AirCheck Wi-Fi Tester
Users Manual
106
Authentication failed
The access control list and MAC filter on the access point rejected the
MAC of the tester.
The access point uses WEP security, and the low-level 802.11
authentication (open/shared) that the tester uses is different from the
type of authentication that the access point uses.
802.11: Received de-authentication packet
When this follows the message 802.1X: Sending EAP 4-way key with
client nonce and info elements, it is frequently caused by an incorrect pre-
shared key (passphrase).
Connect: Fail expected during automatic PAC
provision (phase 0)
The tester always shows this message when it uses EAP-FAST
authentication to try to connect to an access point. Multiple phases are
necessary for an EAP-FAST connection, and there is usually a failure
during the initial phase.
802.1X: Received EAP fail
•
When this follows the message 802.1X TLS: Sending client key
exchange, it is frequently caused by an incorrect client certificate.
•
When this follows the message 802.1X EAP-MSCHAPv2: Responding to
challenge, it is frequently caused by an incorrect user name or
password.
•
When this follows the message 802.1X: NAK, it frequently occurs
because the RADIUS server does not support the EAP type.
Message Possible Reasons for the Connection Failure