Logging display requested on 2024/01/29 15:22:20 (GMT) for Hostname: [MY681-WLC001], Model: [C9800-L-F-K9 ], Version: [17.11.01], SN: [FOC26113RBT], MD_SN: [FCL261100L0] 2024/01/29 15:20:29.316535275 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 map external to internal ie type. Unsupported IE received, skip decode . IE Type :199 2024/01/29 15:20:29.316536895 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(4) received 2024/01/29 15:20:29.316537783 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(2) received 2024/01/29 15:20:29.316714755 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Association received. BSSID 34b8.8369.e68e, WLAN Al Mirqab, Slot 1 AP 34b8.8369.e680, WAP-115, Site tag 681-site, Policy tag default-policy-tag, Policy profile ALMIRQAB, Switching Central 2024/01/29 15:20:29.316772241 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received Dot11 association request. Processing started,SSID: Al Mirqab, Policy profile: ALMIRQAB, AP Name: WAP-115, Ap Mac Address: 34b8.8369.e680BSSID MAC0000.0000.0000wlan ID: 5RSSI: -36, SNR: 35 2024/01/29 15:20:29.316903595 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_INIT -> S_CO_ASSOCIATING 2024/01/29 15:20:29.317093065 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2 2024/01/29 15:20:29.317096241 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f WiFi direct: Dot11 validate P2P IE. P2P IE not present. 2024/01/29 15:20:29.317282239 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_INIT -> S_DOT11_MAB_PENDING 2024/01/29 15:20:29.317317178 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_ASSOCIATING -> S_CO_MACAUTH_IN_PROGRESS 2024/01/29 15:20:29.317351830 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f MAB Authentication initiated. Policy VLAN 0, AAA override = 1, NAC = 1 2024/01/29 15:20:29.317423846 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Session Start event called from SANET-SHIM, vlan: 0 2024/01/29 15:20:29.317442538 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Wireless session sequence, create context with method MAB 2024/01/29 15:20:29.317459480 {wncd_x_R0-0}{2}: [auth-mgr-feat_wireless] [17787]: (info): [be02.5e92.570f:capwap_90000257] - authc_list: WebAuthz 2024/01/29 15:20:29.317461410 {wncd_x_R0-0}{2}: [auth-mgr-feat_wireless] [17787]: (info): [be02.5e92.570f:capwap_90000257] - authz_list: Not present under wlan configuration 2024/01/29 15:20:29.317478786 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_INIT -> S_AUTHIF_AWAIT_MAB_AUTH_START_RESP 2024/01/29 15:20:29.317592182 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:unknown] auth mgr attr add/change notification is received for attr iif-id(952) 2024/01/29 15:20:29.317631270 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr swbidb(1263) 2024/01/29 15:20:29.317663256 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr aaa-unique-id(220) 2024/01/29 15:20:29.317685624 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr iif-id(952) 2024/01/29 15:20:29.317696380 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Retrieved Client IIF ID 0x43011345 2024/01/29 15:20:29.317725858 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr audit-session-id(819) 2024/01/29 15:20:29.317739658 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Allocated audit session id 0A030A0A0000757555CEDA30 2024/01/29 15:20:29.318022000 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Applying policy for WlanId: 5, bssid : 34b8.8369.e68e, slotid: 1, bssid hdl : 12364632847460343011 2024/01/29 15:20:29.318025700 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Retrieved vlan id 0 from wlan policy 2024/01/29 15:20:29.318042212 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Applying Svc Templ wlan_svc_ALMIRQAB_local (ML:NONE) 2024/01/29 15:20:29.318241792 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr vlan-id(965) 2024/01/29 15:20:29.318258126 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Vlan tag name is GUEST, pref is 1048575 vlan num is 102 2024/01/29 15:20:29.318298316 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM Vlan PLUG-IN) has been started (status Success) 2024/01/29 15:20:29.318315388 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Reauth Plugin: Received valid timeout = 86400, effective timeout = 86400 2024/01/29 15:20:29.318349684 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (SM Reauth PLUG-IN) has been started (status Success) 2024/01/29 15:20:29.318399449 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Response of epm is SYNC with return code Success 2024/01/29 15:20:29.318452557 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raising ext evt Template Activated (9) on this session, client (unknown) (0) 2024/01/29 15:20:29.318553391 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:20:29.318593633 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: SVM Apply user profile 2024/01/29 15:20:29.318728053 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB authentication started for be02.5e92.570f 2024/01/29 15:20:29.318734699 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Idle' to 'Running' 2024/01/29 15:20:29.318738733 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Method mab changing state from 'Not run' to 'Running' 2024/01/29 15:20:29.323489503 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM will not send event Template Activated to PRE for 0x94000904 2024/01/29 15:20:29.323536155 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_AWAIT_MAB_AUTH_START_RESP -> S_AUTHIF_MAB_AUTH_PENDING 2024/01/29 15:20:29.323541633 {wncd_x_R0-0}{2}: [ewlc-infra-evq] [17787]: (note): Authentication Success. Resolved Policy bitmap:11 for client be02.5e92.570f 2024/01/29 15:20:29.323549673 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_MAB_AUTH_PENDING -> S_AUTHIF_MAB_AUTH_PENDING 2024/01/29 15:20:29.323583681 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_CONTINUE' on (be02.5e92.570f) 2024/01/29 15:20:29.323650314 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as Un-Classified Device and old device-type not classified earlier & Device name for the session is detected as Unknown Device and old device-name not classified earlier & Old protocol map 0 and new is 1 2024/01/29 15:20:29.323723228 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending device_cache_update of XID (0) to (MobilityD[0]) 2024/01/29 15:20:29.323768976 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] DC Profile-name has been changed to Un-Classified Device 2024/01/29 15:20:29.323772784 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] update event: Policy is not applied for this Handle 0x94000904 2024/01/29 15:20:29.323777850 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:20:29.323806938 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received device_cache_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:29.324025244 {wncd_x_R0-0}{2}: [caaa-author] [17787]: (info): [CAAA:AUTHOR:94000904] NULL ATTR LIST 2024/01/29 15:20:29.324230106 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Access-Request to 10.10.1.10:1812 id 0/7, len 418 2024/01/29 15:20:29.324239666 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator cf 43 d5 2b a8 43 83 46 - 1f e6 e8 94 8d 0e af 57 2024/01/29 15:20:29.324244868 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 14 "be025e92570f" 2024/01/29 15:20:29.324248020 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Password [2] 18 * 2024/01/29 15:20:29.324255612 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Service-Type [6] 6 Call Check [10] 2024/01/29 15:20:29.324258522 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 31 2024/01/29 15:20:29.324262366 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 25 "service-type=Call Check" 2024/01/29 15:20:29.324266882 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-MTU [12] 6 1485 2024/01/29 15:20:29.324269370 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:20:29.324302124 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: EAP-Key-Name [102] 2 * 2024/01/29 15:20:29.324307212 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:20:29.324310594 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757555CEDA30" 2024/01/29 15:20:29.324313046 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:20:29.324321492 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:20:29.324334110 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:20:29.324337326 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "client-iif-id=1124143941" 2024/01/29 15:20:29.324339662 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:20:29.324342772 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:20:29.324347452 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:20:29.324351172 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:20:29.324354504 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:20:29.324356600 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:29.324359666 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:20:29.324361996 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:20:29.324365026 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:20:29.324368300 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 29 "34-b8-83-69-e6-80:Al Mirqab" 2024/01/29 15:20:29.324371500 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:20:29.324374180 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:20:29.324377396 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:20:29.324380666 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:20:29.324444408 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:20:29.448350970 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1812/7 10.10.1.10:0, Access-Accept, len 423 2024/01/29 15:20:29.448362082 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator d6 20 9d 92 a1 af 33 43 - 88 71 87 ab ae d5 1d 13 2024/01/29 15:20:29.448379054 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:20:29.448382408 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:20:29.448425905 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:20:29.448449685 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:20:29.448453479 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "url-filter-preauth=URL_FILTER" 2024/01/29 15:20:29.448455931 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 36 2024/01/29 15:20:29.448459073 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 30 "url-filter-preauth=GUEST_URL" 2024/01/29 15:20:29.448461419 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:29.448464453 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "url-redirect-acl=REDIRECT" 2024/01/29 15:20:29.448466891 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 199 2024/01/29 15:20:29.448471045 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 193 "url-redirect=https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757555CEDA30&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=e2b23d44dd0b4e9cff23f0ed450ebb5b" 2024/01/29 15:20:29.448505457 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:20:29.448685725 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB received an Access-Accept for (be02.5e92.570f) 2024/01/29 15:20:29.448698701 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_RESULT' on (be02.5e92.570f) 2024/01/29 15:20:29.448731099 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Authc success from MAB, Auth event success 2024/01/29 15:20:29.448747717 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event APPLY_USER_PROFILE (14) 2024/01/29 15:20:29.448752471 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event RX_METHOD_AUTHC_SUCCESS (3) 2024/01/29 15:20:29.448826279 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : username 0 "BE-02-5E-92-57-0F" 2024/01/29 15:20:29.448848981 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : class 0 43 41 43 53 3a 30 41 30 33 30 41 30 41 30 30 30 30 37 35 37 35 35 35 43 45 44 41 33 30 3a 6d 79 36 38 31 2d 69 73 65 30 30 31 2f 34 39 35 33 38 31 33 33 30 2f 33 37 36 30 31 33 2024/01/29 15:20:29.448850513 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : Message-Authenticator 0 2024/01/29 15:20:29.448852171 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-filter-preauth 0 "URL_FILTER" 2024/01/29 15:20:29.448853577 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-filter-preauth 0 "GUEST_URL" 2024/01/29 15:20:29.448862711 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-redirect-acl 0 "REDIRECT" 2024/01/29 15:20:29.448864301 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-redirect 0 "https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757555CEDA30&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=e2b23d44dd0b4e9cff23f0ed450ebb5b" 2024/01/29 15:20:29.448865959 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : dnis 0 "34-B8-83-69-E6-80" 2024/01/29 15:20:29.448867367 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : formatted-clid 0 "BE-02-5E-92-57-0F" 2024/01/29 15:20:29.448868727 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : audit-session-id 0 "0A030A0A0000757555CEDA30" 2024/01/29 15:20:29.448870875 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : method 0 2 [mab] 2024/01/29 15:20:29.448873799 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : clid-mac-addr 0 be 02 5e 92 57 0f 2024/01/29 15:20:29.448875563 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : intf-id 0 2415919703 (0x90000257) 2024/01/29 15:20:29.448937773 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr username(450) 2024/01/29 15:20:29.448965777 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update username BE-02-5E-92-57-0F 2024/01/29 15:20:29.448972975 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received User-Name BE-02-5E-92-57-0F for client be02.5e92.570f 2024/01/29 15:20:29.449006891 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr auth-domain(954) 2024/01/29 15:20:29.449024693 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Method mab changing state from 'Running' to 'Authc Success' 2024/01/29 15:20:29.449028719 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Running' to 'Authc Success' 2024/01/29 15:20:29.449090137 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: SVM Apply user profile 2024/01/29 15:20:29.449305947 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Activating EPM features with UP 2024/01/29 15:20:29.449439786 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] Username BE-02-5E-92-57-0F received 2024/01/29 15:20:29.449454892 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM MISC PLUG-IN) has been started (status Success) 2024/01/29 15:20:29.449472396 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (SM ACCOUNTING PLUG-IN) has been started (status Success) 2024/01/29 15:20:29.449540336 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (Urlfilter Plugin) has been started (status Success) 2024/01/29 15:20:29.449605066 {wncd_x_R0-0}{2}: [webauth-dev] [17787]: (info): Central Webauth URL Redirect, Received a request to create a CWA session for a mac [be:02:5e:92:57:0f] 2024/01/29 15:20:29.449652956 {wncd_x_R0-0}{2}: [auth-mgr-feat_wireless] [17787]: (info): [0000.0000.0000:unknown] Retrieved zone id 0x0 for bssid 12364632847460343011 2024/01/29 15:20:29.449658710 {wncd_x_R0-0}{2}: [webauth-dev] [17787]: (info): Parameter map associated with mac be02.5e92.570f is global 2024/01/29 15:20:29.449664892 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 0.0.0.0]Param-map used: global 2024/01/29 15:20:29.449668918 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 0.0.0.0]State Invalid State -> INIT 2024/01/29 15:20:29.449693004 {wncd_x_R0-0}{2}: [epm-redirect] [17787]: (info): [0000.0000.0000:unknown] URL-Redirect = https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757555CEDA30&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=e2b23d44dd0b4e9cff23f0ed450ebb5b 2024/01/29 15:20:29.450304112 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM URL PLUG-IN) has been started (status Success) 2024/01/29 15:20:29.450370936 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Response of epm is SYNC with return code Success 2024/01/29 15:20:29.450420448 {wncd_x_R0-0}{2}: [svm] [17787]: (info): [be02.5e92.570f] Applied User Profile: : 2024/01/29 15:20:29.450424128 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: method 0 2 [mab] 2024/01/29 15:20:29.450427020 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: clid-mac-addr 0 be 02 5e 92 57 0f 2024/01/29 15:20:29.450428628 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: intf-id 0 2415919703 (0x90000257) 2024/01/29 15:20:29.450430104 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: username 0 "BE-02-5E-92-57-0F" 2024/01/29 15:20:29.450445590 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: class 0 43 41 43 53 3a 30 41 30 33 30 41 30 41 30 30 30 30 37 35 37 35 35 35 43 45 44 41 33 30 3a 6d 79 36 38 31 2d 69 73 65 30 30 31 2f 34 39 35 33 38 31 33 33 30 2f 33 37 36 30 31 33 2024/01/29 15:20:29.450447034 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-filter-preauth 0 "URL_FILTER" 2024/01/29 15:20:29.450448352 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-filter-preauth 0 "GUEST_URL" 2024/01/29 15:20:29.450449706 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-redirect-acl 0 "REDIRECT" 2024/01/29 15:20:29.450451128 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-redirect 0 "https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757555CEDA30&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=e2b23d44dd0b4e9cff23f0ed450ebb5b" 2024/01/29 15:20:29.450709013 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:20:29.450886467 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] User Profile applied successfully - REPLACE 2024/01/29 15:20:29.450971057 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr method(757) 2024/01/29 15:20:29.450997629 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event AUTHZ_SUCCESS (11) 2024/01/29 15:20:29.451004477 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Authc Success' to 'Authz Success' 2024/01/29 15:20:29.451077977 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f MAB Authentication success. AAA override = True, PPSK = True 2024/01/29 15:20:29.451102675 {wncd_x_R0-0}{2}: [client-auth] [17787]: (ERR): MAC: be02.5e92.570f passphrase length is zero. Unable to generate the PMK for ppsk client. 2024/01/29 15:20:29.451104173 {wncd_x_R0-0}{2}: [client-auth] [17787]: (ERR): MAC: be02.5e92.570f Failed to generate PMK for ppsk,Post MAC Auth err: Invalid argument 2024/01/29 15:20:29.451106869 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_MAB_AUTH_PENDING -> S_AUTHIF_MAB_AUTH_DONE 2024/01/29 15:20:29.451163679 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Processing MAB authentication result status: 0, CO_AUTH_STATUS_SUCCESS 2024/01/29 15:20:29.451193617 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_MACAUTH_IN_PROGRESS -> S_CO_ASSOCIATING 2024/01/29 15:20:29.451209031 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f dot11 send association response. Framing association response with resp_status_code: 0 2024/01/29 15:20:29.451210125 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Dot11 capability privacy bit set TRUE 2024/01/29 15:20:29.451217049 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f Dot11 Capability info byte1 11, byte2: 1 2024/01/29 15:20:29.451262345 {wncd_x_R0-0}{2}: [dot11-frame] [17787]: (info): MAC: be02.5e92.570f WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled 2024/01/29 15:20:29.451381289 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f dot11 send association response. Sending assoc response of length: 270 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS 2024/01/29 15:20:29.451390035 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Association success. AID 4, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False 2024/01/29 15:20:29.451404149 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_MAB_PENDING -> S_DOT11_ASSOCIATED 2024/01/29 15:20:29.451463077 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Station Dot11 association is successful. 2024/01/29 15:20:29.451516133 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Starting L2 authentication. Bssid in state machine:34b8.8369.e68e Bssid in request is:34b8.8369.e68e 2024/01/29 15:20:29.451528391 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_ASSOCIATING -> S_CO_L2_AUTH_IN_PROGRESS 2024/01/29 15:20:29.451634106 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:20:29.451774780 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:29.451791798 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:29.451821068 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:20:29.451836654 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_MAB_AUTH_DONE -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM 2024/01/29 15:20:29.455067507 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM -> S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING 2024/01/29 15:20:29.455159107 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M1 Sent successfully 2024/01/29 15:20:29.455162237 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_INITPMK -> S_PTK_START 2024/01/29 15:20:29.459720807 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending pmk_update of XID (0) to (MobilityD[0]) 2024/01/29 15:20:29.459749213 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M2 Status: EAP key M2 validation success 2024/01/29 15:20:29.459823053 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received pmk_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:29.459872581 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M3 Sent successfully 2024/01/29 15:20:29.459874511 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTK_START -> S_PTKINITNEGOTIATING 2024/01/29 15:20:29.459942912 {mobilityd_R0-0}{2}: [mm-dgram-io] [18338]: (debug): MAC: 0000.0000.0000 Sending message: pmk_update to group: default 2024/01/29 15:20:29.462235768 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M4 Status: EAP key M4 validation is successful 2024/01/29 15:20:29.462238428 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (note): MAC: be02.5e92.570f EAP Key management successful. AKM:FT-PSK Cipher:CCMP WPA Version: WPA2 2024/01/29 15:20:29.462243930 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITNEGOTIATING -> S_PTKINITDONE 2024/01/29 15:20:29.462317480 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING -> S_AUTHIF_L2_WEBAUTH_DONE 2024/01/29 15:20:29.462340086 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f L2 Authentication of station is successful., L3 Authentication : 1 2024/01/29 15:20:29.462417144 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Mobility discovery triggered. Client mode: Local 2024/01/29 15:20:29.462420254 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_MOBILITY_DISCOVERY_IN_PROGRESS 2024/01/29 15:20:29.462442408 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_INIT -> S_MA_MOBILITY_DISCOVERY_PROCESSED_TR on E_MA_MOBILITY_DISCOVERY 2024/01/29 15:20:29.462494176 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Invalid transmitter ip in build client context 2024/01/29 15:20:29.462617370 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Sending mobile_announce of XID (0) to (MobilityD[0]) 2024/01/29 15:20:29.462717818 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Received mobile_announce, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:29.463064546 {mobilityd_R0-0}{2}: [mm-transition] [18338]: (info): MAC: be02.5e92.570f MMFSM transition: S_MC_INIT -> S_MC_ANNOUNCE_PROCESSED_NEW_CLIENT_TR on E_MC_ANNOUNCE_RCVD from WNCD[0] 2024/01/29 15:20:29.463141059 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Add MCC by tdl mac: client_ifid 0xa0000064 is assigned to client 2024/01/29 15:20:29.463156633 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Sending capwap_msg_unknown (100) of XID (84683) to (WNCD[0]) 2024/01/29 15:20:29.463200515 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Sending mobile_announce_nak of XID (84683) to (WNCD[0]) 2024/01/29 15:20:29.463270549 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Received mobile_announce_nak, sub type: 1 of XID (84683) from (MobilityD[0]) 2024/01/29 15:20:29.463342833 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_INIT_WAIT_ANNOUNCE_RSP -> S_MA_NAK_PROCESSED_TR on E_MA_NAK_RCVD 2024/01/29 15:20:29.463348523 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Roam type changed - None -> None 2024/01/29 15:20:29.463363347 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Mobility role changed - Unassoc -> Local 2024/01/29 15:20:29.463448637 {wncd_x_R0-0}{2}: [mm-client] [17787]: (note): MAC: be02.5e92.570f Mobility Successful. Roam Type None, Sub Roam Type MM_SUB_ROAM_TYPE_NONE, Client IFID: 0xa0000064, Client Role: Local PoA: 0x90000257 PoP: 0x0 2024/01/29 15:20:29.463473179 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Processing mobility response from MMIF. Client ifid: 0xa0000064, roam type: None, client role: Local 2024/01/29 15:20:29.464441180 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:20:29.464502596 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:29.464519624 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:29.464565354 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:20:29.464567120 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:20:29.464591600 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x72 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:20:29.464632046 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_MOBILITY_DISCOVERY_IN_PROGRESS -> S_CO_DPATH_PLUMB_IN_PROGRESS 2024/01/29 15:20:29.464750314 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Client datapath entry params - ssid:Al Mirqab,slot_id:1 bssid ifid: 0x90000254, radio_ifid: 0x900001f6, wlan_ifid: 0xf0400005 2024/01/29 15:20:29.464806396 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:20:29.464824194 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link Local Bridging not enabled for client 2024/01/29 15:20:29.464827116 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS dpath create params 2024/01/29 15:20:29.464876958 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:29.464881512 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:29.464895666 {wncd_x_R0-0}{2}: [avc-afc] [17787]: (debug): AVC enabled for client be02.5e92.570f 2024/01/29 15:20:29.465020734 {wncd_x_R0-0}{2}: [dpath_svc] [17787]: (note): MAC: be02.5e92.570f Client datapath entry created for ifid 0xa0000064 2024/01/29 15:20:29.465089282 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS -> S_CO_IP_LEARN_IN_PROGRESS 2024/01/29 15:20:29.465236597 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_INIT -> S_IPLEARN_IN_PROGRESS 2024/01/29 15:20:29.465787911 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dot11-device-info(1337) 2024/01/29 15:20:29.465815151 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:20:29.465818033 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update dot11-device-info 2024/01/29 15:20:29.466044185 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old Un-Classified Device & Device name for the session is detected as iPhone 13 and old Unknown Device & Old protocol map 1 and new is 1025 2024/01/29 15:20:29.466107255 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending device_cache_update of XID (0) to (MobilityD[0]) 2024/01/29 15:20:29.466147533 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] DC Profile-name has been changed to iPhone 13 2024/01/29 15:20:29.466151891 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] update event: Policy is not applied for this Handle 0x94000904 2024/01/29 15:20:29.466156489 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:20:29.466183493 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received device_cache_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:29.476471487 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE -> S_AUTHIF_L2_WEBAUTH_DONE 2024/01/29 15:20:29.896260180 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 ND probe: Multicast DAD NS outgoing interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAc: 3333.ff76.879d Ipv6 SRC: ff02::1:ff76:879d IPv6 DST: ff02::1:ff76:879d 2024/01/29 15:20:29.896309556 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:20:29.896514084 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.ff76.879d Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff76:879d, type: ND_NEIGHBOR_SOLICIT 2024/01/29 15:20:29.896592102 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 3333.ff76.879d Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:20:29.896681344 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.ff76.879d Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff76:879d, type: ND_NEIGHBOR_SOLICIT 2024/01/29 15:20:29.897050310 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPDISCOVER, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:20:29.897117194 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPDISCOVER, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:20:29.897207815 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dhcp-option(1126) 2024/01/29 15:20:29.897239785 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:20:29.897242255 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update dhcp-option 2024/01/29 15:20:29.897475877 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old iPhone 13 & Device name for the session is detected as iPhone 13 and old iPhone 13 & Old protocol map 1025 and new is 1025 2024/01/29 15:20:29.897484643 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:20:29.897650513 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:20:29.897729967 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:20:30.154492850 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (ERR): Error Update denied during binding create [17] while creating SISF binding fe80::8c8:8985:eb76:879d : be02.5e92.570f from gleaned IPv6 packet vlan 102 2024/01/29 15:20:31.296662709 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPDISCOVER, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:20:31.296742059 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPDISCOVER, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:20:31.897884029 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface Po1 on vlan 102 Src MAC: 3c26.e465.831f Dst MAC: be02.5e92.570f src_ip: 10.10.102.6, dst_ip: 10.10.102.153, BOOTPREPLY, SISF_DHCPOFFER, giaddr: 0.0.0.0, yiaddr: 10.10.102.153, CMAC: be02.5e92.570f 2024/01/29 15:20:31.897970423 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface Po1 on vlan 102 Src MAC: 3c26.e465.831f Dst MAC: be02.5e92.570f src_ip: 10.10.102.6, dst_ip: 10.10.102.153, BOOTPREPLY, SISF_DHCPOFFER, giaddr: 0.0.0.0, yiaddr: 10.10.102.153, CMAC: be02.5e92.570f 2024/01/29 15:20:32.973744637 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:20:32.973830743 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:20:32.974460591 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface Po1 on vlan 102 Src MAC: 3c26.e465.831f Dst MAC: be02.5e92.570f src_ip: 10.10.102.6, dst_ip: 10.10.102.153, BOOTPREPLY, SISF_DHCPACK, giaddr: 0.0.0.0, yiaddr: 10.10.102.153, CMAC: be02.5e92.570f 2024/01/29 15:20:32.974618963 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 3c26.e465.831f Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:20:32.974741189 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface Po1 on vlan 102 Src MAC: 3c26.e465.831f Dst MAC: be02.5e92.570f src_ip: 10.10.102.6, dst_ip: 10.10.102.153, BOOTPREPLY, SISF_DHCPACK, giaddr: 0.0.0.0, yiaddr: 10.10.102.153, CMAC: be02.5e92.570f 2024/01/29 15:20:32.974997928 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (note): MAC: be02.5e92.570f Client IP learn successful. Method: DHCP IP: 10.10.102.153 2024/01/29 15:20:32.975029842 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr addr(8) 2024/01/29 15:20:32.975161528 {wncd_x_R0-0}{2}: [webauth-sess] [17787]: (info): [be02.5e92.570f][ 0.0.0.0]Change notif CB, Add address 10.10.102.153 [be02.5e92.570f] 2024/01/29 15:20:32.975166108 {wncd_x_R0-0}{2}: [webauth-sess] [17787]: (info): adding webauth session to ipv4 hash table for vrf id 0, ipv4 vrf table id 0 2024/01/29 15:20:32.975222868 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update addr 10.10.102.153 2024/01/29 15:20:32.975249920 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [0000.0000.0000:unknown] HDL = 0x0 vlan 102 fail count 0 dirty_counter 0 is_dirty 0 2024/01/29 15:20:32.975274968 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type START) 2024/01/29 15:20:32.975295562 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:20:32.975298944 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:20:32.975347172 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:20:32.975366656 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:20:32.975481878 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:94000904] NULL ATTR LIST 2024/01/29 15:20:32.975514614 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr session-id(408) 2024/01/29 15:20:32.975534018 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update session-id 00004d8a 2024/01/29 15:20:32.975993687 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_IN_PROGRESS -> S_IPLEARN_COMPLETE 2024/01/29 15:20:32.976144545 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/15, len 624 2024/01/29 15:20:32.976153305 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator f7 f8 cc 1f 69 cd 23 c4 - ef 47 d1 be 7d f5 73 b0 2024/01/29 15:20:32.976157965 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:32.976162229 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:20:32.976164853 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:20:32.976168017 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:20:32.976170359 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:20:32.976173375 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:20:32.976175727 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:32.976178643 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:20:32.976180929 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:32.976183977 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:20:32.976186301 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:20:32.976189403 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:20:32.976191679 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:32.976194839 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dhcp-option= " 2024/01/29 15:20:32.976199703 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:20:32.976207107 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:20:32.976209521 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:20:32.976212721 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757555CEDA30" 2024/01/29 15:20:32.976215077 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:20:32.976218145 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:20:32.976220451 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:20:32.976223739 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:20:32.976227089 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:20:32.976230283 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:20:32.976234947 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:20:32.976238699 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:20:32.976242261 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:20:32.976244405 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:32.976247491 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:20:32.976249781 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:20:32.976252829 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:20:32.976255585 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:20:32.976258739 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:20:32.976262079 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:20:32.976265167 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8a" 2024/01/29 15:20:32.976269179 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:20:32.976271693 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:20:32.976320481 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Start [1] 2024/01/29 15:20:32.976332465 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541632 2024/01/29 15:20:32.976335691 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:20:32.976385215 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:20:32.976402365 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received ip learn response. method: IPLEARN_METHOD_DHCP 2024/01/29 15:20:32.976448329 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Triggered L3 authentication. status = 0x0, Success 2024/01/29 15:20:32.976451573 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_IP_LEARN_IN_PROGRESS -> S_CO_L3_AUTH_IN_PROGRESS 2024/01/29 15:20:32.976527739 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f L3 Authentication initiated. CWA 2024/01/29 15:20:32.976538935 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE -> S_AUTHIF_WEBAUTH_PENDING 2024/01/29 15:20:32.980616411 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 0.0.0.0, ARP target IP: 10.10.102.153, 2024/01/29 15:20:32.980724795 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 0.0.0.0, ARP target IP: 10.10.102.153, 2024/01/29 15:20:32.982173345 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/15 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:20:32.982191633 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 33 ab 2b 7f f5 c6 4f f6 - 43 67 c2 b5 17 79 95 c4 2024/01/29 15:20:32.982212331 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:20:33.328522553 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 0.0.0.0, ARP target IP: 10.10.102.153, 2024/01/29 15:20:33.328639465 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 0.0.0.0, ARP target IP: 10.10.102.153, 2024/01/29 15:20:33.682032010 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 0.0.0.0, ARP target IP: 10.10.102.153, 2024/01/29 15:20:33.682144706 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 0.0.0.0, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.038475722 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.038583454 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.271647406 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.271750564 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.328968527 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:20:34.329054117 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:20:34.329212855 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f Client IP learn successful. Method: IPv6 NDP IP: fe80::8c8:8985:eb76:879d 2024/01/29 15:20:34.329257673 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr addrv6(10) 2024/01/29 15:20:34.329426635 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update ipv6_addr fe80::8c8:8985:eb76:879d 2024/01/29 15:20:34.329468013 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:20:34.329496079 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:20:34.329500013 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:20:34.329532298 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:20:34.329553368 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:20:34.329678094 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:94000904] NULL ATTR LIST 2024/01/29 15:20:34.330080714 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE 2024/01/29 15:20:34.330221236 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/23, len 678 2024/01/29 15:20:34.330230558 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 1c de 21 2d 4c 41 5b 89 - 22 58 57 c8 b9 aa f8 9f 2024/01/29 15:20:34.330235200 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:34.330239690 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:20:34.330242336 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:20:34.330245532 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:20:34.330247892 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:20:34.330250868 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:20:34.330253204 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:34.330256156 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:20:34.330263242 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:34.330266310 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:20:34.330268596 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:20:34.330271628 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:20:34.330273918 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:34.330276888 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dhcp-option= " 2024/01/29 15:20:34.330281860 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:20:34.330284360 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IPv6-Address [168] 18 ... 