*apfOpenDtlSocket: Mar 13 11:17:00.744: c0:a6:00:2e:38:32 Recevied management frame AUTH on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfOpenDtlSocket: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Recevied management frame REASSOCIATION REQUEST on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Updating 11r vendor IE *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Processing assoc-req station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 ssid : NPC_EXEC thread:a514c40 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -71. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Reassociation received from mobile on BSSID 00:6b:f1:9b:c7:ab AP RT2ndITArea *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -71. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Global 200 Clients are allowed to AP radio *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Max Client Trap Threshold: 0 cur: 7 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 FT Adaptive AKM not negotiated *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 override for default ap group, marking intgrp NULL *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 In processSsidIE:6609 setting Central switched to FALSE *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Set Clinet MSCB as Central Association Disabled *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Applying site-specific Local Bridging override for station c0:a6:00:2e:38:32 - vapId 12, site 'RTBuilding', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Applying Local Bridging Interface Policy for station c0:a6:00:2e:38:32 - vlan 125, interface id 5, interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 override from ap group, removing intf group from mscb *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Applying site-specific override for station c0:a6:00:2e:38:32 - vapId 12, site 'Manufacturing-Floor1', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Applying Interface(wifi_exec) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 125 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Not re-applying interface policy for local switching Client *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 125 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 This apfMsAccessVlan may be changed later from AAA after L2 Auth *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Cleared localSwitchingVlan, may be assigned later based on AAA override *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 STA - rates (7): 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Marking this mobile as TGr capable. *apfMsConnTask_6: Mar 13 11:17:00.761: RSNIE in Assoc. Req.: (38) *apfMsConnTask_6: Mar 13 11:17:00.761: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_6: Mar 13 11:17:00.761: [0016] ac 03 0c 00 01 00 0f fd 80 74 5f 0c c8 10 cd 60 *apfMsConnTask_6: Mar 13 11:17:00.761: [0032] 6c e9 22 b8 e3 97 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Processing RSN IE type 48, length 38 for mobile c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 RSN Capabilities: 12 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Marking Mobile as non-11w Capable *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Validating FT AKM's on WLAN *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Setting adaptive AKM 3 into RSN Data at 19 *apfMsConnTask_6: Mar 13 11:17:00.761: R1KHID+S1KHID: (12) *apfMsConnTask_6: Mar 13 11:17:00.761: [0000] 00 50 56 a3 ea 3c c0 a6 00 2e 38 32 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Roaming succeed for this client. *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Found an cache entry for BSSID 00:6b:f1:8b:31:20 in PMKID cache at index 0 of station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Removing BSSID 00:6b:f1:8b:31:20 from PMKID cache of station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Setting active key cache index 0 ---> 8 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 8 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Created PKC PMK Cache entry for station c0:a6:00:2e:38:32 (RSN 2) on BSSID 00:6b:f1:8b:31:20 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Deleted mobile LWAPP rule on AP [00:6b:f1:8b:31:20] *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Succesfully freed AID 56, slot 0 on AP 00:6b:f1:8b:31:20, #client on this slot 5 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 New ctxOwnerMwarIp: 10.80.115.15 New ctxOwnerApMac: 00:6B:F1:9B:C7:A0 New ctxOwnerApEthMac: 00:2A:10:C9:C6:20 New ctxOwnerApSlotId: 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Updated location for station old AP 00:6b:f1:8b:31:20 oldSlot 0, new AP 00:6b:f1:9b:c7:a0 newSlot 0, AID 0 MsType 0 MobilityRole 1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Updating AID for REAP AP Client 00:6b:f1:9b:c7:a0 - AID ===> 74 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfMsRunStateDec *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfMs1xStateDec *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 START (0) Initializing policy *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 AuthenticationRequired = 1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Encryption policy is set to 0x80000004 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfPemAddUser2:session timeout forstation c0:a6:00:2e:38:32 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Sending assoc-resp with status 0 station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 on apVapId 1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Including FT Mobility Domain IE (length 5) in reassociation assoc Resp to mobile *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Sending Assoc Response (status: '0') to station on AP RT2ndITArea on BSSID 00:6b:f1:9b:c7:a0 ApVapId 1 Slot 0, mobility role 1 *apfMsConnTask_6: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *spamApTask5: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Delete Mobile request on slot 0 sent to the AP 00:6b:f1:8b:31:20 IP: 10.80.115.64:5272 *spamApTask7: Mar 13 11:17:00.761: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *spamApTask5: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 apfUpdateDeleteAckInMscb (apf_api.c:51702) Expiring Mobile! *spamApTask7: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Received ADD_MOBILE ack - Initiating 1x to STA c0:a6:00:2e:38:32 (idx 3) *spamApTask7: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Sent dot1x auth initiate message for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 reauth_sm state transition 0 ---> 0 for mobile c0:a6:00:2e:38:32 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Finishing FT roaming for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 EAP-PARAM Debug - eap-params for Wlan-Id :12 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Force Auth state *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Skipping EAP-Success to mobile c0:a6:00:2e:38:32 (encryptBit:0) *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Username entry (npc\muthu) already exists in name table, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.763: c0:a6:00:2e:38:32 Username entry (npc\muthu) created in mscb for mobile, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 apfMs1xStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 apfMsPeapSimReqCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 apfMsPeapSimReqSuccessCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 apfMsRunStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Reached PLUMBFASTPATH: from line 6894, null *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 Accounting NAI-Realm: npc\muthu, from Mscb username : npc\muthu *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) NO release MSCB *spamApTask7: Mar 13 