Es geht um einen 1302acn mit LCOS 10.34.0308 und einen LW600 mit LCOS-LX 6.12.0024Rel die von einem WLC auf einem vRouter mit LCOS 10.80.0155Rel verwaltet werden.
Auf dem WLC ist ein logisches WLAN-Netzwerk mit WPA3 802.11i(WPA)-802.1x und Fast-Roaming eingerichtet welches den beiden APs zugewiesen wird.
Der 1302acn sendet in den Beacons dieser SSID folgendes:
Code: Alles auswählen
Tag: RSN Information
Tag Number: RSN Information (48)
Tag length: 20
RSN Version: 1
Group Cipher Suite: 00:0f:ac (Ieee 802.11) AES (CCM)
Group Cipher Suite OUI: 00:0f:ac (Ieee 802.11)
Group Cipher Suite type: AES (CCM) (4)
Pairwise Cipher Suite Count: 1
Pairwise Cipher Suite List 00:0f:ac (Ieee 802.11) AES (CCM)
Pairwise Cipher Suite: 00:0f:ac (Ieee 802.11) AES (CCM)
Pairwise Cipher Suite OUI: 00:0f:ac (Ieee 802.11)
Pairwise Cipher Suite type: AES (CCM) (4)
Auth Key Management (AKM) Suite Count: 1
Auth Key Management (AKM) List 00:0f:ac (Ieee 802.11) FT over IEEE 802.1X
Auth Key Management (AKM) Suite: 00:0f:ac (Ieee 802.11) FT over IEEE 802.1X
Auth Key Management (AKM) OUI: 00:0f:ac (Ieee 802.11)
Auth Key Management (AKM) type: FT over IEEE 802.1X (3)
RSN Capabilities: 0x00fc
.... .... .... ...0 = RSN Pre-Auth capabilities: Transmitter does not support pre-authentication
.... .... .... ..0. = RSN No Pairwise capabilities: Transmitter can support WEP default key 0 simultaneously with Pairwise key
.... .... .... 11.. = RSN PTKSA Replay Counter capabilities: 16 replay counters per PTKSA/GTKSA/STAKeySA (0x3)
.... .... ..11 .... = RSN GTKSA Replay Counter capabilities: 16 replay counters per PTKSA/GTKSA/STAKeySA (0x3)
.... .... .1.. .... = Management Frame Protection Required: True
.... .... 1... .... = Management Frame Protection Capable: True
.... ...0 .... .... = Joint Multi-band RSNA: False
.... ..0. .... .... = PeerKey Enabled: False
..0. .... .... .... = Extended Key ID for Individually Addressed Frames: Not supported
Tag: Mobility Domain
Tag Number: Mobility Domain (54)
Tag length: 3
Mobility Domain Identifier: 0xf797
FT Capability and Policy: 0x00
.... ...0 = Fast BSS Transition over DS: 0x0
.... ..0. = Resource Request Protocol Capability: 0x0
0000 00.. = Reserved: 0x00
Code: Alles auswählen
Tag: RSN Information
Tag Number: RSN Information (48)
Tag length: 20
RSN Version: 1
Group Cipher Suite: 00:0f:ac (Ieee 802.11) AES (CCM)
Group Cipher Suite OUI: 00:0f:ac (Ieee 802.11)
Group Cipher Suite type: AES (CCM) (4)
Pairwise Cipher Suite Count: 1
Pairwise Cipher Suite List 00:0f:ac (Ieee 802.11) AES (CCM)
Pairwise Cipher Suite: 00:0f:ac (Ieee 802.11) AES (CCM)
Pairwise Cipher Suite OUI: 00:0f:ac (Ieee 802.11)
Pairwise Cipher Suite type: AES (CCM) (4)
Auth Key Management (AKM) Suite Count: 1
Auth Key Management (AKM) List 00:0f:ac (Ieee 802.11) FT over IEEE 802.1X
Auth Key Management (AKM) Suite: 00:0f:ac (Ieee 802.11) FT over IEEE 802.1X
Auth Key Management (AKM) OUI: 00:0f:ac (Ieee 802.11)
Auth Key Management (AKM) type: FT over IEEE 802.1X (3)
RSN Capabilities: 0x00fc
.... .... .... ...0 = RSN Pre-Auth capabilities: Transmitter does not support pre-authentication
.... .... .... ..0. = RSN No Pairwise capabilities: Transmitter can support WEP default key 0 simultaneously with Pairwise key
.... .... .... 11.. = RSN PTKSA Replay Counter capabilities: 16 replay counters per PTKSA/GTKSA/STAKeySA (0x3)
.... .... ..11 .... = RSN GTKSA Replay Counter capabilities: 16 replay counters per PTKSA/GTKSA/STAKeySA (0x3)
.... .... .1.. .... = Management Frame Protection Required: True
.... .... 1... .... = Management Frame Protection Capable: True
.... ...0 .... .... = Joint Multi-band RSNA: False
.... ..0. .... .... = PeerKey Enabled: False
..0. .... .... .... = Extended Key ID for Individually Addressed Frames: Not supported
Tag: Mobility Domain
Tag Number: Mobility Domain (54)
Tag length: 3
Mobility Domain Identifier: 0x97f7
FT Capability and Policy: 0x00
.... ...0 = Fast BSS Transition over DS: 0x0
.... ..0. = Resource Request Protocol Capability: 0x0
0000 00.. = Reserved: 0x00

Hier sind offensichtlich die Bytes vertauscht.