2024/01/29 15:20:34.330312824 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:20:34.330315248 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:20:34.330318516 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757555CEDA30" 2024/01/29 15:20:34.330320880 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:20:34.330337158 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:20:34.330339692 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:20:34.330343210 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:20:34.330346528 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:20:34.330349750 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:20:34.330354272 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:20:34.330358174 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:20:34.330361736 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:20:34.330363828 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:34.330366832 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:20:34.330373904 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:20:34.330377006 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:20:34.330379672 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:20:34.330382910 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:20:34.330386200 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:20:34.330389312 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8a" 2024/01/29 15:20:34.330392942 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Octets [42] 6 0 2024/01/29 15:20:34.330396180 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Giga-Words[52] 6 0 2024/01/29 15:20:34.330399336 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Octets [43] 6 0 2024/01/29 15:20:34.330402448 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Giga-Words[53] 6 0 2024/01/29 15:20:34.330405522 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Packets [47] 6 0 2024/01/29 15:20:34.330408696 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Packets [48] 6 0 2024/01/29 15:20:34.330412204 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:20:34.330414602 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:20:34.330458618 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Watchdog [3] 2024/01/29 15:20:34.330461878 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541634 2024/01/29 15:20:34.330464818 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:20:34.330515866 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:20:34.337579637 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/23 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:20:34.337589121 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator d3 49 b3 47 80 2a ec b4 - 0b 90 5e 6f 4b b3 12 86 2024/01/29 15:20:34.337619197 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:20:34.596701844 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.596817850 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:34.599581109 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:20:34.599684833 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:20:34.840261733 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:20:34.840414823 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:20:34.925556008 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49358/230 IO state NEW -> SSL_HANDSHAKING 2024/01/29 15:20:34.925616434 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A504B) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.925620760 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.925623082 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.925627680 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.925631388 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.925688320 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A504B. 2024/01/29 15:20:34.925690664 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A504B has ended. Freeing all resources. 2024/01/29 15:20:34.925694184 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.925697140 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.925698570 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49358/230 Remove IO ctx and close socket, id [E4000002] 2024/01/29 15:20:34.925968324 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A504C) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.925970110 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.925972002 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.925986234 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.925989110 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.926022622 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A504C. 2024/01/29 15:20:34.926024672 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A504C has ended. Freeing all resources. 2024/01/29 15:20:34.926027114 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.926063104 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49357/226 Remove IO ctx and close socket, id [5000001B] 2024/01/29 15:20:34.926087214 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.956343145 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A504D) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.956345531 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.956347471 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.956351167 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.956354639 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.956394043 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A504D. 2024/01/29 15:20:34.956396161 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A504D has ended. Freeing all resources. 2024/01/29 15:20:34.956399115 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.956401759 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.956517109 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A504E) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.956518745 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.956520497 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.956532109 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.956534905 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.956567524 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A504E. 2024/01/29 15:20:34.956569550 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A504E has ended. Freeing all resources. 2024/01/29 15:20:34.956571928 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.956574418 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.956605166 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49359/226 Remove IO ctx and close socket, id [0500002C] 2024/01/29 15:20:34.968911937 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A504F) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.968927597 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.968929677 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.968933661 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.968937151 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.968976943 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A504F. 2024/01/29 15:20:34.968978983 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A504F has ended. Freeing all resources. 2024/01/29 15:20:34.968981931 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.968984553 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.969102729 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5050) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.969104379 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.969106167 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.969117563 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.969120451 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.969151560 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5050. 2024/01/29 15:20:34.969153606 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5050 has ended. Freeing all resources. 2024/01/29 15:20:34.969156010 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.969158452 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.969188962 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49360/226 Remove IO ctx and close socket, id [4A000016] 2024/01/29 15:20:34.977095507 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5051) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.977097659 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.977099565 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.977114559 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.977115847 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49362/230 IO state NEW -> SSL_HANDSHAKING 2024/01/29 15:20:34.977117785 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.977153573 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5051. 2024/01/29 15:20:34.977155611 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5051 has ended. Freeing all resources. 2024/01/29 15:20:34.977158219 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.977160809 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.977235639 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49362/230 Remove IO ctx and close socket, id [64000013] 2024/01/29 15:20:34.977514329 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5052) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.977516175 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.977517971 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.977528977 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.977531799 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.977565392 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5052. 2024/01/29 15:20:34.977567378 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5052 has ended. Freeing all resources. 2024/01/29 15:20:34.977569898 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.977572396 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.977608384 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49361/226 Remove IO ctx and close socket, id [65000038] 2024/01/29 15:20:34.994661546 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5053) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.994663720 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.994665662 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.994669192 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.994672442 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.994721582 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5053. 2024/01/29 15:20:34.994723660 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5053 has ended. Freeing all resources. 2024/01/29 15:20:34.994726380 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.994728966 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.994877306 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5054) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.994880600 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.994882732 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.994895764 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.994898840 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.994941584 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5054. 2024/01/29 15:20:34.994943796 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5054 has ended. Freeing all resources. 2024/01/29 15:20:34.994946816 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.994949564 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.995006624 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49363/226 Remove IO ctx and close socket, id [DF000010] 2024/01/29 15:20:34.995881843 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5055) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.995883619 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.995885493 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.995888961 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.995892033 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.995925467 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5055. 2024/01/29 15:20:34.995937289 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5055 has ended. Freeing all resources. 2024/01/29 15:20:34.995940073 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.995942685 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.996048259 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5056) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.996049817 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.996051545 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.996062149 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.996064937 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.996095737 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5056. 2024/01/29 15:20:34.996097719 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5056 has ended. Freeing all resources. 2024/01/29 15:20:34.996100241 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.996102657 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.996134651 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49364/226 Remove IO ctx and close socket, id [E800000D] 2024/01/29 15:20:34.999008790 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5057) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.999010486 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.999012298 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.999015658 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.999018642 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.999051174 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5057. 2024/01/29 15:20:34.999053162 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5057 has ended. Freeing all resources. 2024/01/29 15:20:34.999055754 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.999067296 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.999170048 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5058) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.999171554 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.999173262 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.999183720 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.999186636 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.999216876 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5058. 2024/01/29 15:20:34.999218868 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5058 has ended. Freeing all resources. 2024/01/29 15:20:34.999221286 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.999223716 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:34.999246778 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49365/226 Remove IO ctx and close socket, id [C3000020] 2024/01/29 15:20:34.999939697 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5059) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:34.999941333 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:34.999943179 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:34.999946531 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:34.999949433 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:34.999978957 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5059. 2024/01/29 15:20:34.999980993 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5059 has ended. Freeing all resources. 2024/01/29 15:20:34.999983267 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:34.999985699 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.000094379 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A505A) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.000095821 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.000106165 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.000116831 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.000119673 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.000150725 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A505A. 2024/01/29 15:20:35.000152697 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A505A has ended. Freeing all resources. 2024/01/29 15:20:35.000155067 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.000157465 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.000179661 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49366/226 Remove IO ctx and close socket, id [EC000018] 2024/01/29 15:20:35.002053477 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A505B) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.002055213 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.002057051 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.002060377 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.002063411 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.002093791 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A505B. 2024/01/29 15:20:35.002095775 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A505B has ended. Freeing all resources. 2024/01/29 15:20:35.002098151 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.002100529 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.002210003 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A505C) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.002211481 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.002213135 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.002223427 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.002235187 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.002265841 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A505C. 2024/01/29 15:20:35.002267867 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A505C has ended. Freeing all resources. 2024/01/29 15:20:35.002270273 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.002272595 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.002295173 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49367/226 Remove IO ctx and close socket, id [7B000015] 2024/01/29 15:20:35.007261734 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A505D) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.007263776 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.007265666 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.007269262 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.007272352 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.007306826 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A505D. 2024/01/29 15:20:35.007308902 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A505D has ended. Freeing all resources. 2024/01/29 15:20:35.007311402 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.007313914 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.007438386 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A505E) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.007439938 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.007441666 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.007452586 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.007455378 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.007497600 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A505E. 2024/01/29 15:20:35.007499688 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A505E has ended. Freeing all resources. 2024/01/29 15:20:35.007502116 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.007504512 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.007528530 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49368/226 Remove IO ctx and close socket, id [A500000A] 2024/01/29 15:20:35.009880972 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A505F) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.009883196 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.009885080 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.009888638 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.009891930 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.009928274 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A505F. 2024/01/29 15:20:35.009930396 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A505F has ended. Freeing all resources. 2024/01/29 15:20:35.009933056 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.009935488 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.010039426 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5060) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.010041049 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.010042753 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.010053757 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.010056549 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.010087295 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5060. 2024/01/29 15:20:35.010089293 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5060 has ended. Freeing all resources. 2024/01/29 15:20:35.010101553 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.010104075 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.010117049 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49369/226 Remove IO ctx and close socket, id [5900000E] 2024/01/29 15:20:35.012154393 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49480/226 IO state NEW -> READING 2024/01/29 15:20:35.012802273 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49480/226 Read event, Message ready 2024/01/29 15:20:35.012821371 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5061) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.012823151 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.012824973 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.012828251 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.012830427 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:20:35.012831149 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.012836217 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State INIT -> GET_REDIRECT 2024/01/29 15:20:35.012840055 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49480/226 IO state READING -> WRITING 2024/01/29 15:20:35.012861909 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5061. 2024/01/29 15:20:35.012863935 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5061 has ended. Freeing all resources. 2024/01/29 15:20:35.012866375 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.012869571 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.012871229 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49480/226 IO state WRITING -> END 2024/01/29 15:20:35.012875909 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49480/226 Remove IO ctx and close socket, id [3F00003C] 2024/01/29 15:20:35.013094437 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5062) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.013095969 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.013097649 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.013108089 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.013110893 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.013138923 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5062. 2024/01/29 15:20:35.013140977 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5062 has ended. Freeing all resources. 2024/01/29 15:20:35.013143263 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.013145655 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.013199888 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49370/230 Remove IO ctx and close socket, id [4200001F] 2024/01/29 15:20:35.023781514 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5063) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.023783774 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.023785706 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.023789302 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.023792666 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.023794354 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49372/230 IO state NEW -> SSL_HANDSHAKING 2024/01/29 15:20:35.023827740 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5063. 2024/01/29 15:20:35.023829754 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5063 has ended. Freeing all resources. 2024/01/29 15:20:35.023832432 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.023835044 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.023968112 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5064) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.023969698 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.023971460 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.023982534 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.023985304 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.024016438 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5064. 2024/01/29 15:20:35.024018414 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5064 has ended. Freeing all resources. 2024/01/29 15:20:35.024020712 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.024023090 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.024048646 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49371/226 Remove IO ctx and close socket, id [17000034] 2024/01/29 15:20:35.100992253 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5065) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.100995029 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.100997065 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.101013059 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.101016757 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.101059987 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5065. 2024/01/29 15:20:35.101062113 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5065 has ended. Freeing all resources. 2024/01/29 15:20:35.101065207 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.101067859 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.101189355 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5066) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.101191123 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.101192943 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.101204603 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.101207449 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.101239655 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5066. 2024/01/29 15:20:35.101241673 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5066 has ended. Freeing all resources. 2024/01/29 15:20:35.101244181 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.101246699 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.101279384 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49373/226 Remove IO ctx and close socket, id [BB000040] 2024/01/29 15:20:35.106837573 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5067) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.106839591 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.106841507 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.106844899 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.106848227 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.106895129 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5067. 2024/01/29 15:20:35.106897211 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5067 has ended. Freeing all resources. 2024/01/29 15:20:35.106899899 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.106902445 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.107014793 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5068) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.107016465 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.107018253 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.107028777 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.107031537 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.107061927 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5068. 2024/01/29 15:20:35.107063943 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5068 has ended. Freeing all resources. 2024/01/29 15:20:35.107066333 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.107068807 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.107090597 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49374/226 Remove IO ctx and close socket, id [57000003] 2024/01/29 15:20:35.483364984 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5069) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.483369458 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.483371602 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.483376040 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.483379822 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.483428892 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5069. 2024/01/29 15:20:35.483443084 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5069 has ended. Freeing all resources. 2024/01/29 15:20:35.483447238 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.483450030 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.483551466 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A506A) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.483553162 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.483555002 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.483568036 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.483570968 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.483604850 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A506A. 2024/01/29 15:20:35.483606934 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A506A has ended. Freeing all resources. 2024/01/29 15:20:35.483609426 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.483611848 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.483645324 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49375/226 Remove IO ctx and close socket, id [AF000007] 2024/01/29 15:20:35.489944468 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A506B) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.489946280 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.489948172 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.489951644 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.489954724 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.489988868 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A506B. 2024/01/29 15:20:35.489990874 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A506B has ended. Freeing all resources. 2024/01/29 15:20:35.489993374 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.490005384 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.490109778 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A506C) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.490111424 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.490113138 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.490123804 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.490126552 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.490157160 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A506C. 2024/01/29 15:20:35.490159132 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A506C has ended. Freeing all resources. 2024/01/29 15:20:35.490161574 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.490163940 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.490199338 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49376/226 Remove IO ctx and close socket, id [2A000037] 2024/01/29 15:20:35.501176627 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A506D) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.501178605 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.501180459 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.501183949 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.501187055 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.501221521 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A506D. 2024/01/29 15:20:35.501223531 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A506D has ended. Freeing all resources. 