11:17:00.764: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *apfOpenDtlSocket: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Recevied management frame AUTH on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Doing preauth for this client over the Air *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Doing local roaming for destination address 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Got 1 AKMs in RSNIE *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 RSNIE AKM matches with PMK cache entry :0x3 *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 pmkRoName derived sucessfully *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Validate FTIE for R0KH-ID, Store SNonce passed *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 FT Auth from flex Client. Update the Anonce from req..00:00...00:00 *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Removing TGr reauth entry for AP 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 Created a new preauth entry for AP:00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.114: c0:a6:00:2e:38:32 FT Auth Resp: Setting adaptive AKM 3 into RSN Data at 19 *apfOpenDtlSocket: Mar 13 11:17:01.117: c0:a6:00:2e:38:32 Recevied management frame REASSOCIATION REQUEST on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Updating 11r vendor IE *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Processing assoc-req station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 ssid : NPC_EXEC thread:a514c40 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -66. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Reassociation received from mobile on BSSID 00:6b:f1:9b:c7:ab AP RT2ndITArea *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -66. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Global 200 Clients are allowed to AP radio *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Max Client Trap Threshold: 0 cur: 8 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 FT Adaptive AKM not negotiated *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 override for default ap group, marking intgrp NULL *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 In processSsidIE:6609 setting Central switched to FALSE *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Set Clinet MSCB as Central Association Disabled *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Applying site-specific Local Bridging override for station c0:a6:00:2e:38:32 - vapId 12, site 'RTBuilding', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Applying Local Bridging Interface Policy for station c0:a6:00:2e:38:32 - vlan 125, interface id 5, interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 override from ap group, removing intf group from mscb *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Applying site-specific override for station c0:a6:00:2e:38:32 - vapId 12, site 'Manufacturing-Floor1', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Applying Interface(wifi_exec) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 125 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Not re-applying interface policy for local switching Client *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 125 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 This apfMsAccessVlan may be changed later from AAA after L2 Auth *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Cleared localSwitchingVlan, may be assigned later based on AAA override *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 STA - rates (7): 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Marking this mobile as TGr capable. *apfMsConnTask_6: Mar 13 11:17:01.118: RSNIE in Assoc. Req.: (38) *apfMsConnTask_6: Mar 13 11:17:01.118: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_6: Mar 13 11:17:01.118: [0016] ac 03 0c 00 01 00 0f fd 80 74 5f 0c c8 10 cd 60 *apfMsConnTask_6: Mar 13 11:17:01.118: [0032] 6c e9 22 b8 e3 97 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Processing RSN IE type 48, length 38 for mobile c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 RSN Capabilities: 12 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Marking Mobile as non-11w Capable *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Validating FT AKM's on WLAN *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Setting adaptive AKM 3 into RSN Data at 19 *apfMsConnTask_6: Mar 13 11:17:01.118: R1KHID+S1KHID: (12) *apfMsConnTask_6: Mar 13 11:17:01.118: [0000] 00 50 56 a3 ea 3c c0 a6 00 2e 38 32 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Roaming succeed for this client. *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Setting active key cache index 0 ---> 8 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 8 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Created PKC PMK Cache entry for station c0:a6:00:2e:38:32 (RSN 2) on BSSID 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Succesfully freed AID 74, slot 0 on AP 00:6b:f1:9b:c7:a0, #client on this slot 7 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Updating AID for REAP AP Client 00:6b:f1:9b:c7:a0 - AID ===> 84 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfMsRunStateDec *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfMs1xStateDec *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 START (0) Initializing policy *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 AuthenticationRequired = 1 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Encryption policy is set to 0x80000004 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfPemAddUser2:session timeout forstation c0:a6:00:2e:38:32 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Sending assoc-resp with status 0 station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 on apVapId 1 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Including FT Mobility Domain IE (length 5) in reassociation assoc Resp to mobile *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Sending Assoc Response (status: '0') to station on AP RT2ndITArea on BSSID 00:6b:f1:9b:c7:a0 ApVapId 1 Slot 0, mobility role 1 *apfMsConnTask_6: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *spamApTask7: Mar 13 11:17:01.118: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *spamApTask7: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Received ADD_MOBILE ack - Initiating 1x to STA c0:a6:00:2e:38:32 (idx 5) *spamApTask7: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Sent dot1x auth initiate message for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 reauth_sm state transition 0 ---> 0 for mobile c0:a6:00:2e:38:32 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Finishing FT roaming for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 EAP-PARAM Debug - eap-params for Wlan-Id :12 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Force Auth state *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Skipping EAP-Success to mobile c0:a6:00:2e:38:32 (encryptBit:0) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Username entry (npc\muthu) already exists in name table, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Username entry (npc\muthu) created in mscb for mobile, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 apfMs1xStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 apfMsPeapSimReqCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 apfMsPeapSimReqSuccessCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 apfMsRunStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Reached PLUMBFASTPATH: from line 6894, null *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Accounting NAI-Realm: npc\muthu, from Mscb username : npc\muthu *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) NO release MSCB *spamApTask7: Mar 13 11:17:01.123: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *apfOpenDtlSocket: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Recevied