Thanks!
From 'Show Log' on switch to which WLC is connected:
Nov 4 12:34:58.049: %C4K_L2MAN-6-INVALIDSOURCEADDRESSPACKET:
(Suppressed 2 times)Packet received with invalid source MAC address
(3B:95:45:6B:00:1E) on port Gi1/1 in vlan 1
Traps:
Decrypt errors occurred for client 00:13:e8:81:1a:a1 using WPA key on
802.11b/g interface of AP 00:1d:71:e2:a6:40
Radar signals have been detected on channel 116 by 802.11a radio with
MAC: 00:1d:71:e2:a6:40 and slot 1
Channel changed for Base Radio MAC: 00:21:d8:92:7e:e0 on 802.11b/g
radio. Old Channel: 1. New Channel: 11. Why: Interference. Energy
before/after change: -54/-82. Noise before/after change: -82/-82.
Interference before/after change: -54/-118
IDS Signature attack detected. Signature Type: Standard, Name: NULL
probe resp 1, Description: NULL Probe Response - Zero length SSID
element, Track: per-Mac, Detecting AP Name: 12-c11-ap8M, Radio Type:
802.11b/g, Preced: 2, Hits: 1, Channel: 11, srcMac: 00:17:FA:04:2D:CD
"pfisterfarm" <pfist...@gmail.com> wrote in message
news:3bbec849-d81b-4e60...@40g2000prx.googlegroups.com...
Was the multicast packet coming from the WLC or going to it? Any way
to tell what that packet might have been from?
Thanks!
"pfisterfarm" <pfist...@gmail.com> wrote in message
news:8e1ddf9c-89bb-42c9...@s1g2000prg.googlegroups.com...
Sounds good... how about the IDS signature attack message? I can't
find too much in searching for that... what might that be?
Thanks!