2024/01/29 15:20:35.501226095 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.501228573 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.501352841 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A506E) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:35.501363265 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:35.501365149 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:35.501376175 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:35.501379019 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:35.501411089 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A506E. 2024/01/29 15:20:35.501413135 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A506E has ended. Freeing all resources. 2024/01/29 15:20:35.501415535 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:35.501418025 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:35.501442829 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49377/226 Remove IO ctx and close socket, id [3B000019] 2024/01/29 15:20:35.543266777 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49378/226 IO state NEW -> READING 2024/01/29 15:20:35.832037378 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49378/226 Read event, Message ready 2024/01/29 15:20:35.832069690 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:20:35.832075098 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:20:35.832079590 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49378/226 IO state READING -> WRITING 2024/01/29 15:20:35.832125249 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49378/226 IO state WRITING -> END 2024/01/29 15:20:35.832130459 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49378/226 Remove IO ctx and close socket, id [F500002A] 2024/01/29 15:20:35.832752827 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:20:35.843019739 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49481/226 IO state NEW -> READING 2024/01/29 15:20:35.843434561 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49481/226 Read event, Message ready 2024/01/29 15:20:35.843461699 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:20:35.843466507 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:20:35.843470499 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49481/226 IO state READING -> WRITING 2024/01/29 15:20:35.843502047 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49481/226 IO state WRITING -> END 2024/01/29 15:20:35.843507009 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49481/226 Remove IO ctx and close socket, id [C3000024] 2024/01/29 15:20:35.855703999 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49482/226 IO state NEW -> READING 2024/01/29 15:20:35.855721103 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49482/226 Read event, Message ready 2024/01/29 15:20:35.855746717 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:20:35.855751157 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:20:35.855754849 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49482/226 IO state READING -> WRITING 2024/01/29 15:20:35.855787067 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49482/226 IO state WRITING -> END 2024/01/29 15:20:35.855791743 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49482/226 Remove IO ctx and close socket, id [F5000029] 2024/01/29 15:20:36.033351496 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A506F) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.033355638 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.033357988 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.033362640 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.033366430 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.033418954 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A506F. 2024/01/29 15:20:36.033421110 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A506F has ended. Freeing all resources. 2024/01/29 15:20:36.033424824 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.033427680 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.033553831 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5070) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.033555525 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.033557333 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.033571435 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.033586495 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.033621071 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5070. 2024/01/29 15:20:36.033623125 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5070 has ended. Freeing all resources. 2024/01/29 15:20:36.033625705 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.033628169 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.033658451 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49379/226 Remove IO ctx and close socket, id [6200001E] 2024/01/29 15:20:36.056216470 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5071) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.056218708 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.056220614 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.056224066 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.056227218 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.056263670 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5071. 2024/01/29 15:20:36.056265722 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5071 has ended. Freeing all resources. 2024/01/29 15:20:36.056268248 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.056270896 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.056395032 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5072) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.056396598 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.056398350 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.056409472 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.056412316 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.056457830 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5072. 2024/01/29 15:20:36.056459904 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5072 has ended. Freeing all resources. 2024/01/29 15:20:36.056462366 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.056464830 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.056490572 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49380/226 Remove IO ctx and close socket, id [FD000030] 2024/01/29 15:20:36.067464929 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5073) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.067466919 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.067468767 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.067472115 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.067475119 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.067507991 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5073. 2024/01/29 15:20:36.067510009 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5073 has ended. Freeing all resources. 2024/01/29 15:20:36.067512529 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.067514991 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.067629779 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5074) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.067631385 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.067633083 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.067643779 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.067646599 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.067677059 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5074. 2024/01/29 15:20:36.067679083 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5074 has ended. Freeing all resources. 2024/01/29 15:20:36.067690809 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.067693307 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.067708319 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49381/226 Remove IO ctx and close socket, id [67000009] 2024/01/29 15:20:36.334556548 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5075) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.334559884 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.334562030 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.334566590 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.334570476 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.334621558 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5075. 2024/01/29 15:20:36.334623650 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5075 has ended. Freeing all resources. 2024/01/29 15:20:36.334627036 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.334629760 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.334784914 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5076) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.334786682 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.334788592 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.334802014 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.334804938 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.334838306 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5076. 2024/01/29 15:20:36.334840338 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5076 has ended. Freeing all resources. 2024/01/29 15:20:36.334842866 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.334845368 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.334871908 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49385/226 Remove IO ctx and close socket, id [8D00001A] 2024/01/29 15:20:36.351359072 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5077) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.351361334 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.351363270 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.351366884 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.351370264 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.351408308 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5077. 2024/01/29 15:20:36.351410396 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5077 has ended. Freeing all resources. 2024/01/29 15:20:36.351413148 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.351415704 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.351531838 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5078) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.351533484 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.351535316 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.351546768 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.351549614 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.351580134 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5078. 2024/01/29 15:20:36.351582118 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5078 has ended. Freeing all resources. 2024/01/29 15:20:36.351584584 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.351587074 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.351611288 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49386/226 Remove IO ctx and close socket, id [6C000021] 2024/01/29 15:20:36.360151078 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5079) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.360153348 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.360166816 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.360170728 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.360173992 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.360211498 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5079. 2024/01/29 15:20:36.360213564 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5079 has ended. Freeing all resources. 2024/01/29 15:20:36.360216326 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.360218918 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.360345384 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A507A) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.360347084 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.360348840 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.360359948 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.360362738 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.360394074 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A507A. 2024/01/29 15:20:36.360396088 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A507A has ended. Freeing all resources. 2024/01/29 15:20:36.360398518 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.360400978 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.360427688 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49387/226 Remove IO ctx and close socket, id [22000033] 2024/01/29 15:20:36.743081547 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A507B) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.743085369 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.743087807 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.743092007 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.743095715 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.743156547 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A507B. 2024/01/29 15:20:36.743158807 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A507B has ended. Freeing all resources. 2024/01/29 15:20:36.743162241 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.743165009 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.743369760 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A507C) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.743372624 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.743374704 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.743388766 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.743391796 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.743434538 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A507C. 2024/01/29 15:20:36.743436626 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A507C has ended. Freeing all resources. 2024/01/29 15:20:36.743439580 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.743442266 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.743479760 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49391/226 Remove IO ctx and close socket, id [2700003B] 2024/01/29 15:20:36.786626569 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A507D) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.786628943 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.786630945 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.786634585 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.786638053 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.786676287 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A507D. 2024/01/29 15:20:36.786689277 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A507D has ended. Freeing all resources. 2024/01/29 15:20:36.786692517 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.786695131 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.786797609 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A507E) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.786799233 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.786800975 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.786812457 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.786815295 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.786847939 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A507E. 2024/01/29 15:20:36.786850021 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A507E has ended. Freeing all resources. 2024/01/29 15:20:36.786852483 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.786854909 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.786886137 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49392/226 Remove IO ctx and close socket, id [E4000039] 2024/01/29 15:20:36.973736871 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A507F) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.973739861 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.973741985 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.973745981 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.973749735 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.973793001 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A507F. 2024/01/29 15:20:36.973795201 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A507F has ended. Freeing all resources. 2024/01/29 15:20:36.973798197 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.973812035 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.973922019 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5080) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.973923735 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.973925599 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.973938087 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.973940955 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.973974243 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5080. 2024/01/29 15:20:36.973976295 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5080 has ended. Freeing all resources. 2024/01/29 15:20:36.973978789 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.973981317 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.974005527 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49394/226 Remove IO ctx and close socket, id [8D00003E] 2024/01/29 15:20:36.984377737 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5081) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.984379773 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.984381569 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.984385135 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.984388187 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.984423721 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5081. 2024/01/29 15:20:36.984425827 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5081 has ended. Freeing all resources. 2024/01/29 15:20:36.984428425 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.984430927 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.984548298 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5082) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.984560160 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.984561990 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.984573166 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.984575984 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.984608082 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5082. 2024/01/29 15:20:36.984610172 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5082 has ended. Freeing all resources. 2024/01/29 15:20:36.984612598 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.984615082 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.984637372 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49395/226 Remove IO ctx and close socket, id [2B00003F] 2024/01/29 15:20:36.992877813 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5083) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.992880051 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.992881955 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.992885499 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.992888695 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.992924532 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5083. 2024/01/29 15:20:36.992926566 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5083 has ended. Freeing all resources. 2024/01/29 15:20:36.992929134 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.992931664 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.993045884 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5084) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:36.993047412 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:36.993049156 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:36.993060224 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:36.993073702 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:36.993105952 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5084. 2024/01/29 15:20:36.993107962 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5084 has ended. Freeing all resources. 2024/01/29 15:20:36.993110320 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:36.993112770 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:36.993135924 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49396/226 Remove IO ctx and close socket, id [6D000004] 2024/01/29 15:20:37.001352522 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5085) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.001354718 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.001356540 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.001359984 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.001363078 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.001397416 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5085. 2024/01/29 15:20:37.001399356 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5085 has ended. Freeing all resources. 2024/01/29 15:20:37.001401934 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.001404386 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.001510002 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5086) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.001511576 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.001513322 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.001524264 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.001527080 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.001568446 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5086. 2024/01/29 15:20:37.001570508 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5086 has ended. Freeing all resources. 2024/01/29 15:20:37.001572968 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.001575384 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.001597628 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49397/226 Remove IO ctx and close socket, id [57000023] 2024/01/29 15:20:37.012057340 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5087) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.012059390 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.012061262 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.012064808 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.012067980 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.012103812 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5087. 2024/01/29 15:20:37.012105862 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5087 has ended. Freeing all resources. 2024/01/29 15:20:37.012108426 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.012110934 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.012213020 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5088) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.012214518 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.012216192 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.012227172 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.012229948 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.012259916 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5088. 2024/01/29 15:20:37.012261898 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5088 has ended. Freeing all resources. 2024/01/29 15:20:37.012274498 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.012277032 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.012297218 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49398/226 Remove IO ctx and close socket, id [31000036] 2024/01/29 15:20:37.022369718 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5089) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.022372020 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.022373938 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.022377488 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.022380604 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.022416936 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5089. 2024/01/29 15:20:37.022418928 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5089 has ended. Freeing all resources. 2024/01/29 15:20:37.022421512 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.022424064 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.022529378 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A508A) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.022530848 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.022532586 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.022543786 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.022546594 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.022577552 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A508A. 2024/01/29 15:20:37.022579534 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A508A has ended. Freeing all resources. 2024/01/29 15:20:37.022585790 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.022588178 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.022614128 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49399/226 Remove IO ctx and close socket, id [38000008] 2024/01/29 15:20:37.083095576 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49483/226 IO state NEW -> READING 2024/01/29 15:20:37.084681959 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49483/226 Read event, Message ready 2024/01/29 15:20:37.084710645 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:20:37.084715769 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:20:37.084719741 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49483/226 IO state READING -> WRITING 2024/01/29 15:20:37.084751411 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49483/226 IO state WRITING -> END 2024/01/29 15:20:37.084756469 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49483/226 Remove IO ctx and close socket, id [A200003A] 2024/01/29 15:20:37.454567394 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A508B) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.454571686 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.454574116 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.454578666 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.454582376 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.454631434 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A508B. 2024/01/29 15:20:37.454633928 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A508B has ended. Freeing all resources. 2024/01/29 15:20:37.454637538 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.454640376 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.454872480 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A508C) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.454874614 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.454876534 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.454890672 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.454893518 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.454929726 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A508C. 2024/01/29 15:20:37.454931752 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A508C has ended. Freeing all resources. 2024/01/29 15:20:37.454934396 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.454936954 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.454968232 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49402/226 Remove IO ctx and close socket, id [2B000026] 2024/01/29 15:20:37.464338601 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A508D) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.464340807 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.464354817 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.464358607 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.464361721 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.464398049 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A508D. 2024/01/29 15:20:37.464400143 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A508D has ended. Freeing all resources. 2024/01/29 15:20:37.464402839 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.464405431 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.464513545 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A508E) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.464515205 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.464516925 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.464527661 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.464530465 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.464561415 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A508E. 2024/01/29 15:20:37.464563419 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A508E has ended. Freeing all resources. 2024/01/29 15:20:37.464565801 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.464568305 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.464600233 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49403/226 Remove IO ctx and close socket, id [63000011] 2024/01/29 15:20:37.477055467 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A508F) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.477057471 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.477059335 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.477062743 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.477076403 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.477111173 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A508F. 2024/01/29 15:20:37.477113175 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A508F has ended. Freeing all resources. 2024/01/29 15:20:37.477115819 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.477118299 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.477235963 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5090) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:37.477237653 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:37.477239323 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:37.477249925 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:37.477252721 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:37.477282523 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5090. 2024/01/29 15:20:37.477284517 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5090 has ended. Freeing all resources. 2024/01/29 15:20:37.477286867 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:37.477289287 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:37.477336185 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49404/226 Remove IO ctx and close socket, id [77000031] 2024/01/29 15:20:37.509378232 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49484/226 IO state NEW -> READING 2024/01/29 15:20:37.510524321 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49484/226 Read event, Message ready 2024/01/29 15:20:37.510565883 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:20:37.510571179 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:20:37.510575173 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49484/226 IO state READING -> WRITING 2024/01/29 15:20:37.510605965 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49484/226 IO state WRITING -> END 2024/01/29 15:20:37.510608879 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49484/226 Remove IO ctx and close socket, id [C1000022] 2024/01/29 15:20:39.221117708 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:20:39.221193675 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:20:45.923943937 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER:94000904] Processing CoA request under Command Handler ctx. 2024/01/29 15:20:45.923960455 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER] Storing coa type in auth mgr context 2024/01/29 15:20:45.923970507 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER:94000904] Requesting a disconnect 2024/01/29 15:20:45.923975867 {wncd_x_R0-0}{2}: [aaa-coa] [17787]: (info): radius coa proxy relay coa resp(wncd) 2024/01/29 15:20:45.923979031 {wncd_x_R0-0}{2}: [aaa-coa] [17787]: (info): CoA Response Details 2024/01/29 15:20:45.923986185 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): << error-cause 0 1 [Success]>> 2024/01/29 15:20:45.923990067 {wncd_x_R0-0}{2}: [aaa-coa] [17787]: (info): server:10.10.3.10 cfg_saddr:10.10.3.10 udpport:11586 sport:0, tableid:0iden:221 rad_code:40 msg_auth_rcvd:TRUE coa_resp:ACK 2024/01/29 15:20:45.924054845 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER] CoA response sent 2024/01/29 15:20:45.924060947 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER:94000904] Identity preserved: mac (be02.5e92.570f), ip (0), audit_sid (0A030A0A0000757555CEDA30), aaa_session_id (0) 2024/01/29 15:20:45.924110567 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String processed 2024/01/29 15:20:45.924152493 {smd_R0-0}{2}: [aaa-coa] [18889]: (info): ++++++ Received CoA response Attribute List ++++++ 2024/01/29 15:20:45.924196619 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS(00000000): Send Disconnect Ack Response to 10.10.1.10:11586 id 221, len 44 2024/01/29 15:20:45.924210289 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: authenticator 1d a9 77 d8 e4 9b 56 31 - 87 1d 5d 0d e2 79 b7 5c 2024/01/29 15:20:45.924216951 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: Dynamic-Author-Error-Cause[101] 6 Success [200] 2024/01/29 15:20:45.924219739 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:20:45.924248899 {smd_R0-0}{2}: [aaa-pod] [18889]: (info): CoA response source port = 0, udpport = 11586, 2024/01/29 15:20:45.924666819 {wncd_x_R0-0}{2}: [epm-acl] [17787]: (info): [0000.0000.0000:unknown] Filter-Id : not present 2024/01/29 15:20:45.924696612 {wncd_x_R0-0}{2}: [webauth-sess] [17787]: (info): deleting webauth info from ipv4 hash table for vrf id 0, ipv4 vrf table id 0 2024/01/29 15:20:45.925040218 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT] Not a webauth call 2024/01/29 15:20:45.925072284 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Initiate STOP record for wireless client 2024/01/29 15:20:45.925108478 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type STOP) 2024/01/29 15:20:45.925126622 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:20:45.925131338 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:20:45.925189980 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:20:45.925350944 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:94000904] NULL ATTR LIST 2024/01/29 15:20:45.925810689 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER] Identity preserved: mac (be02.5e92.570f), ip (0), audit_sid (0A030A0A0000757555CEDA30), aaa_session_id (0) 2024/01/29 15:20:45.926006259 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_WEBAUTH_PENDING -> S_SANET_DELETED 2024/01/29 15:20:45.926015869 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_DELETE' on (be02.5e92.570f) 2024/01/29 15:20:45.926019571 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received ABORT event from Auth Mgr for (be02.5e92.570f) 2024/01/29 15:20:45.926022031 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB success: get auth state TERMINATE 2024/01/29 15:20:45.926044555 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Freed MAB client context 2024/01/29 15:20:45.926139345 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/111, len 822 2024/01/29 15:20:45.926149185 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 33 69 76 48 76 0a 6c 3d - 1d a6 29 04 e7 fd 84 51 2024/01/29 15:20:45.926153521 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:45.926157787 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:20:45.926160437 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:20:45.926163539 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:20:45.926165865 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:20:45.926168835 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:20:45.926171167 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:45.926174045 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:20:45.926176341 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:45.926179369 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:20:45.926181687 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:20:45.926184607 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:20:45.926186995 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 132 2024/01/29 15:20:45.926191123 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 126 "http-tlv= " 2024/01/29 15:20:45.926193511 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:45.926196649 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dhcp-option= " 2024/01/29 15:20:45.926205909 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:20:45.926208457 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IPv6-Address [168] 18 ... 