management frame AUTH on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Doing preauth for this client over the Air *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Doing local roaming for destination address 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Got 1 AKMs in RSNIE *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 RSNIE AKM matches with PMK cache entry :0x3 *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 pmkRoName derived sucessfully *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Validate FTIE for R0KH-ID, Store SNonce passed *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 FT Auth from flex Client. Update the Anonce from req..00:00...00:00 *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Removing TGr reauth entry for AP 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 Created a new preauth entry for AP:00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.472: c0:a6:00:2e:38:32 FT Auth Resp: Setting adaptive AKM 3 into RSN Data at 19 *apfOpenDtlSocket: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Recevied management frame REASSOCIATION REQUEST on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Updating 11r vendor IE *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Processing assoc-req station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 ssid : NPC_EXEC thread:a514c40 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -72. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Reassociation received from mobile on BSSID 00:6b:f1:9b:c7:ab AP RT2ndITArea *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -72. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Global 200 Clients are allowed to AP radio *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Max Client Trap Threshold: 0 cur: 8 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 FT Adaptive AKM not negotiated *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 override for default ap group, marking intgrp NULL *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 In processSsidIE:6609 setting Central switched to FALSE *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Set Clinet MSCB as Central Association Disabled *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Applying site-specific Local Bridging override for station c0:a6:00:2e:38:32 - vapId 12, site 'RTBuilding', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Applying Local Bridging Interface Policy for station c0:a6:00:2e:38:32 - vlan 125, interface id 5, interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 override from ap group, removing intf group from mscb *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Applying site-specific override for station c0:a6:00:2e:38:32 - vapId 12, site 'Manufacturing-Floor1', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Applying Interface(wifi_exec) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 125 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Not re-applying interface policy for local switching Client *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 125 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 This apfMsAccessVlan may be changed later from AAA after L2 Auth *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Cleared localSwitchingVlan, may be assigned later based on AAA override *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 STA - rates (7): 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Marking this mobile as TGr capable. *apfMsConnTask_6: Mar 13 11:17:01.478: RSNIE in Assoc. Req.: (38) *apfMsConnTask_6: Mar 13 11:17:01.478: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_6: Mar 13 11:17:01.478: [0016] ac 03 0c 00 01 00 0f fd 80 74 5f 0c c8 10 cd 60 *apfMsConnTask_6: Mar 13 11:17:01.478: [0032] 6c e9 22 b8 e3 97 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Processing RSN IE type 48, length 38 for mobile c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 RSN Capabilities: 12 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Marking Mobile as non-11w Capable *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Validating FT AKM's on WLAN *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Setting adaptive AKM 3 into RSN Data at 19 *apfMsConnTask_6: Mar 13 11:17:01.478: R1KHID+S1KHID: (12) *apfMsConnTask_6: Mar 13 11:17:01.478: [0000] 00 50 56 a3 ea 3c c0 a6 00 2e 38 32 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Roaming succeed for this client. *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Setting active key cache index 0 ---> 8 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 8 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Created PKC PMK Cache entry for station c0:a6:00:2e:38:32 (RSN 2) on BSSID 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Succesfully freed AID 84, slot 0 on AP 00:6b:f1:9b:c7:a0, #client on this slot 7 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Updating AID for REAP AP Client 00:6b:f1:9b:c7:a0 - AID ===> 44 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfMsRunStateDec *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfMs1xStateDec *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 START (0) Initializing policy *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 AuthenticationRequired = 1 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Encryption policy is set to 0x80000004 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfPemAddUser2:session timeout forstation c0:a6:00:2e:38:32 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Sending assoc-resp with status 0 station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 on apVapId 1 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Including FT Mobility Domain IE (length 5) in reassociation assoc Resp to mobile *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Sending Assoc Response (status: '0') to station on AP RT2ndITArea on BSSID 00:6b:f1:9b:c7:a0 ApVapId 1 Slot 0, mobility role 1 *apfMsConnTask_6: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *spamApTask7: Mar 13 11:17:01.478: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *spamApTask7: Mar 13 11:17:01.480: c0:a6:00:2e:38:32 Received ADD_MOBILE ack - Initiating 1x to STA c0:a6:00:2e:38:32 (idx 7) *spamApTask7: Mar 13 11:17:01.480: c0:a6:00:2e:38:32 Sent dot1x auth initiate message for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.480: c0:a6:00:2e:38:32 reauth_sm state transition 0 ---> 0 for mobile c0:a6:00:2e:38:32 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.480: c0:a6:00:2e:38:32 Finishing FT roaming for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 EAP-PARAM Debug - eap-params for Wlan-Id :12 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Force Auth state *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Skipping EAP-Success to mobile c0:a6:00:2e:38:32 (encryptBit:0) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Username entry (npc\muthu) already exists in name table, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Username entry (npc\muthu) created in mscb for mobile, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 apfMs1xStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 apfMsPeapSimReqCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 apfMsPeapSimReqSuccessCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 apfMsRunStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Reached PLUMBFASTPATH: from line 6894, null *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Accounting NAI-Realm: npc\muthu, from Mscb username : npc\muthu *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) NO release MSCB *spamApTask7: Mar 13 11:17:01.481: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *apfOpenDtlSocket: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Recevied