Thank Yo fro attaching the snapshot but as i see for the snapshot there is a few errors from the logs : we see
MP Nov 11 10:48:06.275830 ERROR AP 8 radio: Handle TKIP MIC Error
MP Nov 11 09:57:38.540241 ERROR AP 4 radio: Handle TKIP MIC Error
MP Nov 11 09:52:29.910178 ERROR AP 8 radio: Handle TKIP MIC Error
MP Nov 10 12:00:34.566131 ERROR AP 4 radio: Handle TKIP MIC Error
MP Nov 10 11:45:50.023430 ERROR AP 8 radio: Handle TKIP MIC Error
If the recalculated MIC does not match the MIC received with the frame, the frame fails the integrity check. This condition is called a MIC failure. The access point or client discards the frame and also starts a 60-second timer.
If another MIC failure does not occur within 60 seconds, the timer expires.
However, if another MIC failure occurs before the timer expires, the
device takes the following actions:
? An MP that receives another frame with an invalid MIC ends sessions with all TKIP and
WEP clients by disassociating from the clients. This includes both WPA WEP clients and
non-WPA WEP clients. The access point also temporarily shuts down the network by refusing
all association or reassociation requests from TKIP and WEP clients. In addition, MSS
generates an SNMP trap that indicates the MX port and radio that received frames with the
two MIC failures as well as the source and destination MAC addresses in the frames.
? A client that receives another frame with an invalid MIC disassociates from the MP and does
not send or accept any frames encrypted with TKIP or WEP.
to avoid this please issue the following commands :
set service-profile rede_interna tkip-mc-time 0
set service-profile rede_guest tkip-mc-time 0
This should ideally resolved client disconnect issue