2024/01/29 15:20:45.926236727 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:20:45.926239155 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:20:45.926242415 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757555CEDA30" 2024/01/29 15:20:45.926244777 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:20:45.926247817 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:20:45.926250141 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:20:45.926253305 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:20:45.926256539 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:20:45.926259685 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:20:45.926264137 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:20:45.926267851 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:20:45.926271449 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:20:45.926273597 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:45.926276543 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:20:45.926278829 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:20:45.926281971 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:20:45.926284623 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:20:45.926287813 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:20:45.926291189 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:20:45.926294327 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8a" 2024/01/29 15:20:45.926301649 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Octets [42] 6 0 2024/01/29 15:20:45.926304745 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Giga-Words[52] 6 0 2024/01/29 15:20:45.926307915 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Octets [43] 6 0 2024/01/29 15:20:45.926310953 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Giga-Words[53] 6 0 2024/01/29 15:20:45.926314027 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Packets [47] 6 0 2024/01/29 15:20:45.926317299 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Packets [48] 6 0 2024/01/29 15:20:45.926320777 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:20:45.926339173 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Terminate-Cause[49] 6 admin-reset [6] 2024/01/29 15:20:45.926341707 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:20:45.926385555 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Stop [2] 2024/01/29 15:20:45.926388857 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541645 2024/01/29 15:20:45.926392099 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Time [46] 6 12 2024/01/29 15:20:45.926395015 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:20:45.926444689 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:20:45.926463321 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (info): MAC: be02.5e92.570f Deleting the client, reason: 13, CO_CLIENT_DELETE_REASON_ADMIN_RESET, Client state S_CO_L3_AUTH_IN_PROGRESS 2024/01/29 15:20:45.926624965 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Client delete initiated. Reason: CO_CLIENT_DELETE_REASON_ADMIN_RESET, details: , fsm-state transition 00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|01|05|0f|07|15|1a|1b|2c|37|46|48|4a|4c|51|60|61|9f| 2024/01/29 15:20:45.926740619 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Delete mobile payload sent for BSSID: 34b8.8369.e68e WTP mac: 34b8.8369.e680 slot id: 1 2024/01/29 15:20:45.926751667 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_AUTH_IN_PROGRESS -> S_CO_DELETE_IN_PROGRESS 2024/01/29 15:20:45.926814112 {wncd_x_R0-0}{2}: [ewlc-qos-voice] [17787]: (info): MAC: be02.5e92.570f Successfully freed the bw for sip client 2024/01/29 15:20:45.926872350 {wncd_x_R0-0}{2}: [multicast-main] [17787]: (info): MAC: be02.5e92.570f No Flex/Fabric main record exists for client 2024/01/29 15:20:45.927009566 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: be02.5e92.570f vlan_mode_api: Sanet policy returned failure 2024/01/29 15:20:45.927091728 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_DELETE_IN_PROGRESS 2024/01/29 15:20:45.927216762 {wncd_x_R0-0}{2}: [dpath_svc] [17787]: (note): MAC: be02.5e92.570f Client datapath entry deleted for ifid 0xa0000064 2024/01/29 15:20:45.927232408 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_LOCAL -> S_MA_DELETE_PROCESSED_TR on E_MA_CO_DELETE_RCVD 2024/01/29 15:20:45.927269250 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Invalid transmitter ip in build client context 2024/01/29 15:20:45.927320276 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Sending handoff_end of XID (0) to (MobilityD[0]) 2024/01/29 15:20:45.927417538 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Received handoff_end, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:45.927522732 {mobilityd_R0-0}{2}: [mm-transition] [18338]: (info): MAC: be02.5e92.570f MMFSM transition: S_MC_RUN -> S_MC_HANDOFF_END_RCVD_TR on E_MC_HANDOFF_END_RCVD from WNCD[0] 2024/01/29 15:20:45.928048295 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending pmk_delete of XID (0) to (MobilityD[0]) 2024/01/29 15:20:45.928101869 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received pmk_delete, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:45.928145439 {mobilityd_R0-0}{2}: [mm-dgram-io] [18338]: (debug): MAC: 0000.0000.0000 Sending message: pmk_delete to group: default 2024/01/29 15:20:45.928245099 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_SANET_DELETED -> S_AUTHIF_DELETED 2024/01/29 15:20:45.928273413 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Total length of Deauth/Disassoc: 2 2024/01/29 15:20:45.928358887 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Sent disassoc to client, disassoc reason: 252, CLIENT_DEAUTH_REASON_ADMIN_RESET delete reason: 13, CO_CLIENT_DELETE_REASON_ADMIN_RESET. 2024/01/29 15:20:45.928361197 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Total length of Deauth/Disassoc: 2 2024/01/29 15:20:45.928435703 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Sent deauth to client, deauth reason: 252, CLIENT_DEAUTH_REASON_ADMIN_RESET delete reason: 13, CO_CLIENT_DELETE_REASON_ADMIN_RESET. 2024/01/29 15:20:45.928533889 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_DELETED 2024/01/29 15:20:45.928729495 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:20:45.928828737 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:20:45.928925520 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_DELETE_IN_PROGRESS -> S_CO_DELETED 2024/01/29 15:20:45.929789060 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/111 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:20:45.929798798 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 98 59 60 22 a9 05 6c 99 - 32 95 7f 4c 49 f0 7f 90 2024/01/29 15:20:45.929819540 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:20:46.293442821 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 map external to internal ie type. Unsupported IE received, skip decode . IE Type :199 2024/01/29 15:20:46.293444369 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(4) received 2024/01/29 15:20:46.293456883 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(2) received 2024/01/29 15:20:46.293616725 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Association received. BSSID 34b8.8369.e68e, WLAN Al Mirqab, Slot 1 AP 34b8.8369.e680, WAP-115, Site tag 681-site, Policy tag default-policy-tag, Policy profile ALMIRQAB, Switching Central 2024/01/29 15:20:46.293659241 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received Dot11 association request. Processing started,SSID: Al Mirqab, Policy profile: ALMIRQAB, AP Name: WAP-115, Ap Mac Address: 34b8.8369.e680BSSID MAC0000.0000.0000wlan ID: 5RSSI: -35, SNR: 35 2024/01/29 15:20:46.293790336 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_INIT -> S_CO_ASSOCIATING 2024/01/29 15:20:46.293977700 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2 2024/01/29 15:20:46.293980556 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f WiFi direct: Dot11 validate P2P IE. P2P IE not present. 2024/01/29 15:20:46.294162212 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_INIT -> S_DOT11_MAB_PENDING 2024/01/29 15:20:46.294188634 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_ASSOCIATING -> S_CO_MACAUTH_IN_PROGRESS 2024/01/29 15:20:46.294217438 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f MAB Authentication initiated. Policy VLAN 0, AAA override = 1, NAC = 1 2024/01/29 15:20:46.294286168 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Session Start event called from SANET-SHIM, vlan: 0 2024/01/29 15:20:46.294305206 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Wireless session sequence, create context with method MAB 2024/01/29 15:20:46.294331824 {wncd_x_R0-0}{2}: [auth-mgr-feat_wireless] [17787]: (info): [be02.5e92.570f:capwap_90000257] - authc_list: WebAuthz 2024/01/29 15:20:46.294334820 {wncd_x_R0-0}{2}: [auth-mgr-feat_wireless] [17787]: (info): [be02.5e92.570f:capwap_90000257] - authz_list: Not present under wlan configuration 2024/01/29 15:20:46.294354160 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_INIT -> S_AUTHIF_AWAIT_MAB_AUTH_START_RESP 2024/01/29 15:20:46.294466448 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:unknown] auth mgr attr add/change notification is received for attr iif-id(952) 2024/01/29 15:20:46.294505808 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr swbidb(1263) 2024/01/29 15:20:46.294536954 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr aaa-unique-id(220) 2024/01/29 15:20:46.294558784 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr iif-id(952) 2024/01/29 15:20:46.294569370 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Retrieved Client IIF ID 0xb40008ad 2024/01/29 15:20:46.294598200 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr audit-session-id(819) 2024/01/29 15:20:46.294606366 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Allocated audit session id 0A030A0A0000757655CF1C81 2024/01/29 15:20:46.294865767 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type found in cache iPhone 13 2024/01/29 15:20:46.294870915 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old device-type not classified earlier & Device name for the session is detected as iPhone 13 and old device-name not classified earlier & Old protocol map 0 and new is 1025 2024/01/29 15:20:46.294936161 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending device_cache_update of XID (0) to (MobilityD[0]) 2024/01/29 15:20:46.295003653 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Applying Svc Templ wlan_svc_ALMIRQAB_local (ML:NONE) 2024/01/29 15:20:46.295008937 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received device_cache_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:46.295196603 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr vlan-id(965) 2024/01/29 15:20:46.295213599 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Vlan tag name is GUEST, pref is 1048575 vlan num is 102 2024/01/29 15:20:46.295259081 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM Vlan PLUG-IN) has been started (status Success) 2024/01/29 15:20:46.295270353 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Reauth Plugin: Received valid timeout = 86400, effective timeout = 86400 2024/01/29 15:20:46.295291993 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (SM Reauth PLUG-IN) has been started (status Success) 2024/01/29 15:20:46.295360109 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Response of epm is SYNC with return code Success 2024/01/29 15:20:46.295408159 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raising ext evt Template Activated (9) on this session, client (unknown) (0) 2024/01/29 15:20:46.295503093 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:20:46.295544701 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: SVM Apply user profile 2024/01/29 15:20:46.295683147 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB authentication started for be02.5e92.570f 2024/01/29 15:20:46.295689315 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Idle' to 'Running' 2024/01/29 15:20:46.295693351 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Method mab changing state from 'Not run' to 'Running' 2024/01/29 15:20:46.300396686 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM will not send event Template Activated to PRE for 0x4C000891 2024/01/29 15:20:46.300433564 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_AWAIT_MAB_AUTH_START_RESP -> S_AUTHIF_MAB_AUTH_PENDING 2024/01/29 15:20:46.300443458 {wncd_x_R0-0}{2}: [ewlc-infra-evq] [17787]: (note): Authentication Success. Resolved Policy bitmap:11 for client be02.5e92.570f 2024/01/29 15:20:46.300447124 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_MAB_AUTH_PENDING -> S_AUTHIF_MAB_AUTH_PENDING 2024/01/29 15:20:46.300482158 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_CONTINUE' on (be02.5e92.570f) 2024/01/29 15:20:46.300536282 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as Un-Classified Device and old iPhone 13 & Device name for the session is detected as Unknown Device and old iPhone 13 & Old protocol map 1025 and new is 1 2024/01/29 15:20:46.300551456 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:20:46.300782258 {wncd_x_R0-0}{2}: [caaa-author] [17787]: (info): [CAAA:AUTHOR:4c000891] NULL ATTR LIST 2024/01/29 15:20:46.300978038 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Access-Request to 10.10.1.10:1812 id 0/119, len 418 2024/01/29 15:20:46.300987930 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 5a 7f f0 ab 59 dc 4e 47 - 97 88 07 b7 09 30 07 d8 2024/01/29 15:20:46.300999056 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 14 "be025e92570f" 2024/01/29 15:20:46.301002350 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Password [2] 18 * 2024/01/29 15:20:46.301009700 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Service-Type [6] 6 Call Check [10] 2024/01/29 15:20:46.301012556 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 31 2024/01/29 15:20:46.301016388 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 25 "service-type=Call Check" 2024/01/29 15:20:46.301020750 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-MTU [12] 6 1485 2024/01/29 15:20:46.301023220 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:20:46.301047284 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: EAP-Key-Name [102] 2 * 2024/01/29 15:20:46.301052248 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:20:46.301055710 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:20:46.301058082 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:20:46.301061414 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:20:46.301063698 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:20:46.301066758 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "client-iif-id=3019901101" 2024/01/29 15:20:46.301069054 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:20:46.301072050 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:20:46.301076452 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:20:46.301080208 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:20:46.301083624 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:20:46.301085664 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:46.301088822 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:20:46.301094758 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:20:46.301097916 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:20:46.301101192 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 29 "34-b8-83-69-e6-80:Al Mirqab" 2024/01/29 15:20:46.301104352 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:20:46.301107002 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:20:46.301110146 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:20:46.301113398 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:20:46.301164543 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:20:46.310316085 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1812/119 10.10.1.10:0, Access-Accept, len 456 2024/01/29 15:20:46.310336487 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 5d 29 a3 89 cd ba c9 bd - a2 89 b7 6f b4 c5 5c 3c 2024/01/29 15:20:46.310354549 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:20:46.310357833 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:20:46.310400851 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:20:46.310424547 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:20:46.310428123 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "url-filter-preauth=URL_FILTER" 2024/01/29 15:20:46.310430621 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 36 2024/01/29 15:20:46.310433649 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 30 "url-filter-preauth=GUEST_URL" 2024/01/29 15:20:46.310435955 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:46.310438879 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "url-redirect-acl=REDIRECT" 2024/01/29 15:20:46.310446535 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 199 2024/01/29 15:20:46.310450825 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 193 "url-redirect=https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757655CF1C81&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=bb0708060fb4abae1bd94b74d6f7be72" 2024/01/29 15:20:46.310453331 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:46.310456589 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "profile-name=Apple-iPhone" 2024/01/29 15:20:46.310486121 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:20:46.310652052 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB received an Access-Accept for (be02.5e92.570f) 2024/01/29 15:20:46.310664130 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_RESULT' on (be02.5e92.570f) 2024/01/29 15:20:46.310696262 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Authc success from MAB, Auth event success 2024/01/29 15:20:46.310706722 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event APPLY_USER_PROFILE (14) 2024/01/29 15:20:46.310711480 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event RX_METHOD_AUTHC_SUCCESS (3) 2024/01/29 15:20:46.310759948 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : username 0 "BE-02-5E-92-57-0F" 2024/01/29 15:20:46.310776012 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : class 0 43 41 43 53 3a 30 41 30 33 30 41 30 41 30 30 30 30 37 35 37 36 35 35 43 46 31 43 38 31 3a 6d 79 36 38 31 2d 69 73 65 30 30 31 2f 34 39 35 33 38 31 33 33 30 2f 33 37 36 30 32 35 2024/01/29 15:20:46.310783040 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : Message-Authenticator 0 2024/01/29 15:20:46.310784554 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-filter-preauth 0 "URL_FILTER" 2024/01/29 15:20:46.310785916 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-filter-preauth 0 "GUEST_URL" 2024/01/29 15:20:46.310787324 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-redirect-acl 0 "REDIRECT" 2024/01/29 15:20:46.310788868 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : url-redirect 0 "https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757655CF1C81&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=bb0708060fb4abae1bd94b74d6f7be72" 2024/01/29 15:20:46.310790468 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : dnis 0 "34-B8-83-69-E6-80" 2024/01/29 15:20:46.310791944 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : formatted-clid 0 "BE-02-5E-92-57-0F" 2024/01/29 15:20:46.310793388 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : audit-session-id 0 "0A030A0A0000757655CF1C81" 2024/01/29 15:20:46.310795332 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : method 0 2 [mab] 2024/01/29 15:20:46.310798206 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : clid-mac-addr 0 be 02 5e 92 57 0f 2024/01/29 15:20:46.310799956 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : intf-id 0 2415919703 (0x90000257) 2024/01/29 15:20:46.310847060 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr username(450) 2024/01/29 15:20:46.310870034 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update username BE-02-5E-92-57-0F 2024/01/29 15:20:46.310882720 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received User-Name BE-02-5E-92-57-0F for client be02.5e92.570f 2024/01/29 15:20:46.310905288 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr auth-domain(954) 2024/01/29 15:20:46.310921810 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Method mab changing state from 'Running' to 'Authc Success' 2024/01/29 15:20:46.310925742 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Running' to 'Authc Success' 2024/01/29 15:20:46.310986498 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: SVM Apply user profile 2024/01/29 15:20:46.311193170 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Activating EPM features with UP 2024/01/29 15:20:46.311303254 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] Username BE-02-5E-92-57-0F received 2024/01/29 15:20:46.311320644 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM MISC PLUG-IN) has been started (status Success) 2024/01/29 15:20:46.311350980 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (SM ACCOUNTING PLUG-IN) has been started (status Success) 2024/01/29 15:20:46.311419118 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (Urlfilter Plugin) has been started (status Success) 2024/01/29 15:20:46.311489308 {wncd_x_R0-0}{2}: [webauth-dev] [17787]: (info): Central Webauth URL Redirect, Received a request to create a CWA session for a mac [be:02:5e:92:57:0f] 2024/01/29 15:20:46.311531054 {wncd_x_R0-0}{2}: [auth-mgr-feat_wireless] [17787]: (info): [0000.0000.0000:unknown] Retrieved zone id 0x0 for bssid 12364632847460343011 2024/01/29 15:20:46.311536186 {wncd_x_R0-0}{2}: [webauth-dev] [17787]: (info): Parameter map associated with mac be02.5e92.570f is global 2024/01/29 15:20:46.311542716 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 0.0.0.0]Param-map used: global 2024/01/29 15:20:46.311546884 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 0.0.0.0]State Invalid State -> INIT 2024/01/29 15:20:46.311569790 {wncd_x_R0-0}{2}: [epm-redirect] [17787]: (info): [0000.0000.0000:unknown] URL-Redirect = https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757655CF1C81&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=bb0708060fb4abae1bd94b74d6f7be72 2024/01/29 15:20:46.312016363 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM URL PLUG-IN) has been started (status Success) 2024/01/29 15:20:46.312067831 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Response of epm is SYNC with return code Success 2024/01/29 15:20:46.312115475 {wncd_x_R0-0}{2}: [svm] [17787]: (info): [be02.5e92.570f] Applied User Profile: : 2024/01/29 15:20:46.312119539 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: method 0 2 [mab] 2024/01/29 15:20:46.312122457 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: clid-mac-addr 0 be 02 5e 92 57 0f 2024/01/29 15:20:46.312124047 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: intf-id 0 2415919703 (0x90000257) 2024/01/29 15:20:46.312125521 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: username 0 "BE-02-5E-92-57-0F" 2024/01/29 15:20:46.312140983 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: class 0 43 41 43 53 3a 30 41 30 33 30 41 30 41 30 30 30 30 37 35 37 36 35 35 43 46 31 43 38 31 3a 6d 79 36 38 31 2d 69 73 65 30 30 31 2f 34 39 35 33 38 31 33 33 30 2f 33 37 36 30 32 35 2024/01/29 15:20:46.312142421 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-filter-preauth 0 "URL_FILTER" 2024/01/29 15:20:46.312143749 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-filter-preauth 0 "GUEST_URL" 2024/01/29 15:20:46.312145121 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-redirect-acl 0 "REDIRECT" 2024/01/29 15:20:46.312146519 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: url-redirect 0 "https://portal.myalmirqab.com:8443/portal/gateway?sessionId=0A030A0A0000757655CF1C81&portal=a18f8300-ec46-4104-b28b-4d3f64a746ab&action=cwa&token=bb0708060fb4abae1bd94b74d6f7be72" 2024/01/29 15:20:46.312379421 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:20:46.312467557 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] User Profile applied successfully - REPLACE 2024/01/29 15:20:46.312550699 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr method(757) 2024/01/29 15:20:46.312583677 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event AUTHZ_SUCCESS (11) 2024/01/29 15:20:46.312590351 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Authc Success' to 'Authz Success' 2024/01/29 15:20:46.312657768 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f MAB Authentication success. AAA override = True, PPSK = True 2024/01/29 15:20:46.312678632 {wncd_x_R0-0}{2}: [client-auth] [17787]: (ERR): MAC: be02.5e92.570f passphrase length is zero. Unable to generate the PMK for ppsk client. 2024/01/29 15:20:46.312680248 {wncd_x_R0-0}{2}: [client-auth] [17787]: (ERR): MAC: be02.5e92.570f Failed to generate PMK for ppsk,Post MAC Auth err: Invalid argument 2024/01/29 15:20:46.312682054 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_MAB_AUTH_PENDING -> S_AUTHIF_MAB_AUTH_DONE 2024/01/29 15:20:46.312737628 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Processing MAB authentication result status: 0, CO_AUTH_STATUS_SUCCESS 2024/01/29 15:20:46.312768628 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_MACAUTH_IN_PROGRESS -> S_CO_ASSOCIATING 2024/01/29 15:20:46.312780968 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f dot11 send association response. Framing association response with resp_status_code: 0 2024/01/29 15:20:46.312782072 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Dot11 capability privacy bit set TRUE 2024/01/29 15:20:46.312788774 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f Dot11 Capability info byte1 11, byte2: 1 2024/01/29 15:20:46.312836924 {wncd_x_R0-0}{2}: [dot11-frame] [17787]: (info): MAC: be02.5e92.570f WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled 2024/01/29 15:20:46.312941734 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f dot11 send association response. Sending assoc response of length: 270 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS 2024/01/29 15:20:46.312949624 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Association success. AID 4, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False 2024/01/29 15:20:46.312968928 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_MAB_PENDING -> S_DOT11_ASSOCIATED 2024/01/29 15:20:46.313018666 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Station Dot11 association is successful. 2024/01/29 15:20:46.313061856 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Starting L2 authentication. Bssid in state machine:34b8.8369.e68e Bssid in request is:34b8.8369.e68e 2024/01/29 15:20:46.313089098 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_ASSOCIATING -> S_CO_L2_AUTH_IN_PROGRESS 2024/01/29 15:20:46.313194344 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:20:46.313349330 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:46.313361966 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:46.313396042 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:20:46.313406194 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_MAB_AUTH_DONE -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM 2024/01/29 15:20:46.316529187 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM -> S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING 2024/01/29 15:20:46.316618437 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M1 Sent successfully 2024/01/29 15:20:46.316621685 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_INITPMK -> S_PTK_START 2024/01/29 15:20:46.322212345 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending pmk_update of XID (0) to (MobilityD[0]) 2024/01/29 15:20:46.322239895 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M2 Status: EAP key M2 validation success 2024/01/29 15:20:46.322306437 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received pmk_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:46.322377783 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M3 Sent successfully 2024/01/29 15:20:46.322380125 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTK_START -> S_PTKINITNEGOTIATING 2024/01/29 15:20:46.322432653 {mobilityd_R0-0}{2}: [mm-dgram-io] [18338]: (debug): MAC: 0000.0000.0000 Sending message: pmk_update to group: default 2024/01/29 15:20:46.325206827 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M4 Status: EAP key M4 validation is successful 2024/01/29 15:20:46.325209201 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (note): MAC: be02.5e92.570f EAP Key management successful. AKM:FT-PSK Cipher:CCMP WPA Version: WPA2 2024/01/29 15:20:46.325225673 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITNEGOTIATING -> S_PTKINITDONE 2024/01/29 15:20:46.325299874 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING -> S_AUTHIF_L2_WEBAUTH_DONE 2024/01/29 15:20:46.325312468 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f L2 Authentication of station is successful., L3 Authentication : 1 2024/01/29 15:20:46.325395314 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Mobility discovery triggered. Client mode: Local 2024/01/29 15:20:46.325398606 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_MOBILITY_DISCOVERY_IN_PROGRESS 2024/01/29 15:20:46.325414344 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_INIT -> S_MA_MOBILITY_DISCOVERY_PROCESSED_TR on E_MA_MOBILITY_DISCOVERY 2024/01/29 15:20:46.325471814 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Invalid transmitter ip in build client context 2024/01/29 15:20:46.325595158 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Sending mobile_announce of XID (0) to (MobilityD[0]) 2024/01/29 15:20:46.325665220 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Received mobile_announce, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:20:46.325862252 {mobilityd_R0-0}{2}: [mm-transition] [18338]: (info): MAC: be02.5e92.570f MMFSM transition: S_MC_INIT -> S_MC_ANNOUNCE_PROCESSED_NEW_CLIENT_TR on E_MC_ANNOUNCE_RCVD from WNCD[0] 2024/01/29 15:20:46.325942394 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Add MCC by tdl mac: client_ifid 0xa0000064 is assigned to client 2024/01/29 15:20:46.325957378 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: be02.5e92.570f Sending capwap_msg_unknown (100) of XID (84686) to (WNCD[0]) 2024/01/29 15:20:46.325997950 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Sending mobile_announce_nak of XID (84686) to (WNCD[0]) 2024/01/29 15:20:46.326057442 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Received mobile_announce_nak, sub type: 1 of XID (84686) from (MobilityD[0]) 2024/01/29 15:20:46.326100202 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_INIT_WAIT_ANNOUNCE_RSP -> S_MA_NAK_PROCESSED_TR on E_MA_NAK_RCVD 2024/01/29 15:20:46.326111010 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Roam type changed - None -> None 2024/01/29 15:20:46.326123694 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Mobility role changed - Unassoc -> Local 2024/01/29 15:20:46.326194522 {wncd_x_R0-0}{2}: [mm-client] [17787]: (note): MAC: be02.5e92.570f Mobility Successful. Roam Type None, Sub Roam Type MM_SUB_ROAM_TYPE_NONE, Client IFID: 0xa0000064, Client Role: Local PoA: 0x90000257 PoP: 0x0 2024/01/29 15:20:46.326215050 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Processing mobility response from MMIF. Client ifid: 0xa0000064, roam type: None, client role: Local 2024/01/29 15:20:46.326486177 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:20:46.326546857 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:46.326563987 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:46.326609419 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:20:46.326611211 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:20:46.326633007 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x72 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:20:46.326672255 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_MOBILITY_DISCOVERY_IN_PROGRESS -> S_CO_DPATH_PLUMB_IN_PROGRESS 2024/01/29 15:20:46.326777407 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Client datapath entry params - ssid:Al Mirqab,slot_id:1 bssid ifid: 0x90000254, radio_ifid: 0x900001f6, wlan_ifid: 0xf0400005 2024/01/29 15:20:46.326827507 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:20:46.326851337 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link Local Bridging not enabled for client 2024/01/29 15:20:46.326852477 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS dpath create params 2024/01/29 15:20:46.326909787 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:46.326914153 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:20:46.326923757 {wncd_x_R0-0}{2}: [avc-afc] [17787]: (debug): AVC enabled for client be02.5e92.570f 2024/01/29 15:20:46.327056737 {wncd_x_R0-0}{2}: [dpath_svc] [17787]: (note): MAC: be02.5e92.570f Client datapath entry created for ifid 0xa0000064 2024/01/29 15:20:46.327119381 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS -> S_CO_IP_LEARN_IN_PROGRESS 2024/01/29 15:20:46.327243197 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_INIT -> S_IPLEARN_IN_PROGRESS 2024/01/29 15:20:46.327817596 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dot11-device-info(1337) 2024/01/29 15:20:46.327845154 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:20:46.327847620 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update dot11-device-info 2024/01/29 15:20:46.328063696 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old iPhone 13 & Device name for the session is detected as iPhone 13 and old iPhone 13 & Old protocol map 1025 and new is 1025 2024/01/29 15:20:46.328072660 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:20:46.337448811 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE -> S_AUTHIF_L2_WEBAUTH_DONE 2024/01/29 15:20:46.347138498 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 ND probe: Multicast DAD NS outgoing interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAc: 3333.ff0a.6699 Ipv6 SRC: ff02::1:ff0a:6699 IPv6 DST: ff02::1:ff0a:6699 2024/01/29 15:20:46.347187232 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:20:47.189408274 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: ARP Probe outgoing interface capwap_90000257 on vlan 102 ARP REQUEST, ARP sender MAC: 34b8.8369.e680 ARP target MAC: be02.5e92.570f ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:20:47.192470823 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: 34b8.8369.e680 ARP REPLY, ARP sender MAC: be02.5e92.570f ARP target MAC: 34b8.8369.e680 ARP sender IP: 10.10.102.153, ARP target IP: 0.0.0.0, 2024/01/29 15:20:47.192661445 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (note): MAC: be02.5e92.570f Client IP learn successful. Method: ARP IP: 10.10.102.153 2024/01/29 15:20:47.192690535 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr addr(8) 2024/01/29 15:20:47.192809439 {wncd_x_R0-0}{2}: [webauth-sess] [17787]: (info): [be02.5e92.570f][ 0.0.0.0]Change notif CB, Add address 10.10.102.153 [be02.5e92.570f] 2024/01/29 15:20:47.192813561 {wncd_x_R0-0}{2}: [webauth-sess] [17787]: (info): adding webauth session to ipv4 hash table for vrf id 0, ipv4 vrf table id 0 2024/01/29 15:20:47.192862329 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update addr 10.10.102.153 2024/01/29 15:20:47.192895337 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [0000.0000.0000:unknown] HDL = 0x0 vlan 102 fail count 0 dirty_counter 0 is_dirty 0 2024/01/29 15:20:47.192918971 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type START) 2024/01/29 15:20:47.192938509 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:20:47.192941711 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:20:47.192972637 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:20:47.193001147 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:20:47.193104041 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:20:47.193135049 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr session-id(408) 2024/01/29 15:20:47.193153901 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update session-id 00004d8b 2024/01/29 15:20:47.193629018 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_IN_PROGRESS -> S_IPLEARN_COMPLETE 2024/01/29 15:20:47.193755102 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/143, len 591 2024/01/29 15:20:47.193763496 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 33 26 81 d3 a0 c1 24 bb - df 88 00 f1 11 b9 ae bc 2024/01/29 15:20:47.193768044 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:47.193772392 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:20:47.193774982 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:20:47.193778124 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:20:47.193780468 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:20:47.193783564 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:20:47.193785892 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:47.193788902 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:20:47.193791192 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:20:47.193794236 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:20:47.193796524 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:20:47.193799542 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:20:47.193808902 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:20:47.193811952 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:20:47.193814326 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:20:47.193817538 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:20:47.193819842 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:20:47.193822922 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:20:47.193825268 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:20:47.193828638 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:20:47.193832010 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:20:47.193835194 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:20:47.193839734 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:20:47.193843468 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:20:47.193847066 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:20:47.193849174 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:20:47.193852146 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:20:47.193854506 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:20:47.193857486 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:20:47.193860114 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:20:47.193863320 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:20:47.193866560 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:20:47.193869676 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8b" 2024/01/29 15:20:47.193873642 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:20:47.193876184 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:20:47.193924560 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Start [1] 2024/01/29 15:20:47.193927930 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541647 2024/01/29 15:20:47.193931050 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:20:47.193973968 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:20:47.193990050 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received ip learn response. method: IPLEARN_METHOD_ARP 2024/01/29 15:20:47.194031946 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Triggered L3 authentication. status = 0x0, Success 2024/01/29 15:20:47.194035274 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_IP_LEARN_IN_PROGRESS -> S_CO_L3_AUTH_IN_PROGRESS 2024/01/29 15:20:47.194108958 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f L3 Authentication initiated. CWA 2024/01/29 15:20:47.194128076 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE -> S_AUTHIF_WEBAUTH_PENDING 2024/01/29 15:20:47.197289623 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/143 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:20:47.197299039 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator ba 50 01 5b fe 5e 9e e7 - 8c 69 26 11 3e a9 8e 1d 2024/01/29 15:20:47.197317623 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:20:47.220152285 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5091) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:47.220156693 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:47.220159055 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:47.220163539 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:47.220167573 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:47.220270543 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5091. 