) >debug client 74:d8:3e:b2:b9:43 *emWeb: Mar 16 19:35:49.764: Debugging session started on Mar 16 19:35:49.764 for WLC AIR-CT5520-K9 Version :8.10.183.0 SN :FCH2436L07B Hostname HK-03512wl-03 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 Received EAPOL START from mobile in dot1x state = 3 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 Reset the reauth counter since EAPOL START has been received!!! *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 Received EAPOL START from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Aborting state *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Connecting state *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 Sending EAP-Request/Identity to mobile 74:d8:3e:b2:b9:43 (EAP Id 199) *aaaQueueReader: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 Doing AAA Cleanup for mobile (in AAA: 116)d8:3e:b2:b9:43:01 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.343: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Received Identity Response (count=1) from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Resetting reauth count 1 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 EAP State update from Connecting to Authenticating for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Authenticating state *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:150 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 305 *aaaQueueReader: Mar 16 19:35:51.382: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 150) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:00 *radiusTransportThread: Mar 16 19:35:51.384: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:150 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=248) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 WARNING: updated EAP-Identifier 199 ===> 248 for STA 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 248) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.385: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.403: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.403: 74:d8:3e:b2:b9:43 Received EAP Response packet with mismatching id (currentid=248, eapid=199) from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.403: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 248, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:151 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 535 *aaaQueueReader: Mar 16 19:35:51.427: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 151) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:01 *radiusTransportThread: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:151 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=249) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 249) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.434: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 249, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:152 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 369 *aaaQueueReader: Mar 16 19:35:51.502: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 152) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:02 *radiusTransportThread: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:152 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=250) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 250) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.503: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.562: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 250, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:153 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 369 *aaaQueueReader: Mar 16 19:35:51.563: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 153) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:03 *radiusTransportThread: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:153 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=251) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 251) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.564: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.622: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.622: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 251, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.622: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.622: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 251, EAP Type EAP-TLS) *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:154 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 369 *aaaQueueReader: Mar 16 19:35:51.623: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 154) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:04 *radiusTransportThread: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:154 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 Resetting rxResp flag for Mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=252) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 252) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.624: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 252, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 252, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:155 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 369 *aaaQueueReader: Mar 16 19:35:51.686: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 155) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:05 *radiusTransportThread: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:155 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 Resetting rxResp flag for Mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=253) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 253) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.688: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 253, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:156 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 369 *aaaQueueReader: Mar 16 19:35:51.731: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 156) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:06 *radiusTransportThread: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:156 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=254) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 254) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.733: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 254, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:157 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 1865 *aaaQueueReader: Mar 16 19:35:51.864: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 157) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:07 *radiusTransportThread: Mar 16 19:35:51.865: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:157 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.866: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.866: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.866: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=255) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.866: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 255) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.866: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.866: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 255, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:158 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 1865 *aaaQueueReader: Mar 16 19:35:51.910: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 158) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:08 *radiusTransportThread: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:158 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=1) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 WARNING: updated EAP-Identifier 255 ===> 1 for STA 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 1) *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:51.912: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.040: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.040: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 1, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.040: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:159 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 1865 *aaaQueueReader: Mar 16 19:35:52.041: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 159) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:09 *radiusTransportThread: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:159 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=2) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 2) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.042: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 2, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 2, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:160 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 413 *aaaQueueReader: Mar 16 19:35:52.102: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 160) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:0a *radiusTransportThread: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 Access-Challenge received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:160 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 Processing Access-Challenge for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 Resetting rxResp flag for Mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 Entering Backend Auth Req state (id=3) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 Sending EAP Request from AAA to mobile 74:d8:3e:b2:b9:43 (EAP Id 3) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 Reusing allocated memory for EAP Pkt for retransmission to mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.106: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.152: 74:d8:3e:b2:b9:43 Received EAPOL EAPPKT from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.152: 74:d8:3e:b2:b9:43 Received EAP Response from mobile 74:d8:3e:b2:b9:43 (EAP Id 3, EAP Type EAP-TLS) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.152: 74:d8:3e:b2:b9:43 Resetting reauth count 0 to 0 for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.152: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.152: 74:d8:3e:b2:b9:43 Entering Backend Auth Response state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:71 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.28.139.138 port 1812 index 6 active 1 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is maybe-ready 172.28.139.139 port 1812 index 7 active 1 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.138 port 1812 index 4 active 1 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.25.2.139 port 1812 index 5 active 1 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 Found a server : 172.28.139.138 from the WLAN server list of radius server index 7 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 Send Radius Auth Request with pktId:161 into qid:3 of server at index:6 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 Sending the packet to v4 host 172.28.139.138:1812 of length 369 *aaaQueueReader: Mar 16 19:35:52.153: 74:d8:3e:b2:b9:43 Successful transmission of Authentication Packet (pktId 161) to 172.28.139.138:1812 from server queue 3, proxy state 74:d8:3e:b2:b9:43-26:0b *radiusTransportThread: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Got SGT attribute from Radius Server valueLen: 7 and payloadLen: 30 *radiusTransportThread: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 SGT received is '0010-00' *radiusTransportThread: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Radius AVP MPPE send key decrypted key: keylen: 32 *radiusTransportThread: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Radius AVP MPPE recv key: keylen: 32 *radiusTransportThread: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Access-Accept received from RADIUS server 172.28.139.138 (qid:3) with port:1812, pktId:161 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Processing Access-Accept for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Username entry (AI646068.otis.com) created for mobile, length = 253 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Username entry (AI646068.otis.com) created in mscb for mobile, length = 253 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 SGT is not applied, AAA override not enabled for wlan 26 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Received MPPE_SEND_KEY: KeyLen: 32 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Applying new AAA override for station 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Override values for station 74:d8:3e:b2:b9:43 source: 4, valid bits: 0x80000 qosLevel: -1, dscp: 0xffffffff, dot1pTag: 0xffffffff, sessionTimeout: -1 Interim Interval *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Override values (cont..) dataAvgC: -1, rTAvgC: -1, dataBurstC: -1, rTimeBurstC: -1 vlanIfName: '', vlanId:0, aclName: ', ipv6AclName: , avcProfileName: ' *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Unable to apply override policy for station 74:d8:3e:b2:b9:43 - VapAllowRadiusOverride is FALSE. *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Local policy not enabled on. Not applying override *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Setting re-auth timeout to 43000 seconds, got from WLAN config. *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Station 74:d8:3e:b2:b9:43 setting dot1x reauth timeout = 43000 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Creating a PKC PMKID Cache entry for station 74:d8:3e:b2:b9:43 (RSN 2) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Resetting MSCB PMK Cache Entry @index 0 for station 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Setting active key cache index 8 ---> 8 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Setting active key cache index 