Solved

How do I enable an excluded client on Cisco 4400 Wireless LAN Controller

Posted on 2010-08-27
3
7,007 Views
Last Modified: 2013-12-09
I am adding a Cisco WET200 bridge to an existing wireless network.  The network is managed by a Cisco 4400 controller and I have enabled bridging.  I had this working, in my office, but when I moved the WET200 out to the plant it changed AP's and now the controller has it tagged as 'excluded'.  Here's the message:

Reason:Attempted to use IP Address assigned to another device. ReasonCode: 3

It's not a IP conflict, so how do I get the controller to move past this?
0
Comment
Question by:swolfghu
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
naykam earned 500 total points
ID: 33553101
ooo 4404 - a problem child.

Are you using the WCS? Run a search by the device's mac address, and the proposed IP address. Ensure there is no conflicts.

Then you can always Check out > Configure > Controllers > Security > Wireless Protection policies & manually disabled clients.

Before jumping, I would also suggest trying a different IP address on the bridge (you never know)

I did some extensive testing with some wireless bridges on a 4404 network, and guess what - none worked. I tried everything from $20 ebay bridges through to $700 3comm/motorolla gear and all proved to not work. After speaking with Cisco TAC, I spend about 3 days on the phone and slowly increasing rungs of the support ladder, untill their final response was, and I quote " Sorry but, the 4404 obviously wasn't designed to work with wireless bridges" case closed. ... Strangely enough, I did hear rumours that the latest firmware supports them?
(http://blog.naykam.com/2010/03/cisco-wlc-4404-wireless-bridge-problems.html)

0
 
LVL 12

Expert Comment

by:naykam
ID: 33653449
Any response?
0
 

Author Comment

by:swolfghu
ID: 33690614
I got it working.  I had to disable the "IP Theft or IP Reuse" option in the Client Exclusion Policies.  I'm not too happy about having to essentially reduce my security level to get two Cisco products to work with each other, but it is what it is.
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now