2024/01/29 15:20:47.220272753 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5091 has ended. Freeing all resources. 2024/01/29 15:20:47.220276511 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:47.220279395 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:47.220411137 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5092) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:47.220412937 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:47.220414755 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:47.220428645 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:47.220431581 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:47.220466017 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5092. 2024/01/29 15:20:47.220468107 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5092 has ended. Freeing all resources. 2024/01/29 15:20:47.220470579 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:47.220473021 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:47.220500885 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49408/226 Remove IO ctx and close socket, id [2A00003D] 2024/01/29 15:20:48.053636048 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5093) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:48.053639868 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:48.053642672 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:48.053647200 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:48.053651296 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:48.053704518 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5093. 2024/01/29 15:20:48.053706692 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5093 has ended. Freeing all resources. 2024/01/29 15:20:48.053710136 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:48.053725690 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:48.053825232 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5094) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:48.053826990 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:48.053828754 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:48.053842524 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:48.053845370 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:48.053878344 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5094. 2024/01/29 15:20:48.053880332 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5094 has ended. Freeing all resources. 2024/01/29 15:20:48.053882836 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:48.053885376 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:48.053918948 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49405/226 Remove IO ctx and close socket, id [9C00001C] 2024/01/29 15:20:48.064764126 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5095) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:48.064766196 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:48.064768064 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:48.064771644 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:48.064774854 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:48.064810786 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5095. 2024/01/29 15:20:48.064812794 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5095 has ended. Freeing all resources. 2024/01/29 15:20:48.064815568 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:48.064818132 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:48.064929043 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5096) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:48.064944957 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:48.064946719 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:48.064957977 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:48.064960797 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:48.064992939 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5096. 2024/01/29 15:20:48.064995057 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5096 has ended. Freeing all resources. 2024/01/29 15:20:48.064997477 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:48.064999993 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:48.065030253 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49416/226 Remove IO ctx and close socket, id [22000027] 2024/01/29 15:20:48.074711490 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5097) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:48.074713662 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:48.074715572 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:48.074718982 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:48.074722146 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:48.074758594 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5097. 2024/01/29 15:20:48.074760712 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5097 has ended. Freeing all resources. 2024/01/29 15:20:48.074763418 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:48.074765914 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:48.074876024 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5098) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:48.074877646 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:48.074879342 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:48.074901214 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:48.074904072 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:48.074936474 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5098. 2024/01/29 15:20:48.074938490 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5098 has ended. Freeing all resources. 2024/01/29 15:20:48.074940896 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:48.074943366 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:48.074965682 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49417/226 Remove IO ctx and close socket, id [05000035] 2024/01/29 15:20:51.093704801 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A5099) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:51.093708717 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:51.093711415 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:51.093716069 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:51.093720227 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:51.093772737 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A5099. 2024/01/29 15:20:51.093774839 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A5099 has ended. Freeing all resources. 2024/01/29 15:20:51.093778327 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:51.093781611 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:51.093892253 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A509A) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:51.093893727 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:51.093895569 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:51.093909643 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:51.093912467 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:51.093958455 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A509A. 2024/01/29 15:20:51.093960631 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A509A has ended. Freeing all resources. 2024/01/29 15:20:51.093963255 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:51.093965737 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:51.093992303 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49422/226 Remove IO ctx and close socket, id [7500002D] 2024/01/29 15:20:51.101950605 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A509B) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:51.101952385 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:51.101954329 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:51.101957837 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:51.101960929 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:51.101994439 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A509B. 2024/01/29 15:20:51.101996539 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A509B has ended. Freeing all resources. 2024/01/29 15:20:51.101999023 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:51.102001477 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:51.102116061 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A509C) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:51.102117643 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:51.102119419 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:51.102129921 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:51.102132685 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:51.102163463 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A509C. 2024/01/29 15:20:51.102178449 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A509C has ended. Freeing all resources. 2024/01/29 15:20:51.102181323 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:51.102183777 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:51.102216173 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49423/226 Remove IO ctx and close socket, id [66000006] 2024/01/29 15:20:51.109516404 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A509D) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:51.109518520 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:51.109520358 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:51.109523894 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:51.109526972 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:51.109561292 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A509D. 2024/01/29 15:20:51.109563294 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A509D has ended. Freeing all resources. 2024/01/29 15:20:51.109565828 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:51.109568312 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:51.109673248 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A509E) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:51.109674788 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:51.109676516 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:51.109687196 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:51.109690054 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:51.109719558 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A509E. 2024/01/29 15:20:51.109721566 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A509E has ended. Freeing all resources. 2024/01/29 15:20:51.109723816 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:51.109726186 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:51.109750582 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49424/226 Remove IO ctx and close socket, id [6A000001] 2024/01/29 15:20:58.554408054 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A509F) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:58.554412366 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:58.554414826 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:58.554419762 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:58.554424032 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:58.554477382 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A509F. 2024/01/29 15:20:58.554479514 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A509F has ended. Freeing all resources. 2024/01/29 15:20:58.554482916 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:58.554485788 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:58.554644384 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A0) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:58.554647420 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:58.554649464 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:58.554664388 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:58.554667372 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:58.554710618 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A0. 2024/01/29 15:20:58.554712894 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A0 has ended. Freeing all resources. 2024/01/29 15:20:58.554715964 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:58.554718672 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:58.554779642 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49425/226 Remove IO ctx and close socket, id [D8000028] 2024/01/29 15:20:58.565242964 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A1) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:58.565245180 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:58.565301703 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:58.565305955 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:58.565309315 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:58.565357801 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A1. 2024/01/29 15:20:58.565359877 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A1 has ended. Freeing all resources. 2024/01/29 15:20:58.565362773 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:58.565365485 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:58.565483527 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A2) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:58.565485225 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:58.565487047 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:58.565498027 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:58.565500911 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:58.565531641 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A2. 2024/01/29 15:20:58.565533625 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A2 has ended. Freeing all resources. 2024/01/29 15:20:58.565536017 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:58.565538469 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:58.565569449 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49426/226 Remove IO ctx and close socket, id [6000000F] 2024/01/29 15:20:58.575922367 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A3) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:58.575924547 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:58.575926425 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:58.575929849 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:58.575944263 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:58.575979147 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A3. 2024/01/29 15:20:58.575981215 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A3 has ended. Freeing all resources. 2024/01/29 15:20:58.575983947 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:58.575986515 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:58.576344073 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A4) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:58.576345861 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:58.576347665 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:58.576358637 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:58.576361425 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:58.576394031 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A4. 2024/01/29 15:20:58.576396047 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A4 has ended. Freeing all resources. 2024/01/29 15:20:58.576398601 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:58.576401079 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:58.576438695 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49427/226 Remove IO ctx and close socket, id [94000032] 2024/01/29 15:20:59.148583421 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A5) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:59.148586857 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:59.148589255 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:59.148593815 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:59.148597719 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:59.148663403 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A5. 2024/01/29 15:20:59.148665669 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A5 has ended. Freeing all resources. 2024/01/29 15:20:59.148669723 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:59.148672643 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:59.148783207 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A6) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:20:59.148784915 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:20:59.148786691 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:20:59.148800679 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:20:59.148803519 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:20:59.148835725 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A6. 2024/01/29 15:20:59.148837759 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A6 has ended. Freeing all resources. 2024/01/29 15:20:59.148840337 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:20:59.148842841 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:20:59.148876027 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49428/226 Remove IO ctx and close socket, id [3700001D] 2024/01/29 15:21:05.161943590 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49487/226 IO state NEW -> READING 2024/01/29 15:21:05.161961598 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49487/226 Read event, Message ready 2024/01/29 15:21:05.161990460 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:05.161995950 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State INIT -> GET_REDIRECT 2024/01/29 15:21:05.161999624 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49487/226 IO state READING -> WRITING 2024/01/29 15:21:05.162031618 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49487/226 IO state WRITING -> END 2024/01/29 15:21:05.162048030 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49487/226 Remove IO ctx and close socket, id [E9000017] 2024/01/29 15:21:05.206890476 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49488/226 IO state NEW -> READING 2024/01/29 15:21:05.207228633 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49488/226 Read event, Message ready 2024/01/29 15:21:05.207265201 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:05.207269791 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:05.207273775 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49488/226 IO state READING -> WRITING 2024/01/29 15:21:05.207305309 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49488/226 IO state WRITING -> END 2024/01/29 15:21:05.207310387 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49488/226 Remove IO ctx and close socket, id [32000005] 2024/01/29 15:21:09.106707512 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A7) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:09.106711022 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:09.106713440 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:09.106717946 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:09.106722492 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:09.106775758 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A7. 2024/01/29 15:21:09.106777938 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A7 has ended. Freeing all resources. 2024/01/29 15:21:09.106848892 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:09.106852050 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:09.106938594 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A8) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:09.106940186 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:09.106942018 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:09.106956156 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:09.106959042 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:09.106993748 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A8. 2024/01/29 15:21:09.106995814 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A8 has ended. Freeing all resources. 2024/01/29 15:21:09.106998392 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:09.107000904 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:09.107035732 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49436/226 Remove IO ctx and close socket, id [17000012] 2024/01/29 15:21:09.117929248 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50A9) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:09.117931608 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:09.117933558 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:09.117937154 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:09.117940486 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:09.117978628 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50A9. 2024/01/29 15:21:09.117980680 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50A9 has ended. Freeing all resources. 2024/01/29 15:21:09.117983412 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:09.117986044 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:09.118098366 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50AA) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:09.118111326 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:09.118113212 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:09.118124620 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:09.118127518 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:09.118160463 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50AA. 2024/01/29 15:21:09.118162491 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50AA has ended. Freeing all resources. 2024/01/29 15:21:09.118165135 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:09.118167641 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:09.118189999 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49437/226 Remove IO ctx and close socket, id [4C000025] 2024/01/29 15:21:09.127515413 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50AB) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:09.127517595 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:09.127519519 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:09.127523087 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:09.127526407 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:09.127562969 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50AB. 2024/01/29 15:21:09.127565031 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50AB has ended. Freeing all resources. 2024/01/29 15:21:09.127567813 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:09.127570371 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:09.127685368 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50AC) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:09.127686990 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:09.127688786 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:09.127711064 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:09.127713916 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:09.127746738 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50AC. 2024/01/29 15:21:09.127748810 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50AC has ended. Freeing all resources. 2024/01/29 15:21:09.127751302 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:09.127753744 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:09.127776766 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49438/226 Remove IO ctx and close socket, id [B900000C] 2024/01/29 15:21:13.880927813 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50AD) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:13.880932329 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:13.880934741 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:13.880939161 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:13.880943047 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:13.880995171 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50AD. 2024/01/29 15:21:13.880997307 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50AD has ended. Freeing all resources. 2024/01/29 15:21:13.881000815 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:13.881004161 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:13.881124967 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50AE) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:13.881126643 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:13.881128491 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:13.881142427 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:13.881145359 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:13.881192157 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50AE. 2024/01/29 15:21:13.881194299 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50AE has ended. Freeing all resources. 2024/01/29 15:21:13.881196863 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:13.881199383 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:13.881233531 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49439/226 Remove IO ctx and close socket, id [3B00002E] 2024/01/29 15:21:18.019075395 {wncd_x_R0-0}{2}: [dot11] [17787]: (ERR): MAC: be02.5e92.570f Dropping the disassoc or deauth request. 11w not enabled 2024/01/29 15:21:24.878671401 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 map external to internal ie type. Unsupported IE received, skip decode . IE Type :199 2024/01/29 15:21:24.878673029 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(4) received 2024/01/29 15:21:24.878673925 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(2) received 2024/01/29 15:21:24.878684199 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Association received. BSSID 34b8.8369.e68e, WLAN Al Mirqab, Slot 1 AP 34b8.8369.e680, WAP-115, Site tag 681-site, Policy tag default-policy-tag, Policy profile ALMIRQAB, Switching Central, old BSSID 34b8.8369.e68e 2024/01/29 15:21:24.878733061 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received Dot11 association request. Processing started,SSID: Al Mirqab, Policy profile: ALMIRQAB, AP Name: WAP-115, Ap Mac Address: 34b8.8369.e680BSSID MAC34b8.8369.e68ewlan ID: 5RSSI: -38, SNR: 35 2024/01/29 15:21:24.878770815 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_AUTH_IN_PROGRESS -> S_CO_L3_AUTH_IN_PROGRESS 2024/01/29 15:21:24.878880751 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2 2024/01/29 15:21:24.878883577 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f WiFi direct: Dot11 validate P2P IE. P2P IE not present. 2024/01/29 15:21:24.878949129 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f MAC auth is configured. But PMK is present for client. Skipping MAC auth. 2024/01/29 15:21:24.878957959 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f dot11 send association response. Framing association response with resp_status_code: 0 2024/01/29 15:21:24.878958513 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Dot11 capability privacy bit set TRUE 2024/01/29 15:21:24.878962005 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f Dot11 Capability info byte1 11, byte2: 1 2024/01/29 15:21:24.878985077 {wncd_x_R0-0}{2}: [dot11-frame] [17787]: (info): MAC: be02.5e92.570f WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled 2024/01/29 15:21:24.879087341 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f dot11 send association response. Sending assoc response of length: 270 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS 2024/01/29 15:21:24.879094585 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Association success. AID 4, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False 2024/01/29 15:21:24.879108921 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_ASSOCIATED 2024/01/29 15:21:24.879160939 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Station Dot11 association is successful. 