User's Manual

Security: AP Detected Bad TKIP MIC
Installation and Configuration Guide: Airgo Access Point 265
Description: Notification which is generated when a “Guest Station” fails authentication.
Usage: This indicates that a Guest Station did not present the appropriate “credentials”
(currently simple password) upon request.
Examples: For device-id AP_00-0A-F5-00-01-89 , Guest authentication failed for STA
00:0a:f5:00:05:f0 on radio 0 with SSID NewYorkRoom using captive portal Internal and
guest mode 4 due to 0
See Also: Security: Guest Authentication Succeeded
Security: AP Detected Bad TKIP MIC
Notification which indicates that the AP has detected a BAD TKIP MIC value in an incoming
frame encrypted with the pairwise/uniast key.
Syntax: "For device-id %s, a bad TKIP MIC was detected on an incoming unicast
packet from STA %s on radio %d"
Description: This notification is generated when a bad TKIP MIC is detected on an incoming
frame from a STA that is ecrypted with the pairwise/unicast key.
Usage: This indicates that the AP has detected an invalid TKIP MIC value on an incoming
Station MAC address of the Guest STAtion.
Radio Identifies Radio by interface ID on the Access Point
SSID Identifies the SSID on this AP that the Guest has associated with.
Captive Portal Identifies the “Landing Page” that has accomplished authentication of
the Guest STA. This is either simply the Internal “Landing Page”, or
a URL identifying the “External Landing Page” which performed the
authentication.
Guest Mode Currently, always set to 4.
Reason code Currently, always set to 0.
Alarm Severity
Severity Critical
Alarm Parameters
DeviceId The Device ID of the Airgo AP
Station MAC address of the Station.
Radio Identifies Radio by interface ID on the Access Point
Alarm Severity
Severity Critical