management frame AUTH on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Doing preauth for this client over the Air *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Doing local roaming for destination address 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Got 1 AKMs in RSNIE *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 RSNIE AKM matches with PMK cache entry :0x3 *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 pmkRoName derived sucessfully *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Validate FTIE for R0KH-ID, Store SNonce passed *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 FT Auth from flex Client. Update the Anonce from req..00:00...00:00 *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Removing TGr reauth entry for AP 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 Created a new preauth entry for AP:00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.831: c0:a6:00:2e:38:32 FT Auth Resp: Setting adaptive AKM 3 into RSN Data at 19 *apfOpenDtlSocket: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Recevied management frame REASSOCIATION REQUEST on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Updating 11r vendor IE *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Processing assoc-req station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 ssid : NPC_EXEC thread:a514c40 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -69. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Reassociation received from mobile on BSSID 00:6b:f1:9b:c7:ab AP RT2ndITArea *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -69. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Global 200 Clients are allowed to AP radio *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Max Client Trap Threshold: 0 cur: 8 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 FT Adaptive AKM not negotiated *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 override for default ap group, marking intgrp NULL *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 In processSsidIE:6609 setting Central switched to FALSE *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Set Clinet MSCB as Central Association Disabled *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Applying site-specific Local Bridging override for station c0:a6:00:2e:38:32 - vapId 12, site 'RTBuilding', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Applying Local Bridging Interface Policy for station c0:a6:00:2e:38:32 - vlan 125, interface id 5, interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 override from ap group, removing intf group from mscb *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Applying site-specific override for station c0:a6:00:2e:38:32 - vapId 12, site 'Manufacturing-Floor1', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Applying Interface(wifi_exec) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 125 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Not re-applying interface policy for local switching Client *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 125 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 This apfMsAccessVlan may be changed later from AAA after L2 Auth *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Cleared localSwitchingVlan, may be assigned later based on AAA override *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 STA - rates (7): 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Marking this mobile as TGr capable. *apfMsConnTask_6: Mar 13 11:17:01.834: RSNIE in Assoc. Req.: (38) *apfMsConnTask_6: Mar 13 11:17:01.834: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_6: Mar 13 11:17:01.834: [0016] ac 03 0c 00 01 00 0f fd 80 74 5f 0c c8 10 cd 60 *apfMsConnTask_6: Mar 13 11:17:01.834: [0032] 6c e9 22 b8 e3 97 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Processing RSN IE type 48, length 38 for mobile c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 RSN Capabilities: 12 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Marking Mobile as non-11w Capable *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Validating FT AKM's on WLAN *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Setting adaptive AKM 3 into RSN Data at 19 *apfMsConnTask_6: Mar 13 11:17:01.834: R1KHID+S1KHID: (12) *apfMsConnTask_6: Mar 13 11:17:01.834: [0000] 00 50 56 a3 ea 3c c0 a6 00 2e 38 32 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Roaming succeed for this client. *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Setting active key cache index 0 ---> 8 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 8 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Created PKC PMK Cache entry for station c0:a6:00:2e:38:32 (RSN 2) on BSSID 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Succesfully freed AID 44, slot 0 on AP 00:6b:f1:9b:c7:a0, #client on this slot 7 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Updating AID for REAP AP Client 00:6b:f1:9b:c7:a0 - AID ===> 95 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfMsRunStateDec *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfMs1xStateDec *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 START (0) Initializing policy *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 AuthenticationRequired = 1 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Encryption policy is set to 0x80000004 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfPemAddUser2:session timeout forstation c0:a6:00:2e:38:32 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Sending assoc-resp with status 0 station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 on apVapId 1 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Including FT Mobility Domain IE (length 5) in reassociation assoc Resp to mobile *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 Sending Assoc Response (status: '0') to station on AP RT2ndITArea on BSSID 00:6b:f1:9b:c7:a0 ApVapId 1 Slot 0, mobility role 1 *apfMsConnTask_6: Mar 13 11:17:01.834: c0:a6:00:2e:38:32 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *spamApTask7: Mar 13 11:17:01.835: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *spamApTask7: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Received ADD_MOBILE ack - Initiating 1x to STA c0:a6:00:2e:38:32 (idx 9) *spamApTask7: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Sent dot1x auth initiate message for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 reauth_sm state transition 0 ---> 0 for mobile c0:a6:00:2e:38:32 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Finishing FT roaming for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 EAP-PARAM Debug - eap-params for Wlan-Id :12 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Force Auth state *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Skipping EAP-Success to mobile c0:a6:00:2e:38:32 (encryptBit:0) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Username entry (npc\muthu) already exists in name table, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Username entry (npc\muthu) created in mscb for mobile, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 apfMs1xStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 apfMsPeapSimReqCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 apfMsPeapSimReqSuccessCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 apfMsRunStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Reached PLUMBFASTPATH: from line 6894, null *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 Accounting NAI-Realm: npc\muthu, from Mscb username : npc\muthu *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Mar 13 11:17:01.838: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) NO release MSCB *spamApTask7: Mar 13 