2024/01/29 15:21:24.879188073 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Starting L2 authentication. Bssid in state machine:34b8.8369.e68e Bssid in request is:34b8.8369.e68e 2024/01/29 15:21:24.879200429 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_AUTH_IN_PROGRESS -> S_CO_L2_AUTH_IN_PROGRESS 2024/01/29 15:21:24.879334590 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:21:24.879398930 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:24.879416640 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:24.879467490 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:21:24.879469306 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:21:24.879492738 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:21:24.879502114 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_WEBAUTH_PENDING -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM 2024/01/29 15:21:24.882521991 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM -> S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING 2024/01/29 15:21:24.882607713 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M1 Sent successfully 2024/01/29 15:21:24.882624151 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITDONE -> S_PTK_START 2024/01/29 15:21:24.887350159 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending pmk_update of XID (0) to (MobilityD[0]) 2024/01/29 15:21:24.887379225 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M2 Status: EAP key M2 validation success 2024/01/29 15:21:24.887496251 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received pmk_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:21:24.887498785 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M3 Sent successfully 2024/01/29 15:21:24.887508161 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTK_START -> S_PTKINITNEGOTIATING 2024/01/29 15:21:24.887575253 {mobilityd_R0-0}{2}: [mm-dgram-io] [18338]: (debug): MAC: 0000.0000.0000 Sending message: pmk_update to group: default 2024/01/29 15:21:24.889951094 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M4 Status: EAP key M4 validation is successful 2024/01/29 15:21:24.889953500 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (note): MAC: be02.5e92.570f EAP Key management successful. AKM:FT-PSK Cipher:CCMP WPA Version: WPA2 2024/01/29 15:21:24.889958796 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITNEGOTIATING -> S_PTKINITDONE 2024/01/29 15:21:24.890038758 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING -> S_AUTHIF_L2_WEBAUTH_DONE 2024/01/29 15:21:24.890056726 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f L2 Authentication of station is successful., L3 Authentication : 1 2024/01/29 15:21:24.890131022 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Mobility discovery triggered. Client mode: Local 2024/01/29 15:21:24.890134056 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_MOBILITY_DISCOVERY_IN_PROGRESS 2024/01/29 15:21:24.890148944 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_LOCAL -> S_MA_LOCAL on E_MA_MOBILITY_DISCOVERY 2024/01/29 15:21:24.890149684 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Mobility Role is known. Responding to CO with mobility complete 2024/01/29 15:21:24.890150274 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Mobility role changed - Local -> Local 2024/01/29 15:21:24.890150714 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Sub Roam type changed - MM_SUB_ROAM_TYPE_NONE -> MM_SUB_ROAM_TYPE_INTRA_INSTANCE 2024/01/29 15:21:24.890163906 {wncd_x_R0-0}{2}: [mm-client] [17787]: (note): MAC: be02.5e92.570f Mobility Successful. Roam Type None, Sub Roam Type MM_SUB_ROAM_TYPE_INTRA_INSTANCE, Client IFID: 0xa0000064, Client Role: Local PoA: 0x90000257 PoP: 0x0 2024/01/29 15:21:24.890182974 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Processing mobility response from MMIF. Client ifid: 0xa0000064, roam type: None, client role: Local 2024/01/29 15:21:24.890306240 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:21:24.890376048 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:24.890392880 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:24.890438810 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:21:24.890440560 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:21:24.890461378 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x72 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:21:24.890503460 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_MOBILITY_DISCOVERY_IN_PROGRESS -> S_CO_DPATH_PLUMB_IN_PROGRESS 2024/01/29 15:21:24.890660382 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS -> S_CO_IP_LEARN_IN_PROGRESS 2024/01/29 15:21:24.890731600 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE 2024/01/29 15:21:24.890769262 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received ip learn response. method: IPLEARN_METHOD_ARP 2024/01/29 15:21:24.890804814 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Triggered L3 authentication. status = 0x0, Success 2024/01/29 15:21:24.890807390 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_IP_LEARN_IN_PROGRESS -> S_CO_L3_AUTH_IN_PROGRESS 2024/01/29 15:21:24.890882469 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f L3 Authentication initiated. CWA 2024/01/29 15:21:24.890891171 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE -> S_AUTHIF_WEBAUTH_PENDING 2024/01/29 15:21:24.892047972 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dot11-device-info(1337) 2024/01/29 15:21:24.892079758 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:21:24.892082580 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update dot11-device-info 2024/01/29 15:21:24.892086848 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:21:24.892114908 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:21:24.892147422 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:21:24.892151108 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:21:24.892181926 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:21:24.892206018 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:24.892316594 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:21:24.892766742 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/15, len 627 2024/01/29 15:21:24.892775710 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 07 1c 32 83 89 f8 1b 07 - cd b3 67 93 31 d8 8a fc 2024/01/29 15:21:24.892780622 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:24.892784774 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:21:24.892787470 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:21:24.892790504 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:21:24.892792828 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:21:24.892795938 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:21:24.892798252 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:24.892801202 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:21:24.892803494 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:24.892806556 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:21:24.892813508 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:21:24.892816560 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:21:24.892821238 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:21:24.892824272 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:21:24.892826630 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:21:24.892829844 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:21:24.892832196 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:21:24.892835314 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:21:24.892837688 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:21:24.892841064 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:21:24.892844446 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:21:24.892847598 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:21:24.892852136 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:21:24.892855900 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:21:24.892859524 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:21:24.892861670 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:24.892864770 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:21:24.892867092 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:21:24.892870166 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:21:24.892872804 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:21:24.892876012 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:21:24.892879256 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:21:24.892882374 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8b" 2024/01/29 15:21:24.892889668 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Octets [42] 6 164406 2024/01/29 15:21:24.892892978 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Giga-Words[52] 6 0 2024/01/29 15:21:24.892896296 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Octets [43] 6 48285 2024/01/29 15:21:24.892899456 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Giga-Words[53] 6 0 2024/01/29 15:21:24.892902564 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Packets [47] 6 392 2024/01/29 15:21:24.892905844 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Packets [48] 6 243 2024/01/29 15:21:24.892909506 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:21:24.892912050 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:21:24.892957003 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Watchdog [3] 2024/01/29 15:21:24.892960287 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541684 2024/01/29 15:21:24.892963251 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:21:24.893012509 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:21:24.893038795 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old iPhone 13 & Device name for the session is detected as iPhone 13 and old iPhone 13 & Old protocol map 1025 and new is 1025 2024/01/29 15:21:24.893048875 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:21:24.900272973 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/15 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:21:24.900282677 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator b8 43 21 93 99 ba 02 7b - 8f 65 53 3c db bd 6d 36 2024/01/29 15:21:24.900313542 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:21:25.006617423 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.ff76.879d Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff76:879d, type: ND_NEIGHBOR_SOLICIT 2024/01/29 15:21:25.006754313 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 3333.ff76.879d Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:21:25.006899843 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.ff76.879d Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff76:879d, type: ND_NEIGHBOR_SOLICIT 2024/01/29 15:21:25.006961389 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 ND probe: Multicast DAD NS outgoing interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAc: 3333.ff76.879d Ipv6 SRC: ff02::1:ff76:879d IPv6 DST: ff02::1:ff76:879d 2024/01/29 15:21:25.006992457 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:21:25.007184491 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (ERR): Error Update denied during binding create [17] while creating SISF binding fe80::8c8:8985:eb76:879d : be02.5e92.570f from gleaned IPv6 packet vlan 102 2024/01/29 15:21:25.007334144 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: 3c26.e465.831f ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:25.007433312 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: 3c26.e465.831f ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:25.007754014 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:21:25.007830498 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST, SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: be02.5e92.570f 2024/01/29 15:21:25.007903064 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dhcp-option(1126) 2024/01/29 15:21:25.007929440 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:21:25.007931830 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update dhcp-option 2024/01/29 15:21:25.007936058 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:21:25.007971510 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:21:25.007988814 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:21:25.007991862 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:21:25.008019586 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:21:25.008038304 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:25.008152390 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:21:25.008562759 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/23, len 660 2024/01/29 15:21:25.008571229 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 93 60 77 ab cc 06 4c fd - 66 3e e3 bf 90 c5 f0 cc 2024/01/29 15:21:25.008580067 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:25.008584067 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:21:25.008586735 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:21:25.008589847 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:21:25.008592161 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:21:25.008595161 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:21:25.008597467 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:25.008600409 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:21:25.008602767 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:25.008605857 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:21:25.008608149 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:21:25.008611121 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:21:25.008613451 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:25.008616493 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dhcp-option= " 2024/01/29 15:21:25.008621351 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:21:25.008624383 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:21:25.008626743 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:21:25.008629983 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:21:25.008632301 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:21:25.008635477 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:21:25.008637797 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:21:25.008641001 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:21:25.008644331 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:21:25.008647465 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:21:25.008655403 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:21:25.008659081 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:21:25.008662685 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:21:25.008664767 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:25.008667797 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:21:25.008670145 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:21:25.008673313 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:21:25.008675879 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:21:25.008679099 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:21:25.008682723 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:21:25.008685843 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8b" 2024/01/29 15:21:25.008689593 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Octets [42] 6 164406 2024/01/29 15:21:25.008692783 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Giga-Words[52] 6 0 2024/01/29 15:21:25.008696007 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Octets [43] 6 48285 2024/01/29 15:21:25.008699127 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Giga-Words[53] 6 0 2024/01/29 15:21:25.008702249 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Packets [47] 6 392 2024/01/29 15:21:25.008705547 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Packets [48] 6 243 2024/01/29 15:21:25.008709077 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:21:25.008711573 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:21:25.008759915 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Watchdog [3] 2024/01/29 15:21:25.008763215 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541685 2024/01/29 15:21:25.008766149 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:21:25.008807817 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:21:25.008825187 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old iPhone 13 & Device name for the session is detected as iPhone 13 and old iPhone 13 & Old protocol map 1025 and new is 1025 2024/01/29 15:21:25.008835141 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:21:25.009014493 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:21:25.009085459 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:21:25.009279475 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: DHCPv4 from interface Po1 on vlan 102 Src MAC: 3c26.e465.831f Dst MAC: be02.5e92.570f src_ip: 10.10.102.6, dst_ip: 10.10.102.153, BOOTPREPLY, SISF_DHCPACK, giaddr: 0.0.0.0, yiaddr: 10.10.102.153, CMAC: be02.5e92.570f 2024/01/29 15:21:25.009442324 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 3c26.e465.831f Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:21:25.009489956 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: DHCPv4 from interface Po1 on vlan 102 Src MAC: 3c26.e465.831f Dst MAC: be02.5e92.570f src_ip: 10.10.102.6, dst_ip: 10.10.102.153, BOOTPREPLY, SISF_DHCPACK, giaddr: 0.0.0.0, yiaddr: 10.10.102.153, CMAC: be02.5e92.570f 2024/01/29 15:21:25.009708470 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f iplearn receive client learn method update. Prev method (ARP) Cur method (DHCP) 2024/01/29 15:21:25.009708972 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f Client IP learn method update successful. Method: DHCP IP: 10.10.102.153 2024/01/29 15:21:25.009843190 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE 2024/01/29 15:21:25.012033484 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:21:25.012137196 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:21:25.014554446 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/23 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:21:25.014563434 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 01 f2 2e 35 38 72 7e 46 - b5 a8 3a dc d9 c8 b5 8f 2024/01/29 15:21:25.014590657 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:21:25.187751722 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:25.187861766 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:25.426375767 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50AF) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.426379889 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.426382435 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.426387165 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.426391011 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.426443611 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50AF. 2024/01/29 15:21:25.426445839 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50AF has ended. Freeing all resources. 2024/01/29 15:21:25.426449513 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.426452369 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.426572239 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B0) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.426573887 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.426575739 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.426589863 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.426592673 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.426625175 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B0. 2024/01/29 15:21:25.426659487 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49447/226 Remove IO ctx and close socket, id [B700002B] 2024/01/29 15:21:25.426682392 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B0 has ended. Freeing all resources. 2024/01/29 15:21:25.426685700 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.426688282 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.431709308 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B1) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.431711352 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.431713196 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.431716742 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.431719984 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.431756192 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B1. 2024/01/29 15:21:25.431758262 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B1 has ended. Freeing all resources. 2024/01/29 15:21:25.431760986 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.431763592 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.431920583 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B2) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.431923711 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.431925813 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.431938551 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.431941579 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.431984723 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B2. 2024/01/29 15:21:25.431986825 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B2 has ended. Freeing all resources. 2024/01/29 15:21:25.431989895 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.432001929 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.432036447 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49449/226 Remove IO ctx and close socket, id [00000014] 2024/01/29 15:21:25.433340058 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B3) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.433341902 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.433343796 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.433347270 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.433350592 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.433386202 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B3. 2024/01/29 15:21:25.433388202 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B3 has ended. Freeing all resources. 2024/01/29 15:21:25.433390862 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.433393360 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.433526656 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B4) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.433528176 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.433529986 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.433540676 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.433543408 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.433574418 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B4. 2024/01/29 15:21:25.433576434 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B4 has ended. Freeing all resources. 2024/01/29 15:21:25.433578810 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.433581230 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.433612858 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49450/226 Remove IO ctx and close socket, id [0A00002F] 2024/01/29 15:21:25.490339626 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B5) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.490342412 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.490355450 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.490359786 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.490363604 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.490404452 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B5. 2024/01/29 15:21:25.490406552 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B5 has ended. Freeing all resources. 2024/01/29 15:21:25.490409580 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.490412258 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.490597512 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B6) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.490599168 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.490600938 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.490612510 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.490615456 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.490647757 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B6. 2024/01/29 15:21:25.490649807 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B6 has ended. Freeing all resources. 2024/01/29 15:21:25.490652345 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.490654821 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.490707637 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49451/226 Remove IO ctx and close socket, id [E5000002] 2024/01/29 15:21:25.551208502 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49489/226 IO state NEW -> READING 2024/01/29 15:21:25.552551424 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49489/226 Read event, Message ready 2024/01/29 15:21:25.552579894 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:25.552585360 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:25.552589256 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49489/226 IO state READING -> WRITING 2024/01/29 15:21:25.552619390 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49489/226 IO state WRITING -> END 2024/01/29 15:21:25.552622220 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49489/226 Remove IO ctx and close socket, id [5100001B] 2024/01/29 15:21:25.553062064 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B7) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.553064562 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.553066636 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.553070438 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.553085832 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.553126250 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B7. 2024/01/29 15:21:25.553128388 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B7 has ended. Freeing all resources. 2024/01/29 15:21:25.553131370 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.553134042 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.553529932 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B8) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.553531814 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.553533706 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.553545168 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.553548002 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.553582741 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B8. 2024/01/29 15:21:25.553584751 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B8 has ended. Freeing all resources. 2024/01/29 15:21:25.553587199 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.553589715 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.553622845 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49452/226 Remove IO ctx and close socket, id [0600002C] 2024/01/29 15:21:25.554156285 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50B9) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.554158255 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.554160065 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.554163545 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.554166615 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.554211475 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50B9. 2024/01/29 15:21:25.554213581 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50B9 has ended. Freeing all resources. 2024/01/29 15:21:25.554216095 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.554218655 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.554340221 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50BA) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.554341913 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.554343597 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.554354131 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.554357029 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.554388651 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50BA. 2024/01/29 15:21:25.554390625 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50BA has ended. Freeing all resources. 2024/01/29 15:21:25.554392921 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.554395339 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.554424819 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49453/226 Remove IO ctx and close socket, id [4B000016] 2024/01/29 15:21:25.555346060 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50BB) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.555347574 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.555349308 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.555352636 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.555355632 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.555385178 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50BB. 2024/01/29 15:21:25.555387168 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50BB has ended. Freeing all resources. 2024/01/29 15:21:25.555401876 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.555404386 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.555512468 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50BC) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.555514058 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.555515728 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.555525992 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.555528764 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.555559434 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50BC. 2024/01/29 15:21:25.555561460 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50BC has ended. Freeing all resources. 2024/01/29 15:21:25.555563790 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.555566156 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.555589598 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49454/226 Remove IO ctx and close socket, id [65000013] 2024/01/29 15:21:25.557258248 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50BD) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.557259900 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.557261596 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.557265032 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.557267950 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.557298598 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50BD. 2024/01/29 15:21:25.557300560 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50BD has ended. Freeing all resources. 2024/01/29 15:21:25.557302878 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.557305262 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.557420142 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50BE) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.557421744 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.557423424 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.557433840 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.557436586 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.557466906 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50BE. 2024/01/29 15:21:25.557468912 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50BE has ended. Freeing all resources. 2024/01/29 15:21:25.557471228 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.557473626 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.557504260 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49455/226 Remove IO ctx and close socket, id [66000038] 2024/01/29 15:21:25.558649855 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50BF) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.558651995 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.558653929 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.558657463 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.558660681 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.558697365 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50BF. 2024/01/29 15:21:25.558699391 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50BF has ended. Freeing all resources. 2024/01/29 15:21:25.558701937 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.558704403 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.558808794 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C0) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.558810364 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.558812140 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.558833736 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.558836594 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.558868462 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C0. 2024/01/29 15:21:25.558870458 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C0 has ended. Freeing all resources. 2024/01/29 15:21:25.558872872 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.558875272 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.558905734 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49456/226 Remove IO ctx and close socket, id [E0000010] 2024/01/29 15:21:25.616477343 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C1) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.616479777 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.616481721 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.616485311 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.616488587 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.616532127 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C1. 2024/01/29 15:21:25.616534231 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C1 has ended. Freeing all resources. 2024/01/29 15:21:25.616536987 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.616539673 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.616675945 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C2) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.616677591 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.616679339 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.616690467 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.616693285 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.616737273 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C2. 2024/01/29 15:21:25.616739303 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C2 has ended. Freeing all resources. 2024/01/29 15:21:25.616741745 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.616744215 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.616785397 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49458/226 Remove IO ctx and close socket, id [E900000D] 2024/01/29 15:21:25.617794148 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C3) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.617796914 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.617798922 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.617802838 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.617806502 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.617845978 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C3. 2024/01/29 15:21:25.617848088 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C3 has ended. Freeing all resources. 2024/01/29 15:21:25.617850956 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.617853638 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.617974726 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C4) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.617976500 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.617978286 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.617988832 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.617991602 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.618024646 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C4. 2024/01/29 15:21:25.618035404 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C4 has ended. Freeing all resources. 2024/01/29 15:21:25.618038206 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.618040688 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.618060884 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49459/226 Remove IO ctx and close socket, id [C4000020] 2024/01/29 15:21:25.623355433 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C5) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.623357257 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.623358991 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.623362471 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.623365509 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.623398027 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C5. 2024/01/29 15:21:25.623400015 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C5 has ended. Freeing all resources. 2024/01/29 15:21:25.623402529 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.623404981 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.623519849 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C6) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.623521389 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.623523143 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.623533761 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.623536557 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.623566105 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C6. 2024/01/29 15:21:25.623568069 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C6 has ended. Freeing all resources. 2024/01/29 15:21:25.623570253 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.623581769 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.623605509 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49460/226 Remove IO ctx and close socket, id [ED000018] 2024/01/29 15:21:25.903592918 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C7) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.903596210 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.903598338 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.903602622 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.903606462 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.903652696 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C7. 2024/01/29 15:21:25.903654856 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C7 has ended. Freeing all resources. 2024/01/29 15:21:25.903658206 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.903661016 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.903867291 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C8) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:25.903870243 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:25.903872231 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:25.903886309 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:25.903889425 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:25.903931699 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C8. 2024/01/29 15:21:25.903933739 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C8 has ended. Freeing all resources. 