8 ---> 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Created PMKID PMK Cache for BSSID 08:45:d1:6e:a6:0f at index 0 for station 74:d8:3e:b2:b9:43 (sticky key cache disabled) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: New PMKID: (16) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: [0000] 61 3f 78 9d 7f 89 3e 08 17 62 2d 1d 8f e9 27 de *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 802.11i: Create a global PMK cache entry, AKM-type = 1 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 apfCreatePmkCacheEntry: added a new pmk cache entry for 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 1x: Updated the audit-session-id of PMK-Cache from client mscb: 868b1cac000d182d72ef1264 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 unsetting PmkIdValidatedByAp *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Zeroize AAA Overrides from local for station *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Building Audit session ID (868b1cac000d182d72ef1264) payload in Mobility handoff *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 2 PMK-update groupcast messages sent *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 PMK sent to mobility group *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Disabling re-auth since PMK lifetime can take care of same. *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Sending EAP-Success to mobile 74:d8:3e:b2:b9:43 (EAP Id 3) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 key Desc Version FT - 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Found an cache entry for BSSID 08:45:d1:6e:a6:0f in PMKID cache at index 0 of station 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Found an cache entry for BSSID 08:45:d1:6e:a6:0f in PMKID cache at index 0 of station 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: Including PMKID in M1 (16) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: [0000] 61 3f 78 9d 7f 89 3e 08 17 62 2d 1d 8f e9 27 de *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: M1 - Key Data: (22) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: [0000] dd 14 00 0f ac 04 61 3f 78 9d 7f 89 3e 08 17 62 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: [0016] 2d 1d 8f e9 27 de *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Starting key exchange to mobile 74:d8:3e:b2:b9:43, data packets will be dropped *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Sending EAPOL-Key Message to mobile 74:d8:3e:b2:b9:43 state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Entering Backend Auth Success state (id=3) for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 Received Auth Success while in Authenticating state for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.163: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Authenticated state *dot1xSocketTask: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 validating eapol pkt: key version = 2 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 key Desc Version FT - 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Received EAPOL-key in PTK_START state (message 2) from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Encryption Policy: 4, PTK Key Length: 48 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Successfully computed PTK from PMK!!! *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Received valid MIC in EAPOL Key Message M2!!!!! *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 rsnieCapabilty = 0 rsnie_len =20 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Dumping RSNIE received in Association request(len = 24): *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 00000000: 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0............... *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 00000010: 00 0f ac 01 00 00 00 00 ........ *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Dumping RSNIE received in EAPOL M2 (len = 22): *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 00000010: ac 01 00 00 00 00 ...... *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 distribute to flexgroup only when the PSK request is not in progress with RADIUS *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Stopping retransmission timer for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 key Desc Version FT - 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 key Desc Version FT - 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.217: 74:d8:3e:b2:b9:43 Sending EAPOL-Key Message to mobile 74:d8:3e:b2:b9:43 state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01 *dot1xSocketTask: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 validating eapol pkt: key version = 2 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 key Desc Version FT - 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Stopping retransmission timer for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Freeing EAP Retransmit Bufer for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 apfMs1xStateInc *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Mobility query, PEM State: L2AUTHCOMPLETE *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 L2AUTHCOMPLETE (4) NO release MSCB *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Building Mobile Announce : *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Building Client Payload: *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Client Ip: 0.0.0.0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Client Vap Security: 16384 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 ssid: OTI-Corp *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Building Client profile name Payload: *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Profile Name: OTI-Corp *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Building VlanIpPayload. *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Mobile Announce sent to 2 members of the local group. *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Flex Central Auth Client *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 08:45:d1:6e:a6:00 vapId 26 apVapId 1for this client *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 flex webauth acl id to be sent :65535 name : client acl id :65535 name : *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name : *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 08:45:d1:6e:a6:00 vapId 26 apVapId 1 flex acl-name: v6acl-name *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Not sending Registration for Fabric client. Primary and Secondary MS IP is zero *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Mobility peer ip is 0, failed to get session type *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule type = Airespace AP - Learn IP address on AP 08:45:d1:6e:a6:00, slot 1, interface = 8, QOS = 0 IPv4 ACL ID = 255, IPv *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 221, Local Bridging intf