11:17:01.839: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *apfOpenDtlSocket: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Recevied management frame AUTH on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Doing preauth for this client over the Air *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Doing local roaming for destination address 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Got 1 AKMs in RSNIE *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 RSNIE AKM matches with PMK cache entry :0x3 *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 pmkRoName derived sucessfully *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Validate FTIE for R0KH-ID, Store SNonce passed *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 FT Auth from flex Client. Update the Anonce from req..00:00...00:00 *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Removing TGr reauth entry for AP 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 Created a new preauth entry for AP:00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:02.189: c0:a6:00:2e:38:32 FT Auth Resp: Setting adaptive AKM 3 into RSN Data at 19 *apfOpenDtlSocket: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Recevied management frame REASSOCIATION REQUEST on BSSID 00:6b:f1:9b:c7:a0 destination addr 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Updating 11r vendor IE *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Processing assoc-req station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 ssid : NPC_EXEC thread:a514c40 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -70. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Reassociation received from mobile on BSSID 00:6b:f1:9b:c7:ab AP RT2ndITArea *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -70. Checking for XOR roam conditions on AP: 00:6B:F1:9B:C7:A0 Slot: 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:9B:C7:A0 which is not XOR roam capable *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Global 200 Clients are allowed to AP radio *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Max Client Trap Threshold: 0 cur: 8 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 FT Adaptive AKM not negotiated *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 override for default ap group, marking intgrp NULL *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 In processSsidIE:6609 setting Central switched to FALSE *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Set Clinet MSCB as Central Association Disabled *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Applying site-specific Local Bridging override for station c0:a6:00:2e:38:32 - vapId 12, site 'RTBuilding', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Applying Local Bridging Interface Policy for station c0:a6:00:2e:38:32 - vlan 125, interface id 5, interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 override from ap group, removing intf group from mscb *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Applying site-specific override for station c0:a6:00:2e:38:32 - vapId 12, site 'Manufacturing-Floor1', interface 'wifi_exec' *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Applying Interface(wifi_exec) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 125 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Not re-applying interface policy for local switching Client *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 125 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 This apfMsAccessVlan may be changed later from AAA after L2 Auth *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Cleared localSwitchingVlan, may be assigned later based on AAA override *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 STA - rates (7): 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Marking this mobile as TGr capable. *apfMsConnTask_6: Mar 13 11:17:02.195: RSNIE in Assoc. Req.: (38) *apfMsConnTask_6: Mar 13 11:17:02.195: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_6: Mar 13 11:17:02.195: [0016] ac 03 0c 00 01 00 0f fd 80 74 5f 0c c8 10 cd 60 *apfMsConnTask_6: Mar 13 11:17:02.195: [0032] 6c e9 22 b8 e3 97 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Processing RSN IE type 48, length 38 for mobile c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 RSN Capabilities: 12 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Marking Mobile as non-11w Capable *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Validating FT AKM's on WLAN *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Setting adaptive AKM 3 into RSN Data at 19 *apfMsConnTask_6: Mar 13 11:17:02.195: R1KHID+S1KHID: (12) *apfMsConnTask_6: Mar 13 11:17:02.195: [0000] 00 50 56 a3 ea 3c c0 a6 00 2e 38 32 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Roaming succeed for this client. *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Setting active key cache index 0 ---> 8 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 8 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Created PKC PMK Cache entry for station c0:a6:00:2e:38:32 (RSN 2) on BSSID 00:6b:f1:9b:c7:a0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Succesfully freed AID 95, slot 0 on AP 00:6b:f1:9b:c7:a0, #client on this slot 7 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Updating AID for REAP AP Client 00:6b:f1:9b:c7:a0 - AID ===> 174 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfMsRunStateDec *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfMs1xStateDec *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 START (0) Initializing policy *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 AuthenticationRequired = 1 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Encryption policy is set to 0x80000004 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfPemAddUser2:session timeout forstation c0:a6:00:2e:38:32 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Sending assoc-resp with status 0 station:c0:a6:00:2e:38:32 AP:00:6b:f1:9b:c7:a0-00 on apVapId 1 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Including FT Mobility Domain IE (length 5) in reassociation assoc Resp to mobile *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 Sending Assoc Response (status: '0') to station on AP RT2ndITArea on BSSID 00:6b:f1:9b:c7:a0 ApVapId 1 Slot 0, mobility role 1 *apfMsConnTask_6: Mar 13 11:17:02.195: c0:a6:00:2e:38:32 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:9b:c7:a0 from Associated to Associated *spamApTask7: Mar 13 11:17:02.196: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *spamApTask7: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Received ADD_MOBILE ack - Initiating 1x to STA c0:a6:00:2e:38:32 (idx 11) *spamApTask7: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Sent dot1x auth initiate message for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 reauth_sm state transition 0 ---> 0 for mobile c0:a6:00:2e:38:32 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Finishing FT roaming for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 EAP-PARAM Debug - eap-params for Wlan-Id :12 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Force Auth state *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Skipping EAP-Success to mobile c0:a6:00:2e:38:32 (encryptBit:0) *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Username entry (npc\muthu) already exists in name table, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Username entry (npc\muthu) created in mscb for mobile, length = 253 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 apfMs1xStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 apfMsPeapSimReqCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 apfMsPeapSimReqSuccessCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:6b:f1:9b:c7:a0 vapId 12 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 apfMsRunStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Reached PLUMBFASTPATH: from line 6894, null *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 Accounting NAI-Realm: npc\muthu, from Mscb username : npc\muthu *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Mar 13 11:17:02.198: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) NO release MSCB *spamApTask7: Mar 13 11:17:02.199: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:9b:c7:a0 *apfOpenDtlSocket: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Recevied management frame ASSOCIATION REQUEST on BSSID 00:6b:f1:8b:31:20 destination addr 00:6b:f1:8b:31:20 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Updating 11r vendor IE *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Processing assoc-req station:c0:a6:00:2e:38:32 AP:00:6b:f1:8b:31:20-00 ssid : NPC_EXEC thread:a512600 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -55. Checking for XOR roam conditions on AP: 00:6B:F1:8B:31:20 Slot: 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:8B:31:20 which is not XOR roam capable *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Association received from mobile on BSSID 00:6b:f1:8b:31:2b AP RT2ndHankArea *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 trying to join WLAN with RSSI -55. Checking for XOR roam conditions on AP: 00:6B:F1:8B:31:20 Slot: 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 is associating to AP 00:6B:F1:8B:31:20 which is not XOR roam capable *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Max Client Trap Threshold: 0 cur: 5 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 FT Adaptive AKM not negotiated *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 In processSsidIE:6609 setting Central switched to FALSE *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Set Clinet MSCB as Central Association Disabled *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Applying site-specific Local Bridging override for station c0:a6:00:2e:38:32 - vapId 12, site 'RTBuilding', interface 'wifi_exec' *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Applying Local Bridging Interface Policy for station c0:a6:00:2e:38:32 - vlan 125, interface id 5, interface 'wifi_exec' *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 override from ap group, removing intf group from mscb *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Applying site-specific override for station c0:a6:00:2e:38:32 - vapId 12, site 'Manufacturing-Floor1', interface 'wifi_exec' *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Applying Interface(wifi_exec) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 125 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Not re-applying interface policy for local switching Client *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922) *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942) *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963) *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 125 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 This apfMsAccessVlan may be changed later from AAA after L2 Auth *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Cleared localSwitchingVlan, may be assigned later based on AAA override *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 STA - rates (7): 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Marking this mobile as TGr capable. *apfMsConnTask_0: Mar 13 11:18:10.784: RSNIE in Assoc. Req.: (20) *apfMsConnTask_0: Mar 13 11:18:10.784: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Mar 13 11:18:10.784: [0016] ac 03 0c 00 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Processing RSN IE type 48, length 20 for mobile c0:a6:00:2e:38:32 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 RSN Capabilities: 12 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Marking Mobile as non-11w Capable *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Validating FT AKM's on WLAN *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Setting adaptive AKM 3 into RSN Data at 19 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Deleted mobile LWAPP rule on AP [00:6b:f1:9b:c7:a0] *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Succesfully freed AID 174, slot 0 on AP 00:6b:f1:9b:c7:a0, #client on this slot 7 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 New ctxOwnerMwarIp: 10.80.115.15 New ctxOwnerApMac: 00:6B:F1:8B:31:20 New ctxOwnerApEthMac: 00:2A:10:88:06:68 New ctxOwnerApSlotId: 0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Updated location for station old AP 00:6b:f1:9b:c7:a0 oldSlot 0, new AP 00:6b:f1:8b:31:20 newSlot 0, AID 0 MsType 0 MobilityRole 1 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Updating AID for REAP AP Client 00:6b:f1:8b:31:20 - AID ===> 92 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 apfMsRunStateDec *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 apfMs1xStateDec *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 START (0) Initializing policy *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 AuthenticationRequired = 1 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:8b:31:20 vapId 12 apVapId 1 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *apfMsConnTask_0: Mar 13 11:18:10.784: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:6b:f1:8b:31:20 vapId 12 apVapId 1 flex-acl-name: *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:8b:31:20 from Associated to Associated *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 apfPemAddUser2:session timeout forstation c0:a6:00:2e:38:32 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Sending assoc-resp with status 0 station:c0:a6:00:2e:38:32 AP:00:6b:f1:8b:31:20-00 on apVapId 1 *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Sending R1KH-ID as 00:50:56:a3:ea:3c *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Sending R0KH-ID as:10.80.115.15 *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Sending Assoc Response (status: '0') to station on AP RT2ndHankArea on BSSID 00:6b:f1:8b:31:20 ApVapId 1 Slot 0, mobility role 1 *apfMsConnTask_0: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile c0:a6:00:2e:38:32 on AP 00:6b:f1:8b:31:20 from Associated to Associated *spamApTask7: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Delete Mobile request on slot 0 sent to the AP 00:6b:f1:9b:c7:a0 IP: 10.80.115.178:5248 *spamApTask5: Mar 13 11:18:10.785: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:8b:31:20 *spamApTask7: Mar 13 11:18:10.786: c0:a6:00:2e:38:32 apfUpdateDeleteAckInMscb (apf_api.c:51702) Expiring Mobile! *apfOpenDtlSocket: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Recevied management frame ACTION on BSSID 00:6b:f1:8b:31:20 destination addr 00:6b:f1:8b:31:20 *spamApTask5: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Received ADD_MOBILE ack - Initiating 1x to STA c0:a6:00:2e:38:32 (idx 55) *spamApTask5: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Sent dot1x auth initiate message for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 reauth_sm state transition 0 ---> 0 for mobile c0:a6:00:2e:38:32 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 EAP-PARAM Debug - eap-params for Wlan-Id :12 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Connecting state *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Sending EAP-Request/Identity to mobile c0:a6:00:2e:38:32 (EAP Id 1) *apfMsConnTask_0: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Got action frame from the client (ActionCategory:5) *apfMsConnTask_0: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 sent 802.11K neighbor request to AP 00:6B:F1:8B:31:20 *apfMsConnTask_0: Mar 13 11:18:10.787: c0:a6:00:2e:38:32 Station: C0:A6:00:2E:38:32 requested neighbors on non XOR roam capable AP 00:6B:F1:8B:31:20 Slot 0 