2024/01/29 15:21:25.903936763 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:25.903939475 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:25.903977215 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49462/226 Remove IO ctx and close socket, id [7C000015] 2024/01/29 15:21:25.949371682 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49464/226 IO state NEW -> READING 2024/01/29 15:21:25.974337492 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49464/226 Read event, Message ready 2024/01/29 15:21:25.974379894 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:25.974385040 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:25.974388990 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49464/226 IO state READING -> WRITING 2024/01/29 15:21:25.974418788 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49464/226 IO state WRITING -> END 2024/01/29 15:21:25.974421854 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49464/226 Remove IO ctx and close socket, id [A600000A] 2024/01/29 15:21:25.975018094 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:26.016961284 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49490/226 IO state NEW -> READING 2024/01/29 15:21:26.017903831 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49490/226 Read event, Message ready 2024/01/29 15:21:26.017930223 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:26.017934693 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:26.017938275 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49490/226 IO state READING -> WRITING 2024/01/29 15:21:26.017976753 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49490/226 IO state WRITING -> END 2024/01/29 15:21:26.017979701 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49490/226 Remove IO ctx and close socket, id [5A00000E] 2024/01/29 15:21:26.030211957 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:26.030307477 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:26.351654170 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:21:26.351770508 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.153, 2024/01/29 15:21:26.675396994 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): RX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:26.675492430 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (info): TX: ARP from interface capwap_90000257 on vlan 102 Source MAC: be02.5e92.570f Dest MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: be02.5e92.570f ARP target MAC: 0000.0000.0000 ARP sender IP: 10.10.102.153, ARP target IP: 10.10.102.6, 2024/01/29 15:21:27.172070166 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50C9) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.172086536 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.172089030 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.172094082 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.172097830 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.172151736 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50C9. 2024/01/29 15:21:27.172153944 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50C9 has ended. Freeing all resources. 2024/01/29 15:21:27.172157486 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.172160346 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.172283366 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50CA) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.172285030 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.172286860 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.172300686 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.172303586 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.172345376 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50CA. 2024/01/29 15:21:27.172347516 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50CA has ended. Freeing all resources. 2024/01/29 15:21:27.172350012 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.172352420 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.172402104 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49469/226 Remove IO ctx and close socket, id [4000003C] 2024/01/29 15:21:27.181546899 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50CB) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.181549169 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.181551071 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.181554635 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.181569363 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.181607809 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50CB. 2024/01/29 15:21:27.181609875 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50CB has ended. Freeing all resources. 2024/01/29 15:21:27.181612689 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.181615237 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.181728933 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50CC) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.181730511 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.181732259 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.181743437 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.181746163 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.181776689 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50CC. 2024/01/29 15:21:27.181778705 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50CC has ended. Freeing all resources. 2024/01/29 15:21:27.181780985 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.181783425 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.181806965 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49470/226 Remove IO ctx and close socket, id [4300001F] 2024/01/29 15:21:27.185005604 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49491/226 IO state NEW -> READING 2024/01/29 15:21:27.186044375 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49491/226 Read event, Message ready 2024/01/29 15:21:27.186072721 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:27.186077675 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:27.186081501 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49491/226 IO state READING -> WRITING 2024/01/29 15:21:27.186110319 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49491/226 IO state WRITING -> END 2024/01/29 15:21:27.186113199 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49491/226 Remove IO ctx and close socket, id [18000034] 2024/01/29 15:21:27.193747251 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50CD) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.193749733 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.193751809 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.193755501 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.193759023 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.193809979 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50CD. 2024/01/29 15:21:27.193812195 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50CD has ended. Freeing all resources. 2024/01/29 15:21:27.193815067 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.193817747 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.193935381 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50CE) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.193937215 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.193938965 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.193950301 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.193953185 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.193985035 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50CE. 2024/01/29 15:21:27.193987057 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50CE has ended. Freeing all resources. 2024/01/29 15:21:27.193989461 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.193991945 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.194022389 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49471/226 Remove IO ctx and close socket, id [AE00000B] 2024/01/29 15:21:27.203016586 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50CF) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.203018824 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.203020758 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.203024248 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.203027530 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.203064070 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50CF. 2024/01/29 15:21:27.203066186 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50CF has ended. Freeing all resources. 2024/01/29 15:21:27.203080176 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.203082874 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.203190374 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D0) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.203191996 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.203193774 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.203204580 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.203207416 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.203243936 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D0. 2024/01/29 15:21:27.203246094 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D0 has ended. Freeing all resources. 2024/01/29 15:21:27.203248598 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.203251088 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.203269494 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49474/226 Remove IO ctx and close socket, id [BC000040] 2024/01/29 15:21:27.213134961 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D1) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.213137063 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.213138863 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.213142353 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.213145425 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.213180301 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D1. 2024/01/29 15:21:27.213182317 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D1 has ended. Freeing all resources. 2024/01/29 15:21:27.213184803 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.213187281 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.213302699 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D2) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.213304291 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.213306019 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.213316745 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.213319577 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.213360177 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D2. 2024/01/29 15:21:27.213362193 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D2 has ended. Freeing all resources. 2024/01/29 15:21:27.213364601 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.213367017 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.213398559 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49475/226 Remove IO ctx and close socket, id [58000003] 2024/01/29 15:21:27.220425586 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D3) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.220427618 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.220429458 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.220432836 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.220436012 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.220469466 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D3. 2024/01/29 15:21:27.220471460 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D3 has ended. Freeing all resources. 2024/01/29 15:21:27.220473986 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.220476500 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.220590186 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D4) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:27.220591786 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:27.220604274 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:27.220615486 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:27.220618272 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:27.220649710 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D4. 2024/01/29 15:21:27.220651772 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D4 has ended. Freeing all resources. 2024/01/29 15:21:27.220654220 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:27.220656686 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:27.220679916 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49476/226 Remove IO ctx and close socket, id [B0000007] 2024/01/29 15:21:27.341537604 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49492/226 IO state NEW -> READING 2024/01/29 15:21:27.341825748 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49492/226 Read event, Message ready 2024/01/29 15:21:27.341855574 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:27.341860670 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:27.341864436 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49492/226 IO state READING -> WRITING 2024/01/29 15:21:27.341896708 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49492/226 IO state WRITING -> END 2024/01/29 15:21:27.341901474 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49492/226 Remove IO ctx and close socket, id [2B000037] 2024/01/29 15:21:27.978162401 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (ERR): Error Update denied during binding create [17] while creating SISF binding fe80::8c8:8985:eb76:879d : be02.5e92.570f from gleaned IPv6 packet vlan 102 2024/01/29 15:21:29.862429796 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:21:29.862526222 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:21:29.862695396 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f Client IP learn successful. Method: IPv6 NDP IP: fe80::8c8:8985:eb76:879d 2024/01/29 15:21:29.862740504 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr addrv6(10) 2024/01/29 15:21:29.862916648 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update ipv6_addr fe80::8c8:8985:eb76:879d 2024/01/29 15:21:29.862952184 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:21:29.862972688 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:21:29.862976176 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:21:29.863006894 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:21:29.863034324 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:29.863181808 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:21:29.863613011 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE 2024/01/29 15:21:29.863752881 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/47, len 810 2024/01/29 15:21:29.863761921 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator b0 77 6b 13 6c d5 33 8a - 6f cc f6 e7 4a 92 0d e6 2024/01/29 15:21:29.863766447 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:29.863770539 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:21:29.863773241 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:21:29.863776291 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:21:29.863778633 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:21:29.863781619 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:21:29.863783941 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:29.863786861 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:21:29.863789135 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:29.863792153 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:21:29.863794419 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:21:29.863797449 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:21:29.863799827 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 132 2024/01/29 15:21:29.863803883 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 126 "http-tlv= " 2024/01/29 15:21:29.863806281 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:29.863809365 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dhcp-option= " 2024/01/29 15:21:29.863818559 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:21:29.863821157 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IPv6-Address [168] 18 ... 2024/01/29 15:21:29.863849707 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:21:29.863852225 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:21:29.863855531 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:21:29.863857861 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:21:29.863861039 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:21:29.863863371 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:21:29.863866793 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:21:29.863870043 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:21:29.863873131 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:21:29.863877523 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:21:29.863881359 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:21:29.863884895 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:21:29.863887017 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:29.863890069 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:21:29.863892401 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:21:29.863895445 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:21:29.863898075 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:21:29.863901271 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:21:29.863904553 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:21:29.863907671 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8b" 2024/01/29 15:21:29.863914913 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Octets [42] 6 164406 2024/01/29 15:21:29.863918159 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Giga-Words[52] 6 0 2024/01/29 15:21:29.863921409 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Octets [43] 6 48285 2024/01/29 15:21:29.863924559 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Giga-Words[53] 6 0 2024/01/29 15:21:29.863927667 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Packets [47] 6 392 2024/01/29 15:21:29.863930885 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Packets [48] 6 243 2024/01/29 15:21:29.863934431 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:21:29.863936849 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:21:29.863980773 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Watchdog [3] 2024/01/29 15:21:29.863984041 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541689 2024/01/29 15:21:29.863987035 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:21:29.864032655 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:21:29.870658122 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/47 10.10.1.10:0, Accounting-response, len 20 2024/01/29 15:21:29.870668006 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator bb dd 14 e1 24 a3 06 3a - eb 46 00 72 1b 94 f3 98 2024/01/29 15:21:29.870698814 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:21:30.566464333 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D5) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:30.566468203 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:30.566484723 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:30.566489767 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:30.566493875 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:30.566547393 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D5. 2024/01/29 15:21:30.566549519 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D5 has ended. Freeing all resources. 2024/01/29 15:21:30.566553463 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:30.566556401 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:30.566682083 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D6) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:30.566683893 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:30.566685717 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:30.566699895 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:30.566702783 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:30.566735907 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D6. 2024/01/29 15:21:30.566737925 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D6 has ended. Freeing all resources. 2024/01/29 15:21:30.566740463 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:30.566742853 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:30.566770635 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49477/226 Remove IO ctx and close socket, id [3C000019] 2024/01/29 15:21:30.576550983 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D7) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:30.576553341 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:30.576555227 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:30.576558793 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:30.576562131 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:30.576611809 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D7. 2024/01/29 15:21:30.576613849 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D7 has ended. Freeing all resources. 2024/01/29 15:21:30.576616477 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:30.576619067 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:30.576742687 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D8) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:30.576744523 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:30.576746319 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:30.576757719 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:30.576760557 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:30.576793071 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D8. 2024/01/29 15:21:30.576795107 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D8 has ended. Freeing all resources. 2024/01/29 15:21:30.576797557 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:30.576799993 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:30.576824423 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49478/226 Remove IO ctx and close socket, id [F600002A] 2024/01/29 15:21:30.586241218 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50D9) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:30.586243570 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:30.586245492 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:30.586249186 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:30.586252604 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:30.586302264 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50D9. 2024/01/29 15:21:30.586304402 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50D9 has ended. Freeing all resources. 2024/01/29 15:21:30.586307236 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:30.586309820 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:30.586427422 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50DA) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:30.586429024 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:30.586430848 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:30.586442228 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:30.586445054 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:30.586477024 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50DA. 2024/01/29 15:21:30.586479122 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50DA has ended. Freeing all resources. 2024/01/29 15:21:30.586481516 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:30.586483914 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:30.586508982 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49479/226 Remove IO ctx and close socket, id [C4000024] 2024/01/29 15:21:33.904707117 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): RX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:21:33.904803061 {wncd_x_R0-0}{2}: [sisf-packet] [17787]: (debug): TX: IPv6 NDP from intf capwap_90000257 on vlan 102 Src MAC: be02.5e92.570f Dst MAC: 3333.0000.0002 Ipv6 SRC: fe80::8c8:8985:eb76:879d, Ipv6 DST: ff02::2, type: ND_ROUTER_SOLICIT 2024/01/29 15:21:36.355034226 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50DB) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:36.355037754 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:36.355040538 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:36.355044978 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:36.355048678 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:36.355103196 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50DB. 2024/01/29 15:21:36.355105398 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50DB has ended. Freeing all resources. 2024/01/29 15:21:36.355108698 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:36.355166234 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:36.355229400 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50DC) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:36.355230848 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:36.355232716 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:36.355246416 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:36.355249238 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:36.355281940 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50DC. 2024/01/29 15:21:36.355284084 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50DC has ended. Freeing all resources. 2024/01/29 15:21:36.355286708 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:36.355289298 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:36.355315638 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49480/226 Remove IO ctx and close socket, id [F6000029] 2024/01/29 15:21:41.110647441 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50DD) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:41.110651817 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:41.110654275 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:41.110659023 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:41.110662869 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:41.110714577 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50DD. 2024/01/29 15:21:41.110729023 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50DD has ended. Freeing all resources. 2024/01/29 15:21:41.110733219 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:41.110736533 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:41.110842293 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50DE) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:41.110843991 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:41.110845877 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:41.110860069 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:41.110862969 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:41.110897105 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50DE. 2024/01/29 15:21:41.110899123 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50DE has ended. Freeing all resources. 2024/01/29 15:21:41.110901641 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:41.110904143 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:41.110935561 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49481/226 Remove IO ctx and close socket, id [6300001E] 2024/01/29 15:21:41.121011447 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50DF) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:41.121013605 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:41.121015475 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:41.121019091 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:41.121022453 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:41.121064413 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50DF. 2024/01/29 15:21:41.121066459 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50DF has ended. Freeing all resources. 2024/01/29 15:21:41.121069097 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:41.121082127 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:41.121216897 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E0) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:41.121218477 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:41.121220223 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:41.121231481 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:41.121234289 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:41.121266415 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E0. 2024/01/29 15:21:41.121268463 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E0 has ended. Freeing all resources. 2024/01/29 15:21:41.121270917 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:41.121273341 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:41.121308239 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49482/226 Remove IO ctx and close socket, id [FE000030] 2024/01/29 15:21:41.132465114 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E1) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:41.132467004 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:41.132468866 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:41.132472392 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:41.132475510 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:41.132509190 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E1. 2024/01/29 15:21:41.132511218 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E1 has ended. Freeing all resources. 2024/01/29 15:21:41.132513710 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:41.132516244 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:41.132620954 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E2) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:41.132622554 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:41.132634546 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:41.132645792 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:41.132648618 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:41.132680444 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E2. 2024/01/29 15:21:41.132682450 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E2 has ended. Freeing all resources. 2024/01/29 15:21:41.132684826 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:41.132687364 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:41.132718786 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49483/226 Remove IO ctx and close socket, id [68000009] 2024/01/29 15:21:51.534526168 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E3) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:51.534529912 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:51.534532376 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:51.534537002 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:51.534540980 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:51.534593158 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E3. 2024/01/29 15:21:51.534595288 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E3 has ended. Freeing all resources. 2024/01/29 15:21:51.534598858 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:51.534601896 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:51.534784990 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E4) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:51.534787888 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:51.534790024 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:51.534804918 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:51.534864564 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:51.534909356 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E4. 2024/01/29 15:21:51.534911496 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E4 has ended. Freeing all resources. 2024/01/29 15:21:51.534914696 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:51.534917422 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:51.534967470 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49484/226 Remove IO ctx and close socket, id [8E00001A] 2024/01/29 15:21:51.544153205 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E5) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:51.544155813 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:51.544157859 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:51.544161743 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:51.544165561 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:51.544205763 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E5. 2024/01/29 15:21:51.544207923 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E5 has ended. Freeing all resources. 2024/01/29 15:21:51.544210813 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:51.544213455 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:51.544351511 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E6) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:51.544353237 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:51.544355143 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:51.544367119 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:51.544370019 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:51.544417525 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E6. 2024/01/29 15:21:51.544419725 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E6 has ended. Freeing all resources. 2024/01/29 15:21:51.544422479 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:51.544424987 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:51.544451561 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49485/226 Remove IO ctx and close socket, id [6D000021] 2024/01/29 15:21:51.554696869 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E7) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:51.554698979 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:51.554700753 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:51.554704291 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find signature certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:51.554707449 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:51.554742115 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E7. 2024/01/29 15:21:51.554744143 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E7 has ended. Freeing all resources. 2024/01/29 15:21:51.554746857 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:51.554749357 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:51.554877931 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: (A50E8) Session started - identity selected (SLA-TrustPoint) 2024/01/29 15:21:51.554879585 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:refcount after increment = 1 2024/01/29 15:21:51.554881393 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Begin local cert chain retrieval. 2024/01/29 15:21:51.554892129 {iosrp_R0-0}{2}: [pki] [4225]: (ERR): CRYPTO_PKI: Can't find encryption certificate for trustpoint (SLA-TrustPoint) 2024/01/29 15:21:51.554894879 {iosrp_R0-0}{2}: [pki] [4225]: (note): CRYPTO_PKI: Done with local cert chain fetch 18. 2024/01/29 15:21:51.554925161 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: Rcvd request to end PKI session A50E8. 2024/01/29 15:21:51.554927167 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A50E8 has ended. Freeing all resources. 2024/01/29 15:21:51.554938533 {iosrp_R0-0}{2}: [pki] [4225]: (debug): SLA-TrustPoint:unlocked trustpoint SLA-TrustPoint, refcount is 0 2024/01/29 15:21:51.554941147 {iosrp_R0-0}{2}: [pki] [4225]: (debug): CRYPTO_PKI: PKI session A0000 has ended. Freeing all resources completed 2024/01/29 15:21:51.554955839 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): 49486/226 Remove IO ctx and close socket, id [23000033] 2024/01/29 15:21:56.271613982 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M5 sent successfully 2024/01/29 15:21:56.271616068 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITDONE -> S_REKEYNEGOTIATING 2024/01/29 15:21:56.319511667 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M6 validation successful. 