id = 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0) *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Updating info change db with CMX bitmap 0x0000 *Dot1x_NW_MsgTask_3: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) NO release MSCB *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Add SGT:0 to AP 08:45:d1:6e:a6:00 *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 MS IP NULL during AddMobile, not sending IP Distribution *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Flex Ipv6 post auth acl is not present, not updating add mobile Payload *pemReceiveTask: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0 *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Successful transmission of LWAPP Add-Mobile to AP 08:45:d1:6e:a6:00 slotId 1 idx@180 *spamApTask6: Mar 16 19:35:52.269: 74:d8:3e:b2:b9:43 Setting ADD_MOBILE (idx 181, action 0, last count 121) ack state for STA on AP 08:45:d1:6e:a6:00 *iappSocketTask: Mar 16 19:35:52.478: 74:d8:3e:b2:b9:43 IAPP-IP-UPDATE(0):891 Bytes received for client *apfReceiveTask: Mar 16 19:35:52.478: 74:d8:3e:b2:b9:43 Recieved MS IPv4 Addr= 0.0.0.0 *apfReceiveTask: Mar 16 19:35:52.478: 74:d8:3e:b2:b9:43 Recieved IPv6 addresses count: 1 *apfReceiveTask: Mar 16 19:35:52.478: 74:d8:3e:b2:b9:43 Updating MS IPv6[1] Addr= fe80:0000:0000:0000:39b5:e86b:e625:d953 *emWeb: Mar 16 19:35:54.552: 74:d8:3e:b2:b9:43 Succesfully freed AID 5, slot 1 on AP 08:45:d1:6e:a6:00, #client on this slot 2 *emWeb: Mar 16 19:35:54.552: 74:d8:3e:b2:b9:43 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 6, reasonCode 252 *emWeb: Mar 16 19:35:54.552: 74:d8:3e:b2:b9:43 Scheduling deletion of Mobile Station: reasonCode 252 (callerId: 30) in 1 seconds *emWeb: Mar 16 19:35:54.552: 74:d8:3e:b2:b9:43 Removing PMK cache entry for station 74:d8:3e:b2:b9:43 *emWeb: Mar 16 19:35:54.553: 74:d8:3e:b2:b9:43 2 PMK-remove groupcast messages sent *emWeb: Mar 16 19:35:54.553: 74:d8:3e:b2:b9:43 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.28.139.134 *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 pemAdvanceState2 (pem_api.c:6878) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Associated to Associated *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 7012, Adding TMP rule *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 Mobility peer ip is 0, failed to get session type *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule type = Airespace AP - Learn IP address on AP 08:45:d1:6e:a6:00, slot 1, interface = 8, QOS = 0 IPv4 ACL ID = 255, *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 221, Local Bridging intf id = 0 *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0) *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 Updating info change db with CMX bitmap 0x0000 *apfReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 DHCP_REQD (7) NO release MSCB *pemReceiveTask: Mar 16 19:35:55.194: 74:d8:3e:b2:b9:43 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0 *osapiBsnTimer: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 apfMsExpireCallback (apf_ms.c:688) Expiring Mobile! *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 apfMsExpireMobileStation (apf_ms.c:8142) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Associated to Disassociated *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 apfSendDisAssocMsgDebug (apf_80211.c:4279) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Disassociated to Disassociated *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Sent Disassociate to mobile on AP 08:45:d1:6e:a6:00-1 on BSSID 08:45:d1:6e:a6:0f(reason 1, caller apf_ms.c:8227) *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Setting active key cache index 0 ---> 8 *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Deleting the PMK cache when de-authenticating the client. *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Global PMK Cache deletion failed. *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Sent Deauthenticate to mobile on BSSID 08:45:d1:6e:a6:0f slot 1 reason code 252 (caller apf_ms.c:8236) *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 apfMsAssoStateDec *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 apfMsExpireMobileStation (apf_ms.c:8294) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Disassociated to Idle *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 the value of url acl preserve flag is 0 for mobile 74:d8:3e:b2:b9:43 (caller pem_api.c:5292) *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [08:45:d1:6e:a6:00] *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Delete PMK cache along with client. Reason code: 252, Mobility Role: Local *pemReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 0.0.0.0 Removed NPU entry. *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 2 PMK-remove groupcast messages sent *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *spamApTask6: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 08:45:d1:6e:a6:00 *spamApTask6: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Setting ADD_MOBILE (idx 182, seqno 127, action 6, count 127, last count 127) ack state for STA on AP 08:45:d1:6e:a6:00 *spamApTask6: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Delete Mobile request with reason 'MN_DEL_PEM_CLEANUP' on slot 1 sent to the AP 08:45:d1:6e:a6:00 IP: 10.69.248.169:5260. *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Username entry 'AI646068.otis.com' is deleted for mobile from the UserName table *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Username entry AI646068.otis.com deleted for mobile *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Deleting mobile on AP 08:45:d1:6e:a6:00(1) *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 apf_ms.c:5636 Clearing the SGT 0 of mobile *apfReceiveTask: Mar 16 19:35:55.398: 74:d8:3e:b2:b9:43 Decrement the SGT 0 policy count reference by the clients 2049 *spamApTask6: Mar 16 19:35:55.441: 74:d8:3e:b2:b9:43 Received add/del ack packet with sequence number: got 127 expected 127 action = 6 (HK-03512wl-03) >*apfOpenDtlSocket: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 Received management frame REASSOCIATION REQUEST on BSSID 24:36:da:13:db:0f destination addr 24:36:da:13:db:0f slotid 1 *apfMsConnTask_0: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 Updating the client capabiility as 4 *apfMsConnTask_0: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 Processing assoc-req station:74:d8:3e:b2:b9:43 AP:24:36:da:13:db:00-01 ssid : OTI-Corp thread:70946ef1c0 *apfMsConnTask_0: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 apfCreateMobileStationEntryWrapper (apf_ms.c:4510) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 24:36:da:13:db:00 from Idle to Idle *apfMsConnTask_0: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 Adding mobile on LWAPP AP 24:36:da:13:db:00(1) *apfMsConnTask_0: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 