Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

[ScreenOS] Understanding different messages in the 'debug wlan all' wireless output

0

0

Article ID: KB22147 KB Last Updated: 12 Dec 2011Version: 1.0
Summary:
This article provides information on how to understand different messages in the 'debug wlan all'  wireless output.
Symptoms:
How messages should look like, when a wireless issue is being investigated. The configuration is as follows:
set interface "wireless0/0" zone "Trust"
set interface wireless0/0 ip 192.168.2.1/24
set interface wireless0/0 nat
set interface wireless0/0 dhcp server service
set interface wireless0/0 dhcp server auto
set interface wireless0/0 dhcp server option gateway 192.168.2.1
set interface wireless0/0 dhcp server option netmask 255.255.255.0
set interface wireless0/0 dhcp server ip 192.168.2.33 to 192.168.2.126

set wlan country-code IN
set wlan 0 channel auto
set wlan 1 channel auto
set ssid name juniper
set ssid juniper key-id 1 length 40 method asciitext x5EoaplkN4XDFfsQ5QChMSnWH8ncj7PaOA== default
set ssid juniper authentication open encryption wep
Cause:

Solution:

Explanation of different messages:
AP:received a wireless manage packet, size 120
Sub-type: Probe request, Seq-Ctl: 0x6044
DA: ffffffffffff, SA: b407f91d6b40, BSSID: ffffffffffff
---destination-address and BSSID are unknown
40 00 00 00 ff ff ff ff ff ff b4 07 f9 1d 6b 40
ff ff ff ff ff ff 60 44 00 07 6a 75 6e 69 70 65
72 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60
6c 2d 1a 2c 18 1b ff 00 00 00 00 00 00 00 00 00

AP:sent a wireless manage packet, size 79
Sub-type: Probe response, Seq-Ctl: 0x0
DA: b407f91d6b40, SA: 0014f6e8eae0, BSSID: 0014f6e8eae0
-----Reply from the access-point
50 00 00 00 b4 07 f9 1d 6b 40 00 14 f6 e8 ea e0
00 14 f6 e8 ea e0 00 00 c5 b7 2c 16 00 00 00 00
64 00 21 04 00 07 6a 75 6e 69 70 65 72 01 08 82
84 8b 96 0c 18 30 48 03 01 0b 07 06 49 4e 20 01

## 2011-09-17 03:25:08 : msg_recv()-slot 0 msg received(len=0x10,seq=0x13a).
Received a message,type is 39,len is 16
## 2011-09-17 03:25:08 : msg_recv()-slot 0 msg received(len=0x4f,seq=0x13b).
Received a message,type is 64,len is 79
Station b407f91d6b40 Open authentication passed, SSID: juniper---authentication passed
Receive a packet from wireless0/0, size 358
03c348c6: ff ff ff ff ff ff b4 07 f9 1d 6b 40 08 00 45 00 ........ ..k@..E.
03c348d6: 01 58 1e 63 00 00 40 11 5b 33 00 00 00 00 ff ff .X.c..@. [3......
03c348e6: ff ff 00 44 00 43 01 44 fd 95 01 01 06 00 98 3f ...D.C.D .......?
03c348f6: 59 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Y....... ........
Call ethernet driver to free handled packet
## 2011-09-17 03:25:08 : DHCP: got packet from if <wireless0/0>.
## 2011-09-17 03:25:08 : DHCP: Received DHCPREQUEST from MAC b407f91d6b40 on wireless0/0: request IP 192.168.2.33
## 2011-09-17 03:25:08 : DHCP: Commited IP 192.168.2.33 on interface wireless0/0
## 2011-09-17 03:25:08 : DHCP: HA (v2) send (commit): (wireless0/0) 192.168.2.33 b407f91d6b40 4320
## 2011-09-17 03:25:08 : DHCP: send_dhcp_pak enter src_ip: 0xc0a80201, dst_ip: 0xffffffff
## 2011-09-17 03:25:08 : DHCP: packet send to outif <wireless0/0>.
## 2011-09-17 03:25:08 : DHCP: wireless0/0 Sent DHCPACK to MAC b407f91d6b40: yiaddr 192.168.2.33

Procedure when connecting to a wireless access point:

  1. Station sends Probe-Requests on each channel to advertise its capability (e.g. supported rate) and announce the SSID it is seeking (especially needed, if the SSID has been suppressed at the AP).

  2. AP answers Probe-Response with the the same info in Beacon (timestamp, beacon interval, and capability information). AP should respond immediately, as the station will not listen for long. A stations will only wait for a response around 20ms on the current channel and then repeats the process on the next channel.

  3. 802.11 authentications is a process whereby the access point either accepts or rejects the identity of a radio NIC. The NIC begins the process by sending an authentication frame, containing its identity to the access point. With open system authentication (default), the radio NIC sends only one authentication frame and the access point responds with an authentication frame as a response indicating acceptance (or rejection).

    With the optional shared key authentication, the radio NIC sends an initial authentication frame and the access point responds with an authentication frame containing the challenge text. After authentication, it is connected to the access-point.

  4. The DHCP Module is triggered and an IP address is assigned to the wireless user.
Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search