2024/01/29 15:21:56.319513133 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Keymgmt: eapol group key complete. Client key management group key exchange completed 2024/01/29 15:21:56.319513625 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_REKEYNEGOTIATING -> S_PTKINITDONE 2024/01/29 15:21:58.904159288 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49493/226 IO state NEW -> READING 2024/01/29 15:21:58.904436426 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49493/226 Read event, Message ready 2024/01/29 15:21:58.904466100 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]Param-map used: global 2024/01/29 15:21:58.904470914 {wncd_x_R0-0}{2}: [webauth-state] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]State GET_REDIRECT -> GET_REDIRECT 2024/01/29 15:21:58.904474892 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49493/226 IO state READING -> WRITING 2024/01/29 15:21:58.904507170 {wncd_x_R0-0}{2}: [webauth-io] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49493/226 IO state WRITING -> END 2024/01/29 15:21:58.904512162 {wncd_x_R0-0}{2}: [webauth-httpd] [17787]: (info): [be02.5e92.570f][ 10.10.102.153]49493/226 Remove IO ctx and close socket, id [2800003B] 2024/01/29 15:21:58.939671004 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER:4c000891] Processing CoA request under Command Handler ctx. 2024/01/29 15:21:58.939692276 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER:4c000891] Reauthenticate request (0x64cc560aa138) for be02.5e92.570f 2024/01/29 15:21:58.939722740 {wncd_x_R0-0}{2}: [sadb-attr] [17787]: (info): Removing ipv6 addresses from the attr list 1593836028,sm_ctx = 0x80820911a8, num_ipv6 = 1 2024/01/29 15:21:58.939754982 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB re-authentication started for (be02.5e92.570f) 2024/01/29 15:21:58.939775344 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Authz Success' to 'Running' 2024/01/29 15:21:58.939779790 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Method mab changing state from 'Authc Success' to 'Running' 2024/01/29 15:21:58.939792930 {wncd_x_R0-0}{2}: [aaa-coa] [17787]: (info): radius coa proxy relay coa resp(wncd) 2024/01/29 15:21:58.939796200 {wncd_x_R0-0}{2}: [aaa-coa] [17787]: (info): CoA Response Details 2024/01/29 15:21:58.939803506 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): << ssg-command-code 0 32 >> 2024/01/29 15:21:58.939805442 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): << formatted-clid 0 "be02.5e92.570f">> 2024/01/29 15:21:58.939807702 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): << error-cause 0 1 [Success]>> 2024/01/29 15:21:58.939811420 {wncd_x_R0-0}{2}: [aaa-coa] [17787]: (info): server:10.10.3.10 cfg_saddr:10.10.3.10 udpport:11586 sport:0, tableid:0iden:222 rad_code:43 msg_auth_rcvd:TRUE coa_resp:ACK 2024/01/29 15:21:58.939869712 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER] CoA response sent 2024/01/29 15:21:58.939875458 {wncd_x_R0-0}{2}: [caaa-ch] [17787]: (info): [CAAA:COMMAND HANDLER:4c000891] Identity preserved: mac (be02.5e92.570f), ip (0), audit_sid (0A030A0A0000757655CF1C81), aaa_session_id (0) 2024/01/29 15:21:58.939886982 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_REAUTHENTICATE' on (be02.5e92.570f) 2024/01/29 15:21:58.939924072 {smd_R0-0}{2}: [aaa-coa] [18889]: (info): ++++++ Received CoA response Attribute List ++++++ 2024/01/29 15:21:58.939976226 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS(00000000): Send CoA Ack Response to 10.10.1.10:11586 id 222, len 69 2024/01/29 15:21:58.939982954 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: authenticator cf 7f 00 81 ba 32 01 c7 - 84 93 79 8f 1c 07 d9 bf 2024/01/29 15:21:58.939987768 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: Vendor, Cisco [26] 9 2024/01/29 15:21:58.939991228 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: ssg-command-code [252] 3 ... 2024/01/29 15:21:58.940008302 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: Calling-Station-Id [31] 16 "be02.5e92.570f" 2024/01/29 15:21:58.940013078 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: Dynamic-Author-Error-Cause[101] 6 Success [200] 2024/01/29 15:21:58.940015564 {smd_R0-0}{2}: [radius] [18889]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:21:58.940040832 {smd_R0-0}{2}: [aaa-pod] [18889]: (info): CoA response source port = 0, udpport = 11586, 2024/01/29 15:21:58.940109654 {wncd_x_R0-0}{2}: [sadb-attr] [17787]: (info): Removing ipv6 addresses from the attr list -419427291,sm_ctx = 0x80820911a8, num_ipv6 = 1 2024/01/29 15:21:58.940207802 {wncd_x_R0-0}{2}: [caaa-author] [17787]: (info): [CAAA:AUTHOR:4c000891] NULL ATTR LIST 2024/01/29 15:21:58.940436643 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Access-Request to 10.10.1.10:1812 id 0/31, len 463 2024/01/29 15:21:58.940445679 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 73 dd 03 1c 20 86 62 3f - 6c 4b d3 fa 59 82 51 b3 2024/01/29 15:21:58.940450431 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 14 "be025e92570f" 2024/01/29 15:21:58.940453465 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Password [2] 18 * 2024/01/29 15:21:58.940460829 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Service-Type [6] 6 Call Check [10] 2024/01/29 15:21:58.940463781 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 31 2024/01/29 15:21:58.940467565 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 25 "service-type=Call Check" 2024/01/29 15:21:58.940471899 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-MTU [12] 6 1485 2024/01/29 15:21:58.940474365 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:21:58.940498149 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: EAP-Key-Name [102] 2 * 2024/01/29 15:21:58.940503195 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:21:58.940506457 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:21:58.940508803 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:21:58.940512181 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:21:58.940516555 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:21:58.940518607 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 39 2024/01/29 15:21:58.940521653 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 33 "addrv6=fe80::8c8:8985:eb76:879d" 2024/01/29 15:21:58.940523995 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:21:58.940526923 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "client-iif-id=3019901101" 2024/01/29 15:21:58.940533193 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:21:58.940536225 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:21:58.940540553 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:21:58.940544267 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:21:58.940547591 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:21:58.940549693 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:58.940552625 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:21:58.940554941 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:21:58.940557999 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:21:58.940561203 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 29 "34-b8-83-69-e6-80:Al Mirqab" 2024/01/29 15:21:58.940564375 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:21:58.940566981 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:21:58.940570105 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:21:58.940573385 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:21:58.940620069 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:21:58.954820210 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1812/31 10.10.1.10:0, Access-Accept, len 176 2024/01/29 15:21:58.954839402 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 84 c7 65 4a 3e 18 c7 f7 - 33 35 30 02 f7 10 88 49 2024/01/29 15:21:58.954844174 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 14 "rsayakkarage" 2024/01/29 15:21:58.954847288 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:21:58.954891656 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Session-Timeout [27] 6 31532108 2024/01/29 15:21:58.954895388 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Termination-Action [29] 6 0 2024/01/29 15:21:58.954897446 {wncd_x_R0-0}{2}: [radius] [17787]: (info): 01: 2024/01/29 15:21:58.954899636 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Tunnel-Type [64] 6 VLAN [13] 2024/01/29 15:21:58.954901482 {wncd_x_R0-0}{2}: [radius] [17787]: (info): 01: 2024/01/29 15:21:58.954903566 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Tunnel-Medium-Type [65] 6 ALL_802 [6] 2024/01/29 15:21:58.954905906 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:21:58.954928875 {wncd_x_R0-0}{2}: [radius] [17787]: (info): 01: 2024/01/29 15:21:58.954930235 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Tunnel-Private-Group-Id[81] 6 "100" 2024/01/29 15:21:58.954933071 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:58.954936731 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "profile-name=Apple-iPhone" 2024/01/29 15:21:58.954962425 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:21:58.955107785 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] MAB received an Access-Accept for (be02.5e92.570f) 2024/01/29 15:21:58.955119423 {wncd_x_R0-0}{2}: [mab] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received event 'MAB_RESULT' on (be02.5e92.570f) 2024/01/29 15:21:58.955152097 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Authc success from MAB, Auth event success 2024/01/29 15:21:58.955163115 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event APPLY_USER_PROFILE (14) 2024/01/29 15:21:58.955167963 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event RX_METHOD_AUTHC_SUCCESS (3) 2024/01/29 15:21:58.955229425 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : username 0 "rsayakkarage" 2024/01/29 15:21:58.955245415 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : class 0 43 41 43 53 3a 30 41 30 33 30 41 30 41 30 30 30 30 37 35 37 36 35 35 43 46 31 43 38 31 3a 6d 79 36 38 31 2d 69 73 65 30 30 31 2f 34 39 35 33 38 31 33 33 30 2f 33 37 36 30 37 35 2024/01/29 15:21:58.955247391 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : timeout 0 31532108 (0x1e1244c) 2024/01/29 15:21:58.955249051 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : Termination-Action 0 False 2024/01/29 15:21:58.955251169 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : tunnel-type 1 13 [vlan] 2024/01/29 15:21:58.955252887 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : tunnel-medium-type 1 6 [ALL_802] 2024/01/29 15:21:58.955254133 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : Message-Authenticator 0 2024/01/29 15:21:58.955255579 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : tunnel-private-group-id 1 "100" 2024/01/29 15:21:58.955257171 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : dnis 0 "34-B8-83-69-E6-80" 2024/01/29 15:21:58.955258593 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : formatted-clid 0 "BE-02-5E-92-57-0F" 2024/01/29 15:21:58.955260009 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : audit-session-id 0 "0A030A0A0000757655CF1C81" 2024/01/29 15:21:58.955261603 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : method 0 2 [mab] 2024/01/29 15:21:58.955264465 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : clid-mac-addr 0 be 02 5e 92 57 0f 2024/01/29 15:21:58.955266115 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applying Attribute : intf-id 0 2415919703 (0x90000257) 2024/01/29 15:21:58.955286213 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr username(450) 2024/01/29 15:21:58.955314717 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Remove username 2024/01/29 15:21:58.955376825 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type STOP) 2024/01/29 15:21:58.955394541 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:21:58.955398427 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:21:58.955427421 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:21:58.955452405 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:58.955588073 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:21:58.955706389 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr username(450) 2024/01/29 15:21:58.955732265 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update username rsayakkarage 2024/01/29 15:21:58.955737301 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Received User-Name rsayakkarage for client be02.5e92.570f 2024/01/29 15:21:58.955748559 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Method mab changing state from 'Running' to 'Authc Success' 2024/01/29 15:21:58.955752189 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Running' to 'Authc Success' 2024/01/29 15:21:58.955818185 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: SVM Apply user profile 2024/01/29 15:21:58.956071782 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Activating EPM features with UP 2024/01/29 15:21:58.956530580 {wncd_x_R0-0}{2}: [epm-acl] [17787]: (info): [0000.0000.0000:unknown] Filter-Id : not present 2024/01/29 15:21:58.956560452 {wncd_x_R0-0}{2}: [webauth-sess] [17787]: (info): deleting webauth info from ipv4 hash table for vrf id 0, ipv4 vrf table id 0 2024/01/29 15:21:58.956906118 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] Username rsayakkarage received 2024/01/29 15:21:58.956947902 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Reauth Plugin: Received valid timeout = 31532108, effective timeout = 31532108 2024/01/29 15:21:58.956950640 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Reauth Plugin: Received valid Termination-Action = 0 2024/01/29 15:21:58.957061161 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (SM Reauth PLUG-IN) has been started (status Success) 2024/01/29 15:21:58.957234627 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr vlan-id(965) 2024/01/29 15:21:58.957260913 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Vlan tag name is 100, pref is 1048575 vlan num is 100 2024/01/29 15:21:58.957302447 {wncd_x_R0-0}{2}: [epm] [17787]: (info): [be02.5e92.570f:capwap_90000257] Feature (EPM Vlan PLUG-IN) has been started (status Success) 2024/01/29 15:21:58.957367933 {wncd_x_R0-0}{2}: [svm] [17787]: (info): SVM_INFO: Response of epm is SYNC with return code Success 2024/01/29 15:21:58.957413953 {wncd_x_R0-0}{2}: [svm] [17787]: (info): [be02.5e92.570f] Applied User Profile: : 2024/01/29 15:21:58.957417287 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: method 0 2 [mab] 2024/01/29 15:21:58.957420131 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: clid-mac-addr 0 be 02 5e 92 57 0f 2024/01/29 15:21:58.957421649 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: intf-id 0 2415919703 (0x90000257) 2024/01/29 15:21:58.957427723 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: username 0 "rsayakkarage" 2024/01/29 15:21:58.957443091 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: class 0 43 41 43 53 3a 30 41 30 33 30 41 30 41 30 30 30 30 37 35 37 36 35 35 43 46 31 43 38 31 3a 6d 79 36 38 31 2d 69 73 65 30 30 31 2f 34 39 35 33 38 31 33 33 30 2f 33 37 36 30 37 35 2024/01/29 15:21:58.957444693 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: timeout 0 31532108 (0x1e1244c) 2024/01/29 15:21:58.957445923 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: Termination-Action 0 False 2024/01/29 15:21:58.957447415 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: tunnel-type 1 13 [vlan] 2024/01/29 15:21:58.957448909 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile: tunnel-medium-type 1 6 [ALL_802] 2024/01/29 15:21:58.957450231 {wncd_x_R0-0}{2}: [aaa-attr-inf] [17787]: (info): Applied User Profile:tunnel-private-group-id 1 "100" 2024/01/29 15:21:58.957654999 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:21:58.957728931 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] User Profile applied successfully - REPLACE 2024/01/29 15:21:58.957798409 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Raised event AUTHZ_SUCCESS (11) 2024/01/29 15:21:58.957803931 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Context changing state from 'Authc Success' to 'Authz Success' 2024/01/29 15:21:58.957940447 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f L3 Authentication Successful. ACL:[] 2024/01/29 15:21:58.957944699 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_WEBAUTH_PENDING -> S_AUTHIF_WEBAUTH_DONE 2024/01/29 15:21:58.958069394 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Send Accounting-Request to 10.10.1.10:1813 id 0/39, len 822 2024/01/29 15:21:58.958076864 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 92 5f 3d 59 aa f8 83 f7 - 5b f4 0f 21 d0 d2 39 12 2024/01/29 15:21:58.958081122 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:58.958085090 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dc-profile-name=iPhone 13" 2024/01/29 15:21:58.958087822 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 32 2024/01/29 15:21:58.958090946 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 26 "dc-device-name=iPhone 13" 2024/01/29 15:21:58.958093294 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 37 2024/01/29 15:21:58.958096340 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 31 "dc-device-class-tag=iPhone 13" 2024/01/29 15:21:58.958098730 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:58.958101614 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-certainty-metric=40" 2024/01/29 15:21:58.958103896 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 30 2024/01/29 15:21:58.958106942 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 24 "dc-opaque= " 2024/01/29 15:21:58.958109290 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 28 2024/01/29 15:21:58.958112294 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 22 "dc-protocol-map=1025" 2024/01/29 15:21:58.958114676 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 132 2024/01/29 15:21:58.958119104 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 126 "http-tlv= " 2024/01/29 15:21:58.958121490 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:58.958124664 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "dhcp-option= " 2024/01/29 15:21:58.958129404 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IP-Address [8] 6 10.10.102.153 2024/01/29 15:21:58.958136138 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Framed-IPv6-Address [168] 18 ... 2024/01/29 15:21:58.958163338 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 49 2024/01/29 15:21:58.958166686 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 43 "audit-session-id=0A030A0A0000757655CF1C81" 2024/01/29 15:21:58.958169016 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 19 2024/01/29 15:21:58.958172116 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 13 "vlan-id=102" 2024/01/29 15:21:58.958174392 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 18 2024/01/29 15:21:58.958177658 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 12 "method=mab" 2024/01/29 15:21:58.958181000 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Called-Station-Id [30] 19 "08-45-d1-18-2f-6b" 2024/01/29 15:21:58.958184166 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Calling-Station-Id [31] 19 "be-02-5e-92-57-0f" 2024/01/29 15:21:58.958188546 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-IP-Address [4] 6 10.10.3.10 2024/01/29 15:21:58.958192088 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port-Type [61] 6 802.11 wireless [19] 2024/01/29 15:21:58.958195606 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: NAS-Port [5] 6 318 2024/01/29 15:21:58.958197668 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 33 2024/01/29 15:21:58.958200740 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 27 "cisco-wlan-ssid=Al Mirqab" 2024/01/29 15:21:58.958203078 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Cisco [26] 35 2024/01/29 15:21:58.958206146 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Cisco AVpair [1] 29 "wlan-profile-name=Al Mirqab" 2024/01/29 15:21:58.958208676 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Vendor, Airespace [26] 12 2024/01/29 15:21:58.958211798 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Airespace-WLAN-ID [1] 6 5 2024/01/29 15:21:58.958215048 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Nas-Identifier [32] 39 "Al Mirqab:default-policy-tag:681-site" 2024/01/29 15:21:58.958218204 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Id [44] 10 "00004d8b" 2024/01/29 15:21:58.958221856 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Octets [42] 6 164406 2024/01/29 15:21:58.958225066 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Giga-Words[52] 6 0 2024/01/29 15:21:58.959482293 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Octets [43] 6 48285 2024/01/29 15:21:58.959485725 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Giga-Words[53] 6 0 2024/01/29 15:21:58.959488923 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Input-Packets [47] 6 392 2024/01/29 15:21:58.959492253 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Output-Packets [48] 6 243 2024/01/29 15:21:58.959495973 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Authentic [45] 6 Remote [3] 2024/01/29 15:21:58.959499707 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Terminate-Cause[49] 6 none [0] 2024/01/29 15:21:58.959502873 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: User-Name [1] 19 "BE-02-5E-92-57-0F" 2024/01/29 15:21:58.959505773 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Class [25] 61 ... 2024/01/29 15:21:58.959549651 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Status-Type [40] 6 Stop [2] 2024/01/29 15:21:58.959552901 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Event-Timestamp [55] 6 1706541718 2024/01/29 15:21:58.959556117 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Session-Time [46] 6 71 2024/01/29 15:21:58.959559069 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Acct-Delay-Time [41] 6 0 2024/01/29 15:21:58.959616585 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Started 5 sec timeout 2024/01/29 15:21:58.959715163 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:21:58.959776543 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:58.959794311 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:58.959835491 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:21:58.959837347 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:21:58.959863393 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x78 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:21:58.959998575 {wncd_x_R0-0}{2}: [errmsg] [17787]: (debug): %CLIENT_ORCH_VLAN_OVERRIDE_LOG-7-CLIENT_VLAN_OVERRIDE: R0/0: wncd: Client MAC: be02.5e92.570f on wlan Al Mirqab and policy profile ALMIRQAB received a vlan override after web-authentication and it is moved to the new VLAN to learn a new IP 2024/01/29 15:21:58.960056685 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_AUTH_IN_PROGRESS -> S_CO_L3_VLAN_OVERRIDE_UPDATE_IN_PROGRESS 2024/01/29 15:21:58.960316286 {wncd_x_R0-0}{2}: [sisf-mac] [17787]: (note): capwap_90000257 vlan 102 mac be02.5e92.570f Mac entry presentBut on a different VLAN - Current VLAN:100 old VLAN:102 2024/01/29 15:21:58.960351152 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE 2024/01/29 15:21:58.960568116 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:21:58.960687516 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (ERR): MAC: 0000.0000.0000 Unable to determine vlan and switching mode. fsm_ctxt not found for client 2024/01/29 15:21:58.960766580 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr addrv6(10) 2024/01/29 15:21:58.960836038 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Remove addrv6 2024/01/29 15:21:58.960867524 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:21:58.960921632 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_IN_PROGRESS 2024/01/29 15:21:58.960939850 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr addr(8) 2024/01/29 15:21:58.960993864 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Remove addr 2024/01/29 15:21:58.961019040 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:21:58.961034226 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:21:58.961037704 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:21:58.961062556 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:21:58.961080376 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:58.961212893 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:21:58.961244963 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_IN_PROGRESS -> S_IPLEARN_IN_PROGRESS 2024/01/29 15:21:58.961263367 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_VLAN_OVERRIDE_UPDATE_IN_PROGRESS -> S_CO_DPATH_PLUMB_IN_PROGRESS 2024/01/29 15:21:58.961282007 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Client datapath entry params - ssid:Al Mirqab,slot_id:1 bssid ifid: 0x90000254, radio_ifid: 0x900001f6, wlan_ifid: 0xf0400005 2024/01/29 15:21:58.961341079 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link-local bridging not enabled for this client, not checking VLAN validity 2024/01/29 15:21:58.961359535 {wncd_x_R0-0}{2}: [llbridge-main] [17787]: (debug): MAC: be02.5e92.570f Link Local Bridging not enabled for client 2024/01/29 15:21:58.961360513 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS dpath create params 2024/01/29 15:21:58.961406585 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:58.961416365 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:58.961428743 {wncd_x_R0-0}{2}: [avc-afc] [17787]: (debug): AVC enabled for client be02.5e92.570f 2024/01/29 15:21:58.961640629 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS -> S_CO_L3_VLAN_OVERRIDE_WAIT_FOR_REASSOC 2024/01/29 15:21:58.962771548 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_WEBAUTH_DONE -> S_AUTHIF_WEBAUTH_DONE 2024/01/29 15:21:58.964681008 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Received from id 1813/39 10.10.1.10:0, Accounting-response, len 38 2024/01/29 15:21:58.964690330 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: authenticator 39 f8 4d 29 85 ff 51 33 - ea e1 51 3b 73 dd 9a e2 2024/01/29 15:21:58.964694618 {wncd_x_R0-0}{2}: [radius] [17787]: (info): RADIUS: Message-Authenticator[80] 18 ... 2024/01/29 15:21:58.964738206 {wncd_x_R0-0}{2}: [radius] [17787]: (info): Valid Response Packet, Free the identifier 2024/01/29 15:21:59.259614855 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 map external to internal ie type. Unsupported IE received, skip decode . IE Type :199 2024/01/29 15:21:59.259616453 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(4) received 2024/01/29 15:21:59.259617391 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): Failed to dot11 get vendor specific id. Wrong vendor ie Type(2) received 2024/01/29 15:21:59.259629043 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Association received. BSSID 34b8.8369.e68e, WLAN Al Mirqab, Slot 1 AP 34b8.8369.e680, WAP-115, Site tag 681-site, Policy tag default-policy-tag, Policy profile ALMIRQAB, Switching Central, old BSSID 34b8.8369.e68e 2024/01/29 15:21:59.259677557 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Received Dot11 association request. Processing started,SSID: Al Mirqab, Policy profile: ALMIRQAB, AP Name: WAP-115, Ap Mac Address: 34b8.8369.e680BSSID MAC34b8.8369.e68ewlan ID: 5RSSI: -35, SNR: 35 2024/01/29 15:21:59.259727301 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_VLAN_OVERRIDE_WAIT_FOR_REASSOC -> S_CO_L3_VLAN_OVERRIDE_WAIT_FOR_REASSOC 2024/01/29 15:21:59.259842077 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2 2024/01/29 15:21:59.259845241 {wncd_x_R0-0}{2}: [dot11-validate] [17787]: (info): MAC: be02.5e92.570f WiFi direct: Dot11 validate P2P IE. P2P IE not present. 2024/01/29 15:21:59.259912401 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f MAC auth is configured. But PMK is present for client. Skipping MAC auth. 2024/01/29 15:21:59.259916105 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f dot11 send association response. Framing association response with resp_status_code: 0 2024/01/29 15:21:59.259916969 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f Dot11 capability privacy bit set TRUE 2024/01/29 15:21:59.259920513 {wncd_x_R0-0}{2}: [dot11] [17787]: (debug): MAC: be02.5e92.570f Dot11 Capability info byte1 11, byte2: 1 2024/01/29 15:21:59.259948151 {wncd_x_R0-0}{2}: [dot11-frame] [17787]: (info): MAC: be02.5e92.570f WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled 2024/01/29 15:21:59.260047349 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f dot11 send association response. Sending assoc response of length: 270 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS 2024/01/29 15:21:59.260052557 {wncd_x_R0-0}{2}: [dot11] [17787]: (note): MAC: be02.5e92.570f Association success. AID 4, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False 2024/01/29 15:21:59.260063676 {wncd_x_R0-0}{2}: [dot11] [17787]: (info): MAC: be02.5e92.570f DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_ASSOCIATED 2024/01/29 15:21:59.260126216 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Station Dot11 association is successful. 2024/01/29 15:21:59.260156242 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Starting L2 authentication. Bssid in state machine:34b8.8369.e68e Bssid in request is:34b8.8369.e68e 2024/01/29 15:21:59.260169152 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L3_VLAN_OVERRIDE_WAIT_FOR_REASSOC -> S_CO_L2_AUTH_IN_PROGRESS 2024/01/29 15:21:59.260283952 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:21:59.260354766 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:59.260367410 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:59.260408626 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:21:59.260410390 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:21:59.260440032 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:21:59.260449600 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_WEBAUTH_DONE -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM 2024/01/29 15:21:59.262814852 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_KM -> S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING 2024/01/29 15:21:59.262906402 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M1 Sent successfully 2024/01/29 15:21:59.262908806 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITDONE -> S_PTK_START 2024/01/29 15:21:59.268196235 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: 0000.0000.0000 Sending pmk_update of XID (0) to (MobilityD[0]) 2024/01/29 15:21:59.268225779 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M2 Status: EAP key M2 validation success 2024/01/29 15:21:59.268354171 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f EAP key M3 Sent successfully 2024/01/29 15:21:59.268355531 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTK_START -> S_PTKINITNEGOTIATING 2024/01/29 15:21:59.268362661 {mobilityd_R0-0}{2}: [mm-client] [18338]: (debug): MAC: 0000.0000.0000 Received pmk_update, sub type: 0 of XID (0) from (WNCD[0]) 2024/01/29 15:21:59.268451222 {mobilityd_R0-0}{2}: [mm-dgram-io] [18338]: (debug): MAC: 0000.0000.0000 Sending message: pmk_update to group: default 2024/01/29 15:21:59.271195900 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f M4 Status: EAP key M4 validation is successful 2024/01/29 15:21:59.271198334 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (note): MAC: be02.5e92.570f EAP Key management successful. AKM:FT-PSK Cipher:CCMP WPA Version: WPA2 2024/01/29 15:21:59.271214394 {wncd_x_R0-0}{2}: [client-keymgmt] [17787]: (info): MAC: be02.5e92.570f Client key-mgmt state transition: S_PTKINITNEGOTIATING -> S_PTKINITDONE 2024/01/29 15:21:59.271293616 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f L2 PSK Authentication Success. EAP type: NA, Resolved VLAN: 100, Audit Session id: 0A030A0A0000757655CF1C81 2024/01/29 15:21:59.271310466 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_PSK_AUTH_KEY_XCHNG_PENDING -> S_AUTHIF_PSK_AUTH_DONE 2024/01/29 15:21:59.271338514 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f L2 Authentication of station is successful., L3 Authentication : 0 2024/01/29 15:21:59.271410162 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (note): MAC: be02.5e92.570f Mobility discovery triggered. Client mode: Local 2024/01/29 15:21:59.271413242 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_MOBILITY_DISCOVERY_IN_PROGRESS 2024/01/29 15:21:59.271434880 {wncd_x_R0-0}{2}: [mm-transition] [17787]: (info): MAC: be02.5e92.570f MMIF FSM transition: S_MA_LOCAL -> S_MA_LOCAL on E_MA_MOBILITY_DISCOVERY 2024/01/29 15:21:59.271435606 {wncd_x_R0-0}{2}: [mm-client] [17787]: (debug): MAC: be02.5e92.570f Mobility Role is known. Responding to CO with mobility complete 2024/01/29 15:21:59.271436190 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Mobility role changed - Local -> Local 2024/01/29 15:21:59.271436622 {wncd_x_R0-0}{2}: [mm-client] [17787]: (info): MAC: be02.5e92.570f Sub Roam type changed - MM_SUB_ROAM_TYPE_INTRA_INSTANCE -> MM_SUB_ROAM_TYPE_INTRA_INSTANCE 2024/01/29 15:21:59.271450366 {wncd_x_R0-0}{2}: [mm-client] [17787]: (note): MAC: be02.5e92.570f Mobility Successful. Roam Type None, Sub Roam Type MM_SUB_ROAM_TYPE_INTRA_INSTANCE, Client IFID: 0xa0000064, Client Role: Local PoA: 0x90000257 PoP: 0x0 2024/01/29 15:21:59.271468990 {wncd_x_R0-0}{2}: [client-orch-sm] [17787]: (debug): MAC: be02.5e92.570f Processing mobility response from MMIF. Client ifid: 0xa0000064, roam type: None, client role: Local 2024/01/29 15:21:59.271713045 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Client QoS add mobile cb 2024/01/29 15:21:59.271763025 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:59.271781983 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none 2024/01/29 15:21:59.271823357 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Build AAA QoS Params for addMobile: aaa_avgdtus:0, aaa_avgrtdtus:0, aaa_bstdtus:0, aaa_bstrtdtus:0, aaa_avgdtds:0, aaa_avgrtdtds:0, aaa_bstdtds:0, aaa_bstrtdtds:0, aaa_sig:1431655765 2024/01/29 15:21:59.271824819 {wncd_x_R0-0}{2}: [ewlc-qos-client] [17787]: (info): MAC: be02.5e92.570f Qos rate-limit parameters encoded successfully in addMobile payload from qos addMobile callback 2024/01/29 15:21:59.271845389 {wncd_x_R0-0}{2}: [client-auth] [17787]: (note): MAC: be02.5e92.570f ADD MOBILE sent. Client state flags: 0x72 BSSID: MAC: 34b8.8369.e68e capwap IFID: 0x90000257, Add mobiles sent: 1 2024/01/29 15:21:59.271887945 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_MOBILITY_DISCOVERY_IN_PROGRESS -> S_CO_DPATH_PLUMB_IN_PROGRESS 2024/01/29 15:21:59.272061149 {wncd_x_R0-0}{2}: [client-orch-state] [17787]: (note): MAC: be02.5e92.570f Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS -> S_CO_IP_LEARN_IN_PROGRESS 2024/01/29 15:21:59.272109633 {wncd_x_R0-0}{2}: [client-iplearn] [17787]: (info): MAC: be02.5e92.570f IP-learn state transition: S_IPLEARN_IN_PROGRESS -> S_IPLEARN_IN_PROGRESS 2024/01/29 15:21:59.273182700 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dot11-device-info(1337) 2024/01/29 15:21:59.273218910 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:21:59.273221822 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] SM Notified attribute Add/Update dot11-device-info 2024/01/29 15:21:59.273226160 {wncd_x_R0-0}{2}: [auth-mgr-feat_template] [17787]: (info): [be02.5e92.570f:capwap_90000257] Radius profiling is enabled in wireless 2024/01/29 15:21:59.273253076 {wncd_x_R0-0}{2}: [auth-mgr-feat_acct] [17787]: (info): [be02.5e92.570f:capwap_90000257] Invoke Acct Coord (mlist 'WebAccounting', Type UPDATE) 2024/01/29 15:21:59.273282406 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found http 2024/01/29 15:21:59.273286044 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Found dhcp 2024/01/29 15:21:59.273314432 {wncd_x_R0-0}{2}: [epm-misc] [17787]: (info): [be02.5e92.570f:capwap_90000257] CUI String Successfully added 2024/01/29 15:21:59.273346660 {wncd_x_R0-0}{2}: [sanet-shim-miscellaneous] [17787]: (ERR): MAC: be02.5e92.570f get_fabric_sgt_tag_value: Fabric mode is not enabled 2024/01/29 15:21:59.273513458 {wncd_x_R0-0}{2}: [caaa-acct] [17787]: (info): [CAAA:ACCT:4c000891] NULL ATTR LIST 2024/01/29 15:21:59.274038527 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] Device type for the session is detected as iPhone 13 and old iPhone 13 & Device name for the session is detected as iPhone 13 and old iPhone 13 & Old protocol map 1025 and new is 1025 2024/01/29 15:21:59.274048029 {wncd_x_R0-0}{2}: [auth-mgr] [17787]: (info): [be02.5e92.570f:capwap_90000257] auth mgr attr add/change notification is received for attr dc-profile-name(1130) 2024/01/29 15:21:59.292061782 {wncd_x_R0-0}{2}: [client-auth] [17787]: (info): MAC: be02.5e92.570f Client auth-interface state transition: S_AUTHIF_PSK_AUTH_DONE -> S_AUTHIF_PSK_AUTH_DONE 2024/01/29 15:22:07.015249831 {wncd_x_R0-0}{2}: [dot11] [17787]: (ERR): MAC: be02.5e92.570f Dropping the disassoc or deauth request. 11w not enabled