Created Acct-Session-ID (6412ff1e/74:d8:3e:b2:b9:43/879243) for the mobile *apfMsConnTask_0: Mar 16 19:35:58.489: 74:d8:3e:b2:b9:43 Setting hasApChnaged Flag as true. It is a fresh assoc request. *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Setting RTTS enabled to 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Reassociation received from mobile on BSSID 24:36:da:13:db:f6 AP CN-07928ap-04 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 trying to join WLAN with RSSI -91. Checking for XOR roam conditions on AP: 24:36:DA:13:DB:00 Slot: 1 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 is associating to AP 24:36:DA:13:DB:00 which is not XOR roam capable *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Max Client Trap Threshold: 0 cur: 5 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Updated local bridging VLAN to 221 while applying WLAN policy *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Not re-applying interface policy for local switching Client *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3498) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3518) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3539) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Check before Setting the NAS Id to WLAN specific Id '' *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Increment the SGT 0 policy count reference by the clients 2050 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Check the client SGT 0 policy and push it to AP 24:36:da:13:db:00 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 In processSsidIE:7685 setting Central switched to FALSE *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Disabling flexconnect central association for the client *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Applying site-specific Local Bridging override for station 74:d8:3e:b2:b9:43 - vapId 26, site 'BIS-AP-GRP-CH7928', interface 'management' *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Applying Local Bridging Interface Policy for station 74:d8:3e:b2:b9:43 - vlan 221, interface id 0, interface 'management', nasId:'' *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 override from ap group, removing intf group from mscb *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Applying site-specific override for station 74:d8:3e:b2:b9:43 - vapId 26, site 'BIS-AP-GRP-CH7928', interface 'management' *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Not applying Local Bridge Policy because Site Specific Interface(management) Policy is already applied. *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Not re-applying interface policy for local switching Client *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 After applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3498) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3518) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3539) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Mar 16 19:35:58.490: RSNIE in Assoc. Req.: (38) *apfMsConnTask_0: Mar 16 19:35:58.490: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Mar 16 19:35:58.490: [0016] ac 01 00 00 01 00 a9 17 a0 fe 03 70 2d 5d 03 e7 *apfMsConnTask_0: Mar 16 19:35:58.490: [0032] 28 fc 96 7f 55 7f *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Processing RSN IE type 48, length 38 for mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Received 802.11i 802.1X key management suite, enabling dot1x Authentication *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 RSN Capabilities: 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 non-11w Capable mobile *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Received RSN IE(AKM:1) with 1 PMKIDs *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Received RSN IE with 1 PMKIDs from mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:35:58.490: Received PMKID: (16) *apfMsConnTask_0: Mar 16 19:35:58.490: [0000] a9 17 a0 fe 03 70 2d 5d 03 e7 28 fc 96 7f 55 7f *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Searching for PMKID in MSCB PMKID cache for mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 No valid PMKID found in the MSCB PMKID cache for mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Trying to compute a PMKID from MSCB PMK cache for mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:35:58.490: CCKM: Find PMK in cache: BSSID = (6) *apfMsConnTask_0: Mar 16 19:35:58.490: [0000] 24 36 da 13 db 00 *apfMsConnTask_0: Mar 16 19:35:58.490: CCKM: Find PMK in cache: realAA = (6) *apfMsConnTask_0: Mar 16 19:35:58.490: [0000] 24 36 da 13 db 0f *apfMsConnTask_0: Mar 16 19:35:58.490: CCKM: Find PMK in cache: PMKID = (16) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Searching for PMK in global PMK cache for mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Setting active key cache index 8 ---> 8 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Assigned flex post-auth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Updating AID for REAP AP Client 24:36:da:13:db:00 - AID ===> 4 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Reassoc Req BSSID 24:36:da:13:db:f6 AP(CN-07928ap-04) slot 1 ssid (OTI-Corp) Tmstmp 4546769 AID 4 stCode 0/0 apChngd 0 oldAp 00:00:00:00:00:00 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Initializing policy *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 AuthenticationRequired = 1 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Flex Central Auth Client *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001] *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) DHCP required on AP 24:36:da:13:db:00 vapId 26 apVapId 1for this client *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 flex webauth acl id to be sent :65535 name : client acl id :65535 name : *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Vlan while overriding the policy = -1 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 24:36:da:13:db:00 vapId 26 apVapId 1 flex acl-name: v6acl-name *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 apfMsAssoStateInc *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 24:36:da:13:db:00 from Idle to Associated *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 apfPemAddUser2:session timeout forstation 74:d8:3e:b2:b9:43 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Sending assoc-resp with status 0 station:74:d8:3e:b2:b9:43 AP:24:36:da:13:db:00-01 on apVapId 1 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 VHT Operation IE: width 20/0 ch 56 freq0 0 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Sending Assoc Response (status: '0') to station on AP CN-07928ap-04 on BSSID 24:36:da:13:db:0f ApVapId 1 Slot 1, mobility role 0 *apfMsConnTask_0: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 apfProcessAssocReq (apf_80211.c:12998) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 24:36:da:13:db:00 from Associated to Associated *spamApTask3: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Add SGT:0 to AP 24:36:da:13:db:00 *spamApTask3: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask3: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload *spamApTask3: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Flex Ipv6 post auth acl is not present, not updating add mobile Payload *spamApTask3: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Successful transmission of LWAPP Add-Mobile to AP 24:36:da:13:db:00 slotId 1 idx@149 *spamApTask3: Mar 16 19:35:58.490: 74:d8:3e:b2:b9:43 Setting ADD_MOBILE (idx 149, seqno 102, action 1, count 102, last count 102) ack state for STA on AP 24:36:da:13:db:00 *spamApTask3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 Received add/del ack packet with sequence number: got 102 expected 102 action = 1 *spamApTask3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 APF Initiating 1x to STA 74:d8:3e:b2:b9:43 *spamApTask3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 Sent dot1x auth initiate message for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 dot1xProcessInitiate1XtoMobile to mobile station 74:d8:3e:b2:b9:43 (mscb 1, msg 1) *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 1 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:47 *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 EAP-PARAM Debug - eap-params for Wlan-Id :26 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 Station 74:d8:3e:b2:b9:43 setting dot1x reauth timeout = 43000 *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Connecting state *Dot1x_NW_MsgTask_3: Mar 16 19:35:58.526: 74:d8:3e:b2:b9:43 Sending EAP-Request/Identity to mobile 74:d8:3e:b2:b9:43 (EAP Id 1) (HK-03512wl-03) >*apfOpenDtlSocket: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Received management frame ASSOCIATION REQUEST on BSSID 24:36:da:13:db:0f destination addr 24:36:da:13:db:0f slotid 1 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Processing assoc-req station:74:d8:3e:b2:b9:43 AP:24:36:da:13:db:00-01 ssid : OTI-Corp thread:70946ef1c0 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 trying to join WLAN with RSSI -90. Checking for XOR roam conditions on AP: 24:36:DA:13:DB:00 Slot: 1 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 is associating to AP 24:36:DA:13:DB:00 which is not XOR roam capable *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Updating location for mobile on same AP 24:36:da:13:db:00-1 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Client AVC Roaming context transfer needed? NO *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Setting RTTS enabled to 0 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Association received from mobile on BSSID 24:36:da:13:db:f6 AP CN-07928ap-04 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 trying to join WLAN with RSSI -90. Checking for XOR roam conditions on AP: 24:36:DA:13:DB:00 Slot: 1 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 is associating to AP 24:36:DA:13:DB:00 which is not XOR roam capable *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Max Client Trap Threshold: 0 cur: 6 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Updated local bridging VLAN to 221 while applying WLAN policy *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Check before Setting the NAS Id to WLAN specific Id '' *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Check the client SGT 0 policy and push it to AP 24:36:da:13:db:00 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 In processSsidIE:7685 setting Central switched to FALSE *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Disabling flexconnect central association for the client *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Applying site-specific Local Bridging override for station 74:d8:3e:b2:b9:43 - vapId 26, site 'BIS-AP-GRP-CH7928', interface 'management' *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Applying Local Bridging Interface Policy for station 74:d8:3e:b2:b9:43 - vlan 221, interface id 0, interface 'management', nasId:'' *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 override from ap group, removing intf group from mscb *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Applying site-specific override for station 74:d8:3e:b2:b9:43 - vapId 26, site 'BIS-AP-GRP-CH7928', interface 'management' *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Not applying Local Bridge Policy because Site Specific Interface(management) Policy is already applied. *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Not re-applying interface policy for local switching Client *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3498) *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3518) *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3539) *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0 *apfMsConnTask_0: Mar 16 19:36:59.809: 74:d8:3e:b2:b9:43 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Mar 16 19:36:59.810: RSNIE in Assoc. Req.: (22) *apfMsConnTask_0: Mar 16 19:36:59.810: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Mar 16 19:36:59.810: [0016] ac 01 00 00 00 00 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Received 802.11i 802.1X key management suite, enabling dot1x Authentication *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 RSN Capabilities: 0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Received RSN IE(AKM:1) with 0 PMKIDs *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Received RSN IE with 0 PMKIDs from mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Setting active key cache index 8 ---> 8 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 unsetting PmkIdValidatedByAp *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 AID 4 in Assoc Req from flex AP 24:36:da:13:db:00 is same as in mscb 74:d8:3e:b2:b9:43 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Assoc Req BSSID 24:36:da:13:db:f6 AP(CN-07928ap-04) slot 1 ssid (OTI-Corp) Tmstmp 4546829 AID 4 stCode 0/0 apChngd 0 oldAp 24:36:DA:13:DB:00 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Authreqd flag unchanged 1 for mobile with macAuthType [0] pemSt 3 secWord 4000 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Not changing skipL2auth flag with authReqd [1] macauth [0] pemSt 3 secWord 4000 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Initializing policy *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3) *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 AuthenticationRequired = 1 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Flex Central Auth Client *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001] *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) DHCP required on AP 24:36:da:13:db:00 vapId 26 apVapId 1for this client *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 flex webauth acl id to be sent :65535 name : client acl id :65535 