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.798: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.798: c0:a6:00:2e:38:32 Received Identity Response (count=1) from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.798: c0:a6:00:2e:38:32 Resetting reauth count 1 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.798: c0:a6:00:2e:38:32 EAP State update from Connecting to Authenticating for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.798: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Authenticating state *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.798: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.808: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.808: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=2) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.808: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 2) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.808: c0:a6:00:2e:38:32 Allocating EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.857: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.857: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 2, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.857: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.857: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.866: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.866: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=3) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.866: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 3) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.866: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.874: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.874: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 3, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.874: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.874: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.879: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.879: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=4) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.879: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 4) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.879: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.901: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.901: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 4, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.901: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.901: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.910: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.910: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=5) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.910: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 5) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.910: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.915: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.915: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 5, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.915: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.916: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.920: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.920: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=6) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.920: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 6) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.920: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.925: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.925: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 6, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.925: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.925: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.929: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.929: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=7) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.929: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 7) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.929: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.933: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.933: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 7, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.933: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.933: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.938: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.938: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=8) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.938: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 8) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.938: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.942: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.942: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 8, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.942: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.942: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.949: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.949: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=9) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.949: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 9) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.949: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.953: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.953: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 9, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.953: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.953: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.958: c0:a6:00:2e:38:32 Processing Access-Challenge for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.958: c0:a6:00:2e:38:32 Entering Backend Auth Req state (id=11) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.958: c0:a6:00:2e:38:32 WARNING: updated EAP-Identifier 9 ===> 11 for STA c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.958: c0:a6:00:2e:38:32 Sending EAP Request from AAA to mobile c0:a6:00:2e:38:32 (EAP Id 11) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.958: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.962: c0:a6:00:2e:38:32 Received EAPOL EAPPKT from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.962: c0:a6:00:2e:38:32 Received EAP Response from mobile c0:a6:00:2e:38:32 (EAP Id 11, EAP Type 25) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.962: c0:a6:00:2e:38:32 Resetting reauth count 0 to 0 for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.962: c0:a6:00:2e:38:32 Entering Backend Auth Response state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Processing Access-Accept for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Resetting web IPv4 acl from 255 to 255 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Resetting web IPv4 Flex acl from 65535 to 65535 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Received MPPE_SEND_KEY: KeyLen: 32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Received MPPE_RECV_KEY: KeyLen: 32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Setting re-auth timeout to 0 seconds, got from WLAN config. *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Station c0:a6:00:2e:38:32 setting dot1x reauth timeout = 0 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Stopping reauth timeout for c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Creating a PKC PMKID Cache entry for station c0:a6:00:2e:38:32 (RSN 2) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Resetting MSCB PMK Cache Entry @index 0 for station c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Setting active key cache index 0 ---> 8 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Setting active key cache index 8 ---> 0 