User Guide
Table Of Contents
- Cisco Wireless ISR and HWIC Access Point Configuration Guide
- Contents
- Preface
- Overview
- Configuring Radio Settings
- Enabling the Radio Interface
- Roles in Radio Network
- Configuring Network or Fallback Role
- Universal Client Mode
- Configuring Universal Client Mode
- Configuring Radio Data Rates
- Configuring Radio Transmit Power
- Configuring Radio Channel Settings
- Enabling and Disabling World Mode
- Enabling and Disabling Short Radio Preambles
- Configuring Transmit and Receive Antennas
- Disabling and Enabling Access Point Extensions
- Configuring the Ethernet Encapsulation Transformation Method
- Enabling and Disabling Reliable Multicast to Workgroup Bridges
- Enabling and Disabling Public Secure Packet Forwarding
- Configuring Beacon Period and DTIM
- Configuring RTS Threshold and Retries
- Configuring Maximum Data Retries
- Configuring Fragmentation Threshold
- Enabling Short Slot Time for 802.11g Radios
- Performing a Carrier Busy Test
- Configuring Multiple SSIDs
- Configuring an Access Point as a Local Authenticator
- Understand Local Authentication
- Configure a Local Authenticator
- Guidelines for Local Authenticators
- Configuration Overview
- Configuring the Local Authenticator Access Point
- Configuring Other Access Points to Use the Local Authenticator
- Configuring EAP-FAST Settings
- Limiting the Local Authenticator to One Authentication Type
- Unblocking Locked Usernames
- Viewing Local Authenticator Statistics
- Using Debug Messages
- Configuring Encryption Types
- Configuring Authentication Types
- Configuring RADIUS Servers
- Configuring and Enabling RADIUS
- Understanding RADIUS
- RADIUS Operation
- Configuring RADIUS
- Default RADIUS Configuration
- Identifying the RADIUS Server Host
- Configuring RADIUS Login Authentication
- Defining AAA Server Groups
- Configuring RADIUS Authorization for User Privileged Access and Network Services
- Starting RADIUS Accounting
- Selecting the CSID Format
- Configuring Settings for All RADIUS Servers
- Configuring the Access Point to Use Vendor-Specific RADIUS Attributes
- Configuring the Access Point for Vendor-Proprietary RADIUS Server Communication
- Configuring WISPr RADIUS Attributes
- Displaying the RADIUS Configuration
- RADIUS Attributes Sent by the Access Point
- Configuring and Enabling RADIUS
- Configuring VLANs
- Configuring QoS
- Channel Settings
- Protocol Filters
- Supported MIBs
- Error and Event Messages
- Glossary
- Index
D-10
Cisco Wireless ISR and HWIC Access Point Configuration Guide
OL-6415-04
Appendix D Error and Event Messages
802.11 Subsystem Messages
Error Message DOT11-4-BRIDGE_LOOP: Bridge loop detected between WGB [mac-address]
and device [mac-address]
Explanation The indicated workgroup bridge reported the address of one of its indicated Ethernet
clients and the access point already had that address marked as being somewhere else on the
network.
Recommended Action Click Refresh on the Associations page on the access point GUI, or enter the
clear dot11 statistics command on the CLI.
Error Message DOT11-4-ANTENNA_INVALID: Interface [interface], current antenna
position not supported, radio disabled
Explanation The Indicated AIR-RM21A radio module does not support the high-gain position for the
external antenna (the high-gain position is folded flat against the access point). The access point
automatically disables the radio when the antenna is in the high-gain position.
Recommended Action Fold the antenna on the AIR-RM21A radio module so that it is oriented 90
degrees to the body of the access point.
Error Message DOT11-3-RF_LOOPBACK_FAILURE: Interface [interface] Radio failed to
pass RF loopback test
Explanation Radio loopback test failed for the interface indicated.
Recommended Action None.
Error Message DOT11-3-RF_LOOPBACK__FREQ_FAILURE: Interface [interface] failed to
pass RF loopback test
Explanation Radio loopback test failed at a given frequency for the indicated interface.
Recommended Action None.
Error Message DOT11-7-AUTH_FAILED: Station [mac-address] Authentication failed
Explanation The indicated station failed authentication.
Recommended Action Ve ri fy th at th e u se r e nt er ed th e cor re ct username and password, and verify that
the authentication server is online.
Error Message DOT11-4-TKIP_MIC_FAILURE: Received TKIP Michael MIC failure report
from the station [mac-address] on the packet (TSC=0x%11x) encrypted and protected
by [key] key.”
Explanation TKIP Michael MIC failure was detected from the indicated station on a unicast frame
decrypted locally with the indicated pairwise key.
Recommended Action A failure of the Michael MIC in a packet usually indicates an active attack on
your network. Search for and remove potential rogue devices from your wireless LAN.