name : *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name : *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Vlan while overriding the policy = -1 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 24:36:da:13:db:00 vapId 26 apVapId 1 flex acl-name: v6acl-name *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 24:36:da:13:db:00 from Associated to Associated *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 apfPemAddUser2:session timeout forstation 74:d8:3e:b2:b9:43 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Sending assoc-resp with status 0 station:74:d8:3e:b2:b9:43 AP:24:36:da:13:db:00-01 on apVapId 1 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 VHT Operation IE: width 20/0 ch 56 freq0 0 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Sending Assoc Response (status: '0') to station on AP CN-07928ap-04 on BSSID 24:36:da:13:db:0f ApVapId 1 Slot 1, mobility role 0 *apfMsConnTask_0: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 apfProcessAssocReq (apf_80211.c:12998) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 24:36:da:13:db:00 from Associated to Associated *spamApTask3: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Add SGT:0 to AP 24:36:da:13:db:00 *spamApTask3: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask3: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload *spamApTask3: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Flex Ipv6 post auth acl is not present, not updating add mobile Payload *spamApTask3: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Successful transmission of LWAPP Add-Mobile to AP 24:36:da:13:db:00 slotId 1 idx@151 *spamApTask3: Mar 16 19:36:59.810: 74:d8:3e:b2:b9:43 Setting ADD_MOBILE (idx 151, seqno 104, action 1, count 104, last count 104) ack state for STA on AP 24:36:da:13:db:00 *spamApTask3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 Received add/del ack packet with sequence number: got 104 expected 104 action = 1 *spamApTask3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 APF Initiating 1x to STA 74:d8:3e:b2:b9:43 *spamApTask3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 Sent dot1x auth initiate message for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 dot1xProcessInitiate1XtoMobile to mobile station 74:d8:3e:b2:b9:43 (mscb 2, msg 2) *Dot1x_NW_MsgTask_3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 reauth_sm state transition 1 ---> 0 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 EAP-PARAM Debug - eap-params for Wlan-Id :26 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Connecting state *Dot1x_NW_MsgTask_3: Mar 16 19:36:59.864: 74:d8:3e:b2:b9:43 Sending EAP-Request/Identity to mobile 74:d8:3e:b2:b9:43 (EAP Id 1) (HK-03512wl-03) > (HK-03512wl-03) >*emWeb: Mar 16 19:37:47.451: 74:d8:3e:b2:b9:43 Succesfully freed AID 4, slot 1 on AP 24:36:da:13:db:00, #client on this slot 5 *emWeb: Mar 16 19:37:47.451: 74:d8:3e:b2:b9:43 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 6, reasonCode 252 *emWeb: Mar 16 19:37:47.451: 74:d8:3e:b2:b9:43 Scheduling deletion of Mobile Station: reasonCode 252 (callerId: 30) in 1 seconds *emWeb: Mar 16 19:37:47.451: 74:d8:3e:b2:b9:43 2 PMK-remove groupcast messages sent *emWeb: Mar 16 19:37:47.451: 74:d8:3e:b2:b9:43 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *osapiBsnTimer: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 apfMsExpireCallback (apf_ms.c:688) Expiring Mobile! *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 apfMsExpireMobileStation (apf_ms.c:8142) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 24:36:da:13:db:00 from Associated to Disassociated *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 apfMsAssoStateDec *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 the value of url acl preserve flag is 0 for mobile 74:d8:3e:b2:b9:43 (caller pem_api.c:5292) *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [24:36:da:13:db:00] *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 Delete PMK cache along with client. Reason code: 252, Mobility Role: Unassociated *spamApTask3: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 24:36:da:13:db:00 *spamApTask3: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 Setting ADD_MOBILE (idx 155, seqno 108, action 6, count 108, last count 108) ack state for STA on AP 24:36:da:13:db:00 *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 Deleting mobile on AP 24:36:da:13:db:00(1) *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 apf_ms.c:5636 Clearing the SGT 0 of mobile *apfReceiveTask: Mar 16 19:37:48.278: 74:d8:3e:b2:b9:43 Decrement the SGT 0 policy count reference by the clients 2050 *spamApTask3: Mar 16 19:37:48.313: 74:d8:3e:b2:b9:43 Received add/del ack packet with sequence number: got 108 expected 108 action = 6 *apfOpenDtlSocket: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Received management frame REASSOCIATION REQUEST on BSSID 08:45:d1:6e:a6:0f destination addr 08:45:d1:6e:a6:0f slotid 1 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Updating the client capabiility as 4 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Processing assoc-req station:74:d8:3e:b2:b9:43 AP:08:45:d1:6e:a6:00-01 ssid : OTI-Corp thread:70946f0b40 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apfCreateMobileStationEntryWrapper (apf_ms.c:4510) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Idle to Idle *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Adding mobile on LWAPP AP 08:45:d1:6e:a6:00(1) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Created Acct-Session-ID (6412ff8d/74:d8:3e:b2:b9:43/879272) for the mobile *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Setting hasApChnaged Flag as true. It is a fresh assoc request. *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Setting RTTS enabled to 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Reassociation received from mobile on BSSID 08:45:d1:6e:a6:f6 AP CN-07928ap-06 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 trying to join WLAN with RSSI -91. Checking for XOR roam conditions on AP: 08:45:D1:6E:A6:00 Slot: 1 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Station: 74:D8:3E:B2:B9:43 is associating to AP 08:45:D1:6E:A6:00 which is not XOR roam capable *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Global 200 Clients are allowed to AP radio *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Updated local bridging VLAN to 221 while applying WLAN policy *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 override for default ap group, marking intgrp NULL *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Not re-applying interface policy for local switching Client *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 After applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3498) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3518) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3539) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apf_policy.c:2783 