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Created PMKID PMK Cache for BSSID 00:6b:f1:8b:31:20 at index 0 for station c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: New PMKID: (16) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: [0000] 07 45 b9 95 68 f3 21 46 bb e8 fd b4 e2 cf 01 b3 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Using PMK of length 32 as TGr MSK (in 802.1X case) AKM:3 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Skipping cache delete as AP will get cache update. *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Created PMK Cache Entry for TGr AKM:802.1x c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 R0KH-ID:10.80.115.15 R1KH-ID:00:50:56:a3:ea:3c MSK Len:48 pmkValidTime:86384 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Updated existing pmk cache for client having username: npc\muthu and audit-session-id:0f73500a0000b8f90a1b895c *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 1x: Updated the audit-session-id to PMK-Cache from client mscb: 0f73500a0000b8f90a1b895c *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 unsetting PmkIdValidatedByAp *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Zeroize AAA Overrides from local for station *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Adding Audit session ID payload in Mobility handoff *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 0 PMK-update groupcast messages sent *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 PMK sent to mobility group *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Disabling re-auth since PMK lifetime can take care of same. *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Sending EAP-Success to mobile c0:a6:00:2e:38:32 (EAP Id 11) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Freeing AAACB from Dot1xCB as AAA auth is done for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 key Desc Version FT - 1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Found an cache entry for BSSID 00:6b:f1:8b:31:20 in PMKID cache at index 0 of station c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Found an cache entry for BSSID 00:6b:f1:8b:31:20 in PMKID cache at index 0 of station c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: Including PMKID in M1 (16) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: [0000] 07 45 b9 95 68 f3 21 46 bb e8 fd b4 e2 cf 01 b3 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: M1 - Key Data: (22) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: [0000] dd 14 00 0f ac 04 07 45 b9 95 68 f3 21 46 bb e8 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: [0016] fd b4 e2 cf 01 b3 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Starting key exchange to mobile c0:a6:00:2e:38:32, data packets will be dropped *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Sending EAPOL-Key Message to mobile c0:a6:00:2e:38:32 state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Entering Backend Auth Success state (id=11) for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 Received Auth Success while in Authenticating state for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.966: c0:a6:00:2e:38:32 dot1x - moving mobile c0:a6:00:2e:38:32 into Authenticated state *dot1xSocketTask: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 validating eapol pkt: key version = 3 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Received EAPOL-Key from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 key Desc Version FT - 1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Received EAPOL-key in PTK_START state (message 2) from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Encryption Policy: 4, PTK Key Length: 48 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: R1KHID+S1KHID: (12) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: [0000] 00 50 56 a3 ea 3c c0 a6 00 2e 38 32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Successfully computed PTK from PMK!!! *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Received valid MIC in EAPOL Key Message M2!!!!! *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Compare RSN IE in association and EAPOL-M2 frame(Skip pmkIdLen:16,and grpMgmtCipherLen:0) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Dumping RSNIE received in Association request: *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0............... *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: 00000010: 00 0f ac 03 0c 00 ...... *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Dumping RSNIE received in EAPOL M2 : *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: 00000010: ac 03 0c 00 01 00 99 e7 02 b2 2b db 2c 91 a3 b1 ..........+.,... *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: 00000020: b9 d6 10 0c 44 09 ....D. *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 11r-FT: Validate MDIE info in M2 message from mobile *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Calculating PMKR0Name *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Encrypt EAPOL packets = FALSE *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Validate the 11r FTIE element received in the M2 against the assoc respnse FTIE *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Received FTIE matches with what is being sent in Assoc Response frame *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Successfully validated the FTIE in M2 with IE sent in association response *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 DOT11R: Sending cache add *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Stopping retransmission timer for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 key Desc Version FT - 1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 key Desc Version FT - 1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Sending EAPOL-Key Message to mobile c0:a6:00:2e:38:32 state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.968: c0:a6:00:2e:38:32 Reusing allocated memory for EAP Pkt for retransmission to mobile c0:a6:00:2e:38:32 *dot1xSocketTask: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 validating eapol pkt: key version = 3 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Received EAPOL-Key from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 key Desc Version FT - 1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Stopping retransmission timer for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Freeing EAP Retransmit Bufer for mobile c0:a6:00:2e:38:32 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 apfMs1xStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 apfMsPeapSimReqCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 apfMsPeapSimReqSuccessCntInc *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 10.80.125.20 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Client already has IP 10.80.125.20, DHCP Not required on AP 00:6b:f1:8b:31:20 vapId 12 apVapId 1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535 *spamApTask5: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Successful transmission of LWAPP Add-Mobile to AP 00:6b:f1:8b:31:20 *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:6b:f1:8b:31:20 vapId 12 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 apfMsRunStateInc *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 10.80.125.20 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) Reached PLUMBFASTPATH: from line 6894, null *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.971: c0:a6:00:2e:38:32 Accounting NAI-Realm: npc\muthu, from Mscb username : npc\muthu *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.972: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.972: c0:a6:00:2e:38:32 10.80.125.20 RUN (20) NO release MSCB *Dot1x_NW_MsgTask_2: Mar 13 11:18:10.972: c0:a6:00:2e:38:32 Successfully Plumbed PTK session Keysfor mobile c0:a6:00:2e:38:32