Kann sich das jemand erklären

Im Log des 1302acn sieht das Roaming für einen Client der definitiv FT unterstützt so aus:
Code: Alles auswählen
ls Status/WLAN/Log-Table/
Index Time Interface Event Address Reason
======-----------------------------------------------------------------------------------------------------------------------------------------------------
1052 10/23/2023 10:37:28 WLAN-2 Determined IPv4 address for station <client-MAC-addr> <client-MAC-addr> <client-IP4-addr>
1051 10/23/2023 10:37:28 WLAN-2 Determined IPv6 address for station <client-MAC-addr> <client-MAC-addr> <client-IP6-addr>
1050 10/23/2023 10:37:28 WLAN-2 Completed handover for WLAN station <client-MAC-addr> <client-MAC-addr> (old BSSID is <LCOS-MAC-addr>)
1049 10/23/2023 10:37:28 WLAN-2 Connected WLAN station <client-MAC-addr> <client-MAC-addr>
1048 10/23/2023 10:37:28 WLAN-2 Key handshake with peer <client-MAC-addr> successfully completed <client-MAC-addr>
1047 10/23/2023 10:37:28 WLAN-2 WLAN station <client-MAC-addr> authenticated via 802.1X <client-MAC-addr> user name is <cert-subject>
1046 10/23/2023 10:37:27 WLAN-2 Associated WLAN station <client-MAC-addr> <client-MAC-addr>
1045 10/23/2023 10:37:27 WLAN-2 Authenticated WLAN station <client-MAC-addr> <client-MAC-addr>
1044 10/23/2023 10:36:22 WLAN-2 WLAN station <client-MAC-addr> roamed away <client-MAC-addr> (new BSSID is <LCOS-LX-MAC-addr>)
1043 10/23/2023 10:33:51 WLAN-2 Determined IPv4 address for station <client-MAC-addr> <client-MAC-addr> <client-IP4-addr>
1042 10/23/2023 10:33:51 WLAN-2 Determined IPv6 address for station <client-MAC-addr> <client-MAC-addr> <client-IP6-addr>
1041 10/23/2023 10:33:51 WLAN-2 Completed handover for WLAN station <client-MAC-addr> <client-MAC-addr> (old BSSID is <LCOS-MAC-addr>)
1040 10/23/2023 10:33:51 WLAN-2 Connected WLAN station <client-MAC-addr> <client-MAC-addr>
1039 10/23/2023 10:33:51 WLAN-2 Key handshake with peer <client-MAC-addr> successfully completed <client-MAC-addr>
1038 10/23/2023 10:33:51 WLAN-2 WLAN station <client-MAC-addr> authenticated via 802.1X <client-MAC-addr> user name is <cert-subject>
1037 10/23/2023 10:33:50 WLAN-2 Associated WLAN station <client-MAC-addr> <client-MAC-addr>
1036 10/23/2023 10:33:50 WLAN-2 Authenticated WLAN station <client-MAC-addr> <client-MAC-addr>