Assigning the SGT 0 to mobile (earlier sgt 0) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Increment the SGT 0 policy count reference by the clients 2049 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Check the client SGT 0 policy and push it to AP 08:45:d1:6e:a6:00 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 In processSsidIE:7685 setting Central switched to FALSE *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Disabling flexconnect central association for the client *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Applying site-specific Local Bridging override for station 74:d8:3e:b2:b9:43 - vapId 26, site 'BIS-AP-GRP-CH7928', interface 'management' *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Applying Local Bridging Interface Policy for station 74:d8:3e:b2:b9:43 - vlan 221, interface id 0, interface 'management', nasId:'' *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 override from ap group, removing intf group from mscb *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Applying site-specific override for station 74:d8:3e:b2:b9:43 - vapId 26, site 'BIS-AP-GRP-CH7928', interface 'management' *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Not applying Local Bridge Policy because Site Specific Interface(management) Policy is already applied. *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Not re-applying interface policy for local switching Client *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 After applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3498) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3518) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3539) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_4: Mar 16 19:37:49.721: RSNIE in Assoc. Req.: (22) *apfMsConnTask_4: Mar 16 19:37:49.721: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_4: Mar 16 19:37:49.721: [0016] ac 01 00 00 00 00 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Processing RSN IE type 48, length 22 for mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Received 802.11i 802.1X key management suite, enabling dot1x Authentication *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 RSN Capabilities: 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 non-11w Capable mobile *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Received RSN IE(AKM:1) with 0 PMKIDs *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Received RSN IE with 0 PMKIDs from mobile 74:d8:3e:b2:b9:43 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Setting active key cache index 8 ---> 8 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Updating AID for REAP AP Client 08:45:d1:6e:a6:00 - AID ===> 2 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Reassoc Req BSSID 08:45:d1:6e:a6:f6 AP(CN-07928ap-06) slot 1 ssid (OTI-Corp) Tmstmp 4546878 AID 2 stCode 0/0 apChngd 0 oldAp 00:00:00:00:00:00 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Initializing policy *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 AuthenticationRequired = 1 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Encryption policy is set to 0x80000001 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001] *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) DHCP required on AP 08:45:d1:6e:a6:00 vapId 26 apVapId 1for this client *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name : *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Vlan while overriding the policy = -1 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 08:45:d1:6e:a6:00 vapId 26 apVapId 1 flex acl-name: v6acl-name *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apfMsAssoStateInc *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Idle to Associated *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 apfPemAddUser2:session timeout forstation 74:d8:3e:b2:b9:43 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_4: Mar 16 19:37:49.721: 74:d8:3e:b2:b9:43 Sending assoc-resp with status 0 station:74:d8:3e:b2:b9:43 AP:08:45:d1:6e:a6:00-01 on apVapId 1 *apfMsConnTask_4: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 VHT Operation IE: width 20/0 ch 64 freq0 0 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_4: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Sending Assoc Response (status: '0') to station on AP CN-07928ap-06 on BSSID 08:45:d1:6e:a6:0f ApVapId 1 Slot 1, mobility role 0 *apfMsConnTask_4: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 apfProcessAssocReq (apf_80211.c:12998) Changing state for mobile 74:d8:3e:b2:b9:43 on AP 08:45:d1:6e:a6:00 from Associated to Associated *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Add SGT:0 to AP 08:45:d1:6e:a6:00 *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 MS IP NULL during AddMobile, not sending IP Distribution *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Flex Ipv6 post auth acl is not present, not updating add mobile Payload *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Successful transmission of LWAPP Add-Mobile to AP 08:45:d1:6e:a6:00 slotId 1 idx@187 *spamApTask6: Mar 16 19:37:49.722: 74:d8:3e:b2:b9:43 Setting ADD_MOBILE (idx 187, seqno 132, action 1, count 132, last count 132) ack state for STA on AP 08:45:d1:6e:a6:00 *spamApTask6: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 Received add/del ack packet with sequence number: got 132 expected 132 action = 1 *spamApTask6: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 Received ADD_MOBILE ack - Initiating 1x to STA 74:d8:3e:b2:b9:43 (idx 187) *spamApTask6: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 APF Initiating 1x to STA 74:d8:3e:b2:b9:43 *spamApTask6: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 Sent dot1x auth initiate message for mobile 74:d8:3e:b2:b9:43 *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 dot1xProcessInitiate1XtoMobile to mobile station 74:d8:3e:b2:b9:43 (mscb 1, msg 1) *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 reauth_sm state transition 0 ---> 1 for mobile 74:d8:3e:b2:b9:43 at 1x_reauth_sm.c:47 *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 EAP-PARAM Debug - eap-params for Wlan-Id :26 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 Station 74:d8:3e:b2:b9:43 setting dot1x reauth timeout = 43000 *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 dot1x - moving mobile 74:d8:3e:b2:b9:43 into Connecting state *Dot1x_NW_MsgTask_3: Mar 16 19:37:49.759: 74:d8:3e:b2:b9:43 Sending EAP-Request/Identity to mobile 74:d8:3e:b2:b9:43 (EAP Id 1) *spamApTask3: Mar 16 19:37:50.119: 74:d8:3e:b2:b9:43 Received DELETE mobile, reasonCode UNKNOWN, deleteReason 15 from AP 24:36:da:13:db:00, slot 1 ...cleaning up mscb *spamApTask3: Mar 16 19:37:50.119: 74:d8:3e:b2:b9:43 Warning, ignore the DELETE_MOBILE_PAYLOAD from AP: 24:36:da:13:db:00, slot 1. STA connecting AP: 08:45:d1:6e:a6:00, slot 1