification is sent when authentication servers are improperly configured for
a given SSID.
Usage: This indicates that the AP has determined that a STA requires authentication
servers configured –and there are none configured on this SSID Generally
authentication servers are needed for EAP based authentication, or for MAC
address based ACL lookups.
Examples: For device-id AP_00-0A-F5-00-01-89 , Auth servers are improperly configured for the
SSID NewYorkRm and are needed for authenticating STA 00:0a:f5:00:05:f0 on radio 0
with RADIUS 2
See Also:
Alarm Parameters
DeviceId The Device ID of the Airgo AP
SSID Identifies the SSID on this AP that the STA has associated with
Station MAC address of the Station.
Radio Identifies Radio by interface ID on the Access Point
RADIUS Usage A code indicating what the RADIUS server was required for: Legacy
8021.x for dynamic WEP (1), WPA EAP athentication (2), MAC
address based ACL lookup (3).
Alarm Severity
Severity Critical