Constant errors on Cisco 1100 Access Point

Posted on 2007-08-07
Last Modified: 2013-11-09
In one of our doctors offices, where we have 3 wireless laptops we're contantly having issues in the morning as the doctors arrive. The access point will begin generating errors: Received TKIP Michael MIC failure report from the station 000f.8f42.361a on the packet (TSC=0x0) encrypted and protected by pairwise key.

This basically locks the entire access point down and no one can connect until we reboot the access point. We've replaced the WAP twice already, also replaced the switch. Same errors. Each laptop is a different make/model. My config is below.

AP#show run          
Building configuration...                        

Current configuration : 1584 bytes                                  
version 12.2            
no service pad              
service timestamps debug datetime msec                                      
service timestamps log datetime msec                                    
service password-encryption                          
hostname AP          
enable secret 5 $1$BPOm$WrMuXaCXaVXicL57gOgMP.                                              
username Cisco privilege 15 password 7 123A0C041104                                                  
ip subnet-zero              
bridge irb          
interface Dot11Radio0                    
 no ip address              
 no ip route-cache                  
 encryption mod              
 broadcast-key change 600                        
 ssid PRL        
    authentication open                      
    authentication key-management wpa                                    
    wpa-psk ascii 7 1427202725300E78140901010F4029222A3262710B71073D3759                                                                        
 speed basic-1.0 basic-2.0 basic-5.5 basic-11.0                                              
 rts threshold 2312                  
 channel 2437            
 station-role root                  
 no dot11 extension aironet                          
 bridge-group 1              
 bridge-group 1 subscriber-loop-control                                      
 bridge-group 1 block-unknown-source                                    
 no bridge-group 1 source-learning                                  
 no bridge-group 1 unicast-flooding                                  
 bridge-group 1 spanning-disabl                              
interface FastEthernet0                      
 no ip address              
 no ip route-cache                  
 duplex auto            
 speed auto          
 bridge-group 1              
 no bridge-group 1 source-learning                                  
 bridge-group 1 spanning-disabled                                
interface BVI1              
 ip address
 no ip route-cache
ip default-gateway
ip http server
ip http help-path
snmp-server view dot11view ieee802dot11 included
snmp-server community public view dot11view RO
snmp-server community prlit1488 view prlit1488 RO
snmp-server chassis-id BvilleWAP
snmp-server enable traps tty
bridge 1 route ip
line con 0
line vty 0 4
 login local
line vty 5 15
Question by:prlit
    LVL 17

    Accepted Solution

    One of the laptops is not configured properly or has a poorly written driver. Upgrade the wireless NIC driver and recreate the connection. You could turn the wireless access on each of the laptops and test one at a time turning them on until you find the culprit/s that are causing the problem. You may also want to upgrade to 12.2.15 IOS on the access point if you haven't already.
    LVL 1

    Author Comment

    Since we bought these through CDW - how do I go about finding the newer IOS? Cisco's website seems to be totally locked down?
    LVL 17

    Expert Comment

    Find out what the warranty was that you got with them and create an account on Cisco's website using the serial number. If it's under warranty, then you should have access to download the software if they are new. I think the warranty is 30 to 90 days or something like that.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    This article is split into background info to start and actual review at bottom: Some time ago I wanted to sell a system with both wired and wireless capability but at minimum expense.  Having visited my trusted online auction I was pleasantly su…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now