...
2800 3800 Access points randomly going into a state that stops responding dot11 association frames to wireless clients impacting the connectivity. Wireless clients are unable to connect to the network. It is found that AP does not respond the 802.11 AUTHENTICATION frames. AP traces in a failed state show something like this: Nov 8 21:28:29 kernel: [*11/08/2018 21:28:29.1457] CLSM[xx:xx:xx:xx:xx:xx]: Driver send mgmt frame success Radio 1 Vap 0 Nov 8 21:28:29 kernel: [*11/08/2018 21:28:29.8163] [1541712509:816295] [CA80-WAP2] [xx:xx:xx:xx:xx:xx] [U:W] DOT11_AUTHENTICATION : Retry 0 PwrM 0 Seq 3760 (.) Nov 8 21:28:29 kernel: [*11/08/2018 21:28:29.8168] CLSM[xx:xx:xx:xx:xx:xx]: US Auth(b0) seq 3760 IF 27 slot 1 vap 0 len 30 state NULL Nov 8 21:28:29 kernel: [*11/08/2018 21:28:29.8169] CLSM[xx:xx:xx:xx:xx:xx]: DS Auth len 30 slot 1 vap 0 Nov 8 21:28:29 kernel: [*11/08/2018 21:28:29.8169] CLSM[xx:xx:xx:xx:xx:xx]: Skip forwarding downstream Auth(b0) to client Nov 8 21:28:29 kernel: [*11/08/2018 21:28:29.8169] CLSM[xx:xx:xx:xx:xx:xx]: Driver send mgmt frame success Radio 1 Vap 0 Nov 8 21:28:30 kernel: [*11/08/2018 21:28:30.3183] [1541712510:318312] [CA80-WAP2] [xx:xx:xx:xx:xx:xx] [U:W] DOT11_AUTHENTICATION : Retry 0 PwrM 0 Seq 3761 (.) Nov 8 21:28:30 kernel: [*11/08/2018 21:28:30.3187] CLSM[xx:xx:xx:xx:xx:xx]: US Auth(b0) seq 3761 IF 27 slot 1 vap 0 len 30 state NULL Nov 8 21:28:30 kernel: [*11/08/2018 21:28:30.3188] CLSM[xx:xx:xx:xx:xx:xx]: DS Auth len 30 slot 1 vap 0 Nov 8 21:28:30 kernel: [*11/08/2018 21:28:30.3188] CLSM[xx:xx:xx:xx:xx:xx]: Skip forwarding downstream Auth(b0) to client Nov 8 21:28:30 kernel: [*11/08/2018 21:28:30.3189] CLSM[xx:xx:xx:xx:xx:xx]: Driver send mgmt frame success Radio 1 Vap 0 Nov 8 21:28:35 kernel: [*11/08/2018 21:28:35.1178] [DEC] CAPWAP_ECHO_RESPONSE(14) seq 179 len 15 Nov 8 21:28:35 kernel: [*11/08/2018 21:28:35.1179] ..Vendor Type: AP_TIMESYNC_PAYLOAD(151) vendId 409600 The traces below show the expected packets on AP responding Authentication 17:15:13(082):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3954] [1541715312:395429] [CA80-WAP2] [xx:xx:xx:xx:xx:xx] [U:W] DOT11_AUTHENTICATION : Retry 0 PwrM 0 Seq 93 (.) 17:15:13(082):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3954] [1541715312:395472] [CA80-WAP2] [xx:xx:xx:xx:xx:xx] [D:W] DOT11_AUTHENTICATION : Retry 0 PwrM 0 Seq 1775 (.) 17:15:13(082):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3957] CLSM[xx:xx:xx:xx:xx:xx]: US Auth(b0) seq 93 IF 28 slot 1 vap 1 len 30 state NULL 17:15:13(083):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3958] CLSM[xx:xx:xx:xx:xx:xx]: DS Auth len 30 slot 1 vap 1 17:15:13(083):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3958] CLSM[xx:xx:xx:xx:xx:xx]: Skip forwarding downstream Auth(b0) to client 17:15:13(084):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3958] CLSM[xx:xx:xx:xx:xx:xx]: Driver send mgmt frame success Radio 1 Vap 1 17:15:13(084):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3966] [1541715312:396618] [CA80-WAP2] [xx:xx:xx:xx:xx:xx] [U:W] DOT11_ASSOC_REQUEST : Retry 0 PwrM 0 Seq 94 (.) 17:15:13(084):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3968] [1541715312:396847] [CA80-WAP2] [xx:xx:xx:xx:xx:xx] [D:W] DOT11_ASSOC_RESPONSE : Retry 0 PwrM 0 Seq 1775 (.) 17:15:13(084):Nov 8 22:15:12 kernel: [*11/08/2018 22:15:12.3974] CLSM[xx:xx:xx:xx:xx:xx]: US Assoc Req(0) seq 94 IF 28 slot 1 vap 1 len 307 state NULL
Seen with the following conditions: APs in FlexConnect mode SSID is local Switching - Central Authentication AP is 2800/3800/1560 series.
Disable "Central Assoc" setting on all WLANs
Access points running 8.9 and above are not susceptible to this bug. Do note that "Central Assoc" is not supported in AP-COS.