Fluke AIRCHECK User Manual page 114

Wi-fi tester
Hide thumbs Also See for AIRCHECK:
Table of Contents

Advertisement

AirCheck Wi-Fi Tester
Users Manual
Message
Authentication failed
802.11: Received de-authentication packet
Connect: Fail expected during automatic PAC
provision (phase 0)
802.1X: Received EAP fail
106
Possible Reasons for the Connection Failure
The access control list and MAC filter on the access point rejected the
MAC of the tester.
The access point uses WEP security, and the low-level 802.11
authentication (open/shared) that the tester uses is different from the
type of authentication that the access point uses.
When this follows the message 802.1X: Sending EAP 4-way key with
client nonce and info elements, it is frequently caused by an incorrect pre-
shared key (passphrase).
The tester always shows this message when it uses EAP-FAST
authentication to try to connect to an access point. Multiple phases are
necessary for an EAP-FAST connection, and there is usually a failure
during the initial phase.
When this follows the message 802.1X TLS: Sending client key
exchange, it is frequently caused by an incorrect client certificate.
When this follows the message 802.1X EAP-MSCHAPv2: Responding to
challenge, it is frequently caused by an incorrect user name or
password.
When this follows the message 802.1X: NAK, it frequently occurs
because the RADIUS server does not support the EAP type.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents