<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I took it upon myself to in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691971#M175047</link>
    <description>&lt;P&gt;I took it upon myself to change the AP mode from local to flexconnect.&amp;nbsp; All of the cameras are now working.&amp;nbsp; No more seeing two MAC addresses for each of the cameras.&lt;/P&gt;&lt;P&gt;This change seems to have caused an issue for Apple devices.&amp;nbsp; Apple devices no longer roam.&amp;nbsp; They remain connected to the AP originating the wireless communication, even if there is a better signal from another AP with the same SSID and WLAN.&amp;nbsp;&amp;nbsp; And when an Apple device now goes to sleep I must go to the setting menu to view the wireless settings before it will reestablish.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jun 2015 21:16:51 GMT</pubDate>
    <dc:creator>rm760</dc:creator>
    <dc:date>2015-06-24T21:16:51Z</dc:date>
    <item>
      <title>Statically addressed devices cannot achive RUN state</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691946#M175020</link>
      <description>&lt;P&gt;I have just converted my home from (3) 3600 series autonomous APs to LWAPs with 802.11AC radios to take advantage of the 802.11AC radio spectrum.&lt;/P&gt;&lt;P&gt;I am using a WLC 2504 running version 8.1.102.0 software.&amp;nbsp;&amp;nbsp; All is working great except for my security cameras.&amp;nbsp; They require a static IP address to communicate with the DVR.&amp;nbsp;&amp;nbsp; They are older and use WEP encryption (hex 128 bit).&amp;nbsp;&amp;nbsp; They cannot achieve the RUN state as the controller wants the IP address before allowing connection to the network.&amp;nbsp; DHCP is not set to required for the WLAN or Interface.&amp;nbsp; Here is the error I receive.&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 20 11:57:33.067: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:14:b7 0.0.0.0 DHCP_REQD (7) Rejecting association attempt by ad-hoc client&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have even attempted to break down the communication to its most basic form (wide open), and still the same result.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts and suggestions would be greatly appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attached is a copy of my configuration&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 10:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691946#M175020</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2021-07-05T10:26:28Z</dc:date>
    </item>
    <item>
      <title>On the monitor page I can see</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691947#M175021</link>
      <description>&lt;P&gt;On the monitor page I can see the MAC address and the static IP but still no RUN state&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jun 2015 19:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691947#M175021</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-20T19:19:41Z</dc:date>
    </item>
    <item>
      <title>Are those clients trying to</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691948#M175022</link>
      <description>&lt;P&gt;Are those clients trying to connect to WLAN ID 1? If that is the case the problem is that "DHCP Addr. Assignment" is actually enabled. Please go to the advanced tab of the WLAN and untick the "Required" checkbox. If the problem still occurs, please share the output of an "debug client MACADR".&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Please rate useful posts &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jun 2015 21:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691948#M175022</guid>
      <dc:creator>Freerk Terpstra</dc:creator>
      <dc:date>2015-06-20T21:06:05Z</dc:date>
    </item>
    <item>
      <title>They are connecting to WLAN</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691949#M175023</link>
      <description>&lt;P&gt;They are connecting to WLAN ID 5 which is set to not require DHCP.&amp;nbsp; These cameras connected to the same access points just fine when the access points were in autonomous mode..&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jun 2015 22:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691949#M175023</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-20T22:41:00Z</dc:date>
    </item>
    <item>
      <title>It can be because the device</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691950#M175024</link>
      <description>&lt;P&gt;It can be because the device that has a static address isn't responding to ip information request. This means that you need to enable passive clients. Here is instructions that will walk you through what is needed to support these devices.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_01100011.html&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jun 2015 23:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691950#M175024</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2015-06-20T23:25:29Z</dc:date>
    </item>
    <item>
      <title>ScottI did try enabling the</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691951#M175025</link>
      <description>&lt;P&gt;Scott&lt;/P&gt;&lt;P&gt;I did try enabling the passive client option.&amp;nbsp; No joy.&amp;nbsp; Two of the cameras did respond briefly.&amp;nbsp; I had to send consistent pings to each to keep the session alive. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jun 2015 00:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691951#M175025</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-21T00:29:53Z</dc:date>
    </item>
    <item>
      <title>The best workaround is to use</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691952#M175026</link>
      <description>&lt;P&gt;The best workaround is to use DHCP reservations so the cameras always get the same IP address. There really isn't another workaround especially if you followed the doc step by step. &amp;nbsp;Maybe configure a static arp entry on the L3 device for he cameras.&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jun 2015 00:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691952#M175026</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2015-06-21T00:42:17Z</dc:date>
    </item>
    <item>
      <title>can you please share :show</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691953#M175027</link>
      <description>&lt;P&gt;can you please share :&lt;/P&gt;&lt;P&gt;show wlan 5&lt;/P&gt;&lt;P&gt;show client details &amp;lt;client MAC&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug client &amp;lt;cleint MAC&amp;gt; while the camera is trying to connect to the WLAN .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jun 2015 01:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691953#M175027</guid>
      <dc:creator>ali aqrabawi</dc:creator>
      <dc:date>2015-06-21T01:30:24Z</dc:date>
    </item>
    <item>
      <title>Here is the output of Show</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691954#M175028</link>
      <description>&lt;P&gt;Here is the output of Show WLAN 5&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;show wlan 5&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;WLAN Identifier.................................. 5&lt;BR /&gt;Profile Name..................................... Cameras&lt;BR /&gt;Network Name (SSID).............................. HOUNDS&lt;BR /&gt;Status........................................... Enabled&lt;BR /&gt;MAC Filtering.................................... Disabled&lt;BR /&gt;Broadcast SSID................................... Disabled&lt;BR /&gt;AAA Policy Override.............................. Disabled&lt;BR /&gt;Network Admission Control&lt;BR /&gt;Client Profiling Status&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Radius Profiling ............................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DHCP ....................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HTTP ....................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local Profiling ............................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DHCP ....................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; HTTP ....................................... Disabled&lt;BR /&gt;&amp;nbsp; Radius-NAC State............................... Disabled&lt;BR /&gt;&amp;nbsp; SNMP-NAC State................................. Disabled&lt;BR /&gt;&amp;nbsp; Quarantine VLAN................................ 0&lt;BR /&gt;Maximum number of Associated Clients............. 0&lt;BR /&gt;Maximum number of Clients per AP Radio........... 200&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;Number of Active Clients......................... 15&lt;BR /&gt;Exclusionlist.................................... Disabled&lt;BR /&gt;Session Timeout.................................. 86400 seconds&lt;BR /&gt;User Idle Timeout................................ Disabled&lt;BR /&gt;Sleep Client..................................... disable&lt;BR /&gt;Sleep Client Timeout............................. 720 minutes&lt;BR /&gt;User Idle Threshold.............................. 0 Bytes&lt;BR /&gt;NAS-identifier................................... wlc.consulteron.local&lt;BR /&gt;CHD per WLAN..................................... Disabled&lt;BR /&gt;Webauth DHCP exclusion........................... Disabled&lt;BR /&gt;Interface........................................ wlan 192&lt;BR /&gt;Multicast Interface.............................. Not Configured&lt;BR /&gt;WLAN IPv4 ACL.................................... unconfigured&lt;BR /&gt;WLAN IPv6 ACL.................................... unconfigured&lt;BR /&gt;WLAN Layer2 ACL.................................. unconfigured&lt;BR /&gt;mDNS Status...................................... Disabled&lt;BR /&gt;mDNS Profile Name................................ unconfigured&lt;BR /&gt;DHCP Server...................................... Default&lt;BR /&gt;DHCP Address Assignment Required................. Disabled&lt;BR /&gt;Static IP client tunneling....................... Disabled&lt;BR /&gt;Tunnel Profile................................... Unconfigured&lt;BR /&gt;Quality of Service............................... Silver&lt;BR /&gt;Per-SSID Rate Limits............................. Upstream&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Downstream&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;Average Data Rate................................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Average Realtime Data Rate.......................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Burst Data Rate..................................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Burst Realtime Data Rate.........................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Per-Client Rate Limits........................... Upstream&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Downstream&lt;BR /&gt;Average Data Rate................................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Average Realtime Data Rate.......................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Burst Data Rate..................................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Burst Realtime Data Rate.........................&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;Scan Defer Priority..............................&lt;BR /&gt;Scan Defer Time.................................. 100 milliseconds&lt;BR /&gt;WMM.............................................. Disabled&lt;BR /&gt;WMM UAPSD Compliant Client Support............... Disabled&lt;BR /&gt;Media Stream Multicast-direct.................... Disabled&lt;BR /&gt;CCX - AironetIe Support.......................... Disabled&lt;BR /&gt;CCX - Gratuitous ProbeResponse (GPR)............. Disabled&lt;BR /&gt;CCX - Diagnostics Channel Capability............. Disabled&lt;BR /&gt;Dot11-Phone Mode (7920).......................... Disabled&lt;BR /&gt;Wired Protocol................................... None&lt;BR /&gt;Passive Client Feature........................... Enabled&lt;BR /&gt;Peer-to-Peer Blocking Action..................... Disabled&lt;BR /&gt;Radio Policy..................................... 802.11g only&lt;BR /&gt;DTIM period for 802.11a radio.................... 1&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;DTIM period for 802.11b radio.................... 1&lt;BR /&gt;Radius Servers&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Authentication................................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Accounting.................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Dynamic Interface............................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Dynamic Interface Priority.................... wlan&lt;BR /&gt;Local EAP Authentication......................... Disabled&lt;BR /&gt;Radius NAI-Realm................................. Disabled&lt;BR /&gt;Security&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 802.11 Authentication:........................ Open System&lt;BR /&gt;&amp;nbsp;&amp;nbsp; FT Support.................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Static WEP Keys............................... Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Key Index:...................................... 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption:..................................... 104-bit WEP&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 802.1X........................................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Wi-Fi Protected Access (WPA/WPA2)............. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; WAPI.......................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Wi-Fi Direct policy configured................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; EAP-Passthrough............................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; CKIP ......................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Web Based Authentication...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Web Authentication Timeout.................... 300&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Web-Passthrough............................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Mac-auth-server............................... 0.0.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Web-portal-server............................. 0.0.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Conditional Web Redirect...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Splash-Page Web Redirect...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Auto Anchor................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; FlexConnect Local Switching................... Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; FlexConnect Central Association............... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; flexconnect Central Dhcp Flag................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; flexconnect nat-pat Flag...................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; flexconnect Dns Override Flag................. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; flexconnect PPPoE pass-through................ Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; flexconnect local-switching IP-source-guar.... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; FlexConnect Vlan based Central Switching ..... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; FlexConnect Local Authentication.............. Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; FlexConnect Learn IP Address.................. Enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client MFP.................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; PMF........................................... Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; PMF Association Comeback Time................. 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; PMF SA Query RetryTimeout..................... 200&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Tkip MIC Countermeasure Hold-down Timer....... 60&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Eap-params.................................... Not Applicable&lt;BR /&gt;AVC Visibilty.................................... Disabled&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;AVC Profile Name................................. None&lt;BR /&gt;Flow Monitor Name................................ None&lt;BR /&gt;Split Tunnel Configuration&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Split Tunnel................................. Disabled&lt;BR /&gt;Call Snooping.................................... Disabled&lt;BR /&gt;Roamed Call Re-Anchor Policy..................... Disabled&lt;BR /&gt;SIP CAC Fail Send-486-Busy Policy................ Enabled&lt;BR /&gt;SIP CAC Fail Send Dis-Association Policy......... Disabled&lt;BR /&gt;KTS based CAC Policy............................. Disabled&lt;BR /&gt;Assisted Roaming Prediction Optimization......... Disabled&lt;BR /&gt;802.11k Neighbor List............................ Disabled&lt;BR /&gt;802.11k Neighbor List Dual Band.................. Disabled&lt;BR /&gt;802.11v Directed Multicast Service............... Disabled&lt;BR /&gt;802.11v BSS Max Idle Service..................... Enabled&lt;BR /&gt;802.11v BSS Transition Service................... Disabled&lt;BR /&gt;802.11v BSS Transition Disassoc Imminent......... Disabled&lt;BR /&gt;802.11v BSS Transition Disassoc Timer............ 200&lt;BR /&gt;802.11v BSS Transition OpRoam Disassoc Timer..... 40&lt;BR /&gt;DMS DB is empty&lt;BR /&gt;Band Select...................................... Disabled&lt;BR /&gt;Load Balancing................................... Disabled&lt;BR /&gt;Multicast Buffer................................. Disabled&lt;BR /&gt;Universal Ap Admin............................... Disabled&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;/P&gt;&lt;P&gt;&amp;nbsp;Mobility Anchor List&lt;BR /&gt;&amp;nbsp;WLAN ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Priority&lt;BR /&gt;&amp;nbsp;-------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---------------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ------&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --------&lt;/P&gt;&lt;P&gt;802.11u........................................ Disabled&lt;/P&gt;&lt;P&gt;MSAP Services.................................. Disabled&lt;/P&gt;&lt;P&gt;Local Policy&lt;BR /&gt;----------------&lt;BR /&gt;Priority&amp;nbsp; Policy Name&lt;BR /&gt;--------&amp;nbsp; ---------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691954#M175028</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T21:15:47Z</dc:date>
    </item>
    <item>
      <title>Here is the output for show</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691955#M175029</link>
      <description>&lt;P&gt;Here is the output for show client details for AMC add 00:80:f0:58:14:b6&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;show client detail 00:80:f0:58:14:b6&lt;BR /&gt;Client MAC Address............................... 00:80:f0:58:14:b6&lt;BR /&gt;Client Username ................................. N/A&lt;BR /&gt;AP MAC Address................................... 34:a8:4e:81:2a:50&lt;BR /&gt;AP Name.......................................... Attic_AP&lt;BR /&gt;AP radio slot Id................................. 0&lt;BR /&gt;Client State..................................... Associated&lt;BR /&gt;Client User Group................................&lt;BR /&gt;Client NAC OOB State............................. Access&lt;BR /&gt;Wireless LAN Id.................................. 5&lt;BR /&gt;Wireless LAN Network Name (SSID)................. HOUNDS&lt;BR /&gt;Wireless LAN Profile Name........................ Cameras&lt;BR /&gt;Hotspot (802.11u)................................ Not Supported&lt;BR /&gt;BSSID............................................ 34:a8:4e:81:2a:54&lt;BR /&gt;Connected For ................................... 11 secs&lt;BR /&gt;Channel.......................................... 11&lt;BR /&gt;IP Address....................................... 192.168.128.10&lt;BR /&gt;Gateway Address.................................. Unknown&lt;BR /&gt;Netmask.......................................... Unknown&lt;BR /&gt;Association Id................................... 23&lt;BR /&gt;Authentication Algorithm......................... Open System&lt;BR /&gt;Reason Code...................................... 1&lt;BR /&gt;Status Code...................................... 0&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;Session Timeout.................................. 0&lt;BR /&gt;Client CCX version............................... No CCX support&lt;BR /&gt;QoS Level........................................ Silver&lt;BR /&gt;Avg data Rate.................................... 0&lt;BR /&gt;Burst data Rate.................................. 0&lt;BR /&gt;Avg Real time data Rate.......................... 0&lt;BR /&gt;Burst Real Time data Rate........................ 0&lt;BR /&gt;802.1P Priority Tag.............................. disabled&lt;BR /&gt;CTS Security Group Tag........................... Not Applicable&lt;BR /&gt;KTS CAC Capability............................... No&lt;BR /&gt;WMM Support...................................... Disabled&lt;BR /&gt;Supported Rates.................................. 12.0,18.0,24.0,36.0,48.0,&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ............................................. 54.0&lt;BR /&gt;Mobility State................................... Local&lt;BR /&gt;Mobility Move Count.............................. 0&lt;BR /&gt;Security Policy Completed........................ Yes&lt;BR /&gt;Policy Manager State............................. RUN&lt;BR /&gt;Audit Session ID................................. ac100402000017ef55887be7&lt;BR /&gt;AAA Role Type.................................... none&lt;BR /&gt;Local Policy Applied............................. none&lt;BR /&gt;IPv4 ACL Name.................................... none&lt;BR /&gt;FlexConnect ACL Applied Status................... Unavailable&lt;BR /&gt;IPv4 ACL Applied Status.......................... Unavailable&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;IPv6 ACL Name.................................... none&lt;BR /&gt;IPv6 ACL Applied Status.......................... Unavailable&lt;BR /&gt;Layer2 ACL Name.................................. none&lt;BR /&gt;Layer2 ACL Applied Status........................ Unavailable&lt;BR /&gt;Client Type...................................... Simple IP&lt;BR /&gt;mDNS Status...................................... Disabled&lt;BR /&gt;mDNS Profile Name................................ none&lt;BR /&gt;No. of mDNS Services Advertised.................. 0&lt;BR /&gt;Policy Type...................................... Static WEP&lt;BR /&gt;Encryption Cipher................................ WEP (104 bits)&lt;BR /&gt;Protected Management Frame ...................... No&lt;BR /&gt;Management Frame Protection...................... No&lt;BR /&gt;EAP Type......................................... Unknown&lt;BR /&gt;Interface........................................ wlan 192&lt;BR /&gt;VLAN............................................. 192&lt;BR /&gt;Quarantine VLAN.................................. 0&lt;BR /&gt;Access VLAN...................................... 192&lt;BR /&gt;Local Bridging VLAN.............................. 192&lt;BR /&gt;Client Capabilities:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CF Pollable................................ Not implemented&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CF Poll Request............................ Not implemented&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Short Preamble............................. Implemented&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PBCC....................................... Not implemented&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Channel Agility............................ Not implemented&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Listen Interval............................ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fast BSS Transition........................ Not implemented&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11v BSS Transition......................... Not implemented&lt;BR /&gt;Client Wifi Direct Capabilities:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; WFD capable................................ No&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Manged WFD capable......................... No&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cross Connection Capable................... No&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Support Concurrent Operation............... No&lt;BR /&gt;Fast BSS Transition Details:&lt;BR /&gt;Client Statistics:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Bytes Received................... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Bytes Sent....................... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Number of Bytes Sent................. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Total Number of Bytes Recv................. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Bytes Sent (last 90s)............ 40176&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Bytes Recv (last 90s)............ 1350181&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Packets Received................. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Packets Sent..................... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Interim-Update Sent.............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of EAP Id Request Msg Timeouts...... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of EAP Id Request Msg Failures...... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of EAP Request Msg Timeouts......... 0&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of EAP Request Msg Failures......... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of EAP Key Msg Timeouts............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of EAP Key Msg Failures............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Retries..................... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of RTS Retries...................... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Duplicate Received Packets....... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Decrypt Failed Packets........... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Mic Failured Packets............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Mic Missing Packets.............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of RA Packets Dropped............... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Policy Errors.................... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Radio Signal Strength Indicator............ Unavailable&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Signal to Noise Ratio...................... Unavailable&lt;BR /&gt;Client Rate Limiting Statistics:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Packets Received............ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Rx Packets Dropped.......... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Bytes Received.............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Rx Bytes Dropped............ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Packets Received........ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Rx Packets Dropped...... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Bytes Received.......... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Rx Bytes Dropped........ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Packets Sent................ 0&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Tx Packets Dropped.......... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Bytes Sent.................. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Data Tx Bytes Dropped............ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Packets Sent............ 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Tx Packets Dropped...... 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Bytes Sent.............. 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Number of Realtime Tx Bytes Dropped........ 0&lt;BR /&gt;Nearby AP Statistics:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Attic_AP(slot 0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; antenna0: 5 secs ago..................... -63 dBm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; antenna1: 5 secs ago..................... -56 dBm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Closet_AP(slot 0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; antenna0: 48 secs ago.................... -58 dBm&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; antenna1: 48 secs ago.................... -58 dBm&lt;BR /&gt;DNS Server details:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DNS server IP ............................. 0.0.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DNS server IP ............................. 0.0.0.0&lt;BR /&gt;Assisted Roaming Prediction List details:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;Client Dhcp Required:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; False&lt;BR /&gt;Allowed (URL)IP Addresses&lt;BR /&gt;-------------------------&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;/P&gt;&lt;P&gt;AVC Profile Name: ............................... none&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:21:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691955#M175029</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T21:21:16Z</dc:date>
    </item>
    <item>
      <title>Here is the output from debug</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691956#M175030</link>
      <description>&lt;P&gt;Here is the output from debug client&lt;/P&gt;&lt;P&gt;(Cisco Controller) debug&amp;gt; client 00:80:f0:58:14:b6&lt;/P&gt;&lt;P&gt;(Cisco Controller) debug&amp;gt;*pemReceiveTask: Jun 20 17:22:23.675: 00:80:f0:58:20:6d 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Processing assoc-req station:00:80:f0:58:14:b6 AP:c4:14:3c:28:2f:60-00 thread:158c8930&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Association received from mobile on BSSID c4:14:3c:28:2f:64 AP Closet_AP&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Global 200 Clients are allowed to AP radio&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Max Client Trap Threshold: 0&amp;nbsp; cur: 8&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Rf profile 600 Clients are allowed to AP wlan&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 override for default ap group, marking intgrp NULL&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vlan 192&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Re-applying interface policy for client&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) -&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -- (caller apf_policy.c:2639)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) -&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -- (caller apf_policy.c:2660)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Setting the NAS Id to WLAN specific Id 'wlc.consulteron.local'&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Applying site-specific Local Bridging override for station 00:80:f0:58:14:b6 - vapId 5,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; site 'default-group', interface 'wlan 192'&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 Applying Local Bridging Interface Policy for station 00:80:f0:58:14:b6 - vlan 192, inter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; face id 16, interface 'wlan 192'&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 processSsidIE&amp;nbsp; statusCode is 0 and status is 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 processSsidIE&amp;nbsp; ssid_done_flag is 0 finish_flag is 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 STA - rates (6): 24 36 48 72 96 108 0 0 0 0 0 0 0 0 0 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.197: 00:80:f0:58:14:b6 suppRates&amp;nbsp; statusCode is 0 and gotSuppRatesElement is 1&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Applied RADIUS override policy&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Replacing Fast Path rule&lt;BR /&gt;&amp;nbsp; type = Airespace AP Client&lt;BR /&gt;&amp;nbsp; on AP c4:14:3c:28:2f:60, slot 0, interface = 13, QOS = 0&lt;BR /&gt;&amp;nbsp; IPv4 ACL ID = 255, IPv6 ACL&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 15206,&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IntfId = 16&amp;nbsp; Local Bridging Vlan = 192, Local Bridging intf id = 16&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) AVC Ratelimit:&amp;nbsp; AppID = 0 ,AppAction =&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0, AppToken = 15206&amp;nbsp; AverageRate = 0, BurstRate = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) AVC Ratelimit:&amp;nbsp; AppID = 0 ,AppAction =&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0, AppToken = 15206&amp;nbsp; AverageRate = 0, BurstRate = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) AVC Ratelimit:&amp;nbsp; AppID = 0 ,AppAction =&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0, AppToken = 15206&amp;nbsp; AverageRate = 0, BurstRate = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55, L2 ACL ID 255)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 Not Using WMM Compliance code qosCap 00&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 Sending 11w Flag 0 for Client 00:80:F0:58:14:B6&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Plumbed mobile LWAPP rule on AP c4:14:3c:28:2f:60 vapId 5 apVapI&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; d 5 flex-acl-name:&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Change state to RUN (20) last state RUN (20)&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 apfPemAddUser2 (apf_policy.c:357) Changing state for mobile 00:80:f0:58:14:b6 on AP c4:1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4:3c:28:2f:60 from Associated to Associated&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 apfPemAddUser2:session timeout forstation 00:80:f0:58:14:b6 - Session Tout 0, apfMsTimeO&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ut '0' and sessionTimerRunning flag is&amp;nbsp; 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 Stopping deletion of Mobile Station: (callerId: 48)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 Sending assoc-resp with status 0 station:00:80:f0:58:14:b6 AP:c4:14:3c:28:2f:60-00 on ap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VapId 5&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 Sending Assoc Response to station on BSSID c4:14:3c:28:2f:64 (status 0) ApVapId 5 Slot 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:26:36.198: 00:80:f0:58:14:b6 apfProcessAssocReq (apf_80211.c:9840) Changing state for mobile 00:80:f0:58:14:b6 on AP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c4:14:3c:28:2f:60 from Associated to Associated&lt;/P&gt;&lt;P&gt;*pemReceiveTask: Jun 22 14:26:36.200: 00:80:f0:58:14:b6 192.168.128.10 Added NPU entry of type 1, dtlFlags 0x0&lt;/P&gt;&lt;P&gt;(Cisco Controller) debug&amp;gt;*Apf Guest: Jun 22 14:26:52.880: Wired client head is NULL, no clients in the list. Number of clients = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Processing assoc-req station:00:80:f0:58:14:b6 AP:c4:14:3c:28:2f:60-00 thread:158c8930&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Association received from mobile on BSSID c4:14:3c:28:2f:64 AP Closet_AP&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Global 200 Clients are allowed to AP radio&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Max Client Trap Threshold: 0&amp;nbsp; cur: 8&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Rf profile 600 Clients are allowed to AP wlan&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 override for default ap group, marking intgrp NULL&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 192&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Re-applying interface policy for client&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) --- (caller apf_policy.c:263&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) --- (caller apf_policy.c:266&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Setting the NAS Id to WLAN specific Id 'wlc.consulteron.local'&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Applying site-specific Local Bridging override for station 00:80:f0:58:14:b6 - vapId 5, site 'default-group', inter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; face 'wlan 192'&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 Applying Local Bridging Interface Policy for station 00:80:f0:58:14:b6 - vlan 192, interface id 16, interface 'wlan&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192'&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.242: 00:80:f0:58:14:b6 processSsidIE&amp;nbsp; statusCode is 0 and status is 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 processSsidIE&amp;nbsp; ssid_done_flag is 0 finish_flag is 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 STA - rates (6): 24 36 48 72 96 108 0 0 0 0 0 0 0 0 0 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 suppRates&amp;nbsp; statusCode is 0 and gotSuppRatesElement is 1&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Applied RADIUS override policy&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Replacing Fast Path rule&lt;BR /&gt;&amp;nbsp; type = Airespace AP Client&lt;BR /&gt;&amp;nbsp; on AP c4:14:3c:28:2f:60, slot 0, interface = 13, QOS = 0&lt;BR /&gt;&amp;nbsp; IPv4 ACL ID = 255, IPv6 ACL&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 15206, IntfId = 16&amp;nbsp; Local Bridgin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; g Vlan = 192, Local Bridging intf id = 16&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) AVC Ratelimit:&amp;nbsp; AppID = 0 ,AppAction = 0, AppToken = 15206&amp;nbsp; Avera&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; geRate = 0, BurstRate = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) AVC Ratelimit:&amp;nbsp; AppID = 0 ,AppAction = 0, AppToken = 15206&amp;nbsp; Avera&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; geRate = 0, BurstRate = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Fast Path rule (contd...) AVC Ratelimit:&amp;nbsp; AppID = 0 ,AppAction = 0, AppToken = 15206&amp;nbsp; Avera&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; geRate = 0, BurstRate = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 Not Using WMM Compliance code qosCap 00&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 Sending 11w Flag 0 for Client 00:80:F0:58:14:B6&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Plumbed mobile LWAPP rule on AP c4:14:3c:28:2f:60 vapId 5 apVapId 5 flex-acl-name:&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 192.168.128.10 RUN (20) Change state to RUN (20) last state RUN (20)&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 apfPemAddUser2 (apf_policy.c:357) Changing state for mobile 00:80:f0:58:14:b6 on AP c4:14:3c:28:2f:60 from Associat&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ed to Associated&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 apfPemAddUser2:session timeout forstation 00:80:f0:58:14:b6 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ing flag is&amp;nbsp; 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 Stopping deletion of Mobile Station: (callerId: 48)&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 14:27:36.243: 00:80:f0:58:14:b6 Sending assoc-resp with status 0 station:00:80:f0:58:14:b6 AP:c4:14:3c:28:2f:60-00 on apVapId 5&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.244: 00:80:f0:58:14:b6 Sending Assoc Response to station on BSSID c4:14:3c:28:2f:64 (status 0) ApVapId 5 Slot 0&lt;BR /&gt;*apfMsConnTask_3: Jun 22 14:27:36.244: 00:80:f0:58:14:b6 apfProcessAssocReq (apf_80211.c:9840) Changing state for mobile 00:80:f0:58:14:b6 on AP c4:14:3c:28:2f:60 from Asso&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciated to Associated&lt;/P&gt;&lt;P&gt;*pemReceiveTask: Jun 22 14:27:36.246: 00:80:f0:58:14:b6 192.168.128.10 Added NPU entry of type 1, dtlFlags 0x0&lt;/P&gt;&lt;P&gt;(Cisco Controller) debug&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691956#M175030</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T21:29:05Z</dc:date>
    </item>
    <item>
      <title>After having added all of the</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691957#M175031</link>
      <description>&lt;P&gt;After having added all of the input each of you have provided, I am making progress. Now the issue is the client ability to recover. For example: resetting an AP or making a change to the 802.11b/g/n configuration of the WLC requires that I power cycle each camera to reconnect.&amp;nbsp; In the autonomous AP configuration the devices would reconnect automatically&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691957#M175031</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T21:39:14Z</dc:date>
    </item>
    <item>
      <title>from show cleint details , i</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691958#M175032</link>
      <description>&lt;P&gt;from show cleint details , i can see that the client is in run state :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy Manager State............................. RUN&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;since the cleint is in run state and has ip address so it should be fine ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;only do the cisco recommendation of disabling flexconnect learn ip address on the WLAN that has passive client enabled .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691958#M175032</guid>
      <dc:creator>ali aqrabawi</dc:creator>
      <dc:date>2015-06-22T21:46:03Z</dc:date>
    </item>
    <item>
      <title>ok this is local switching</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691959#M175033</link>
      <description>&lt;P&gt;ok this is local switching WLAN , (interesting) ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+even if the cleint is not in Run state on the WLC , are you able to ping it from it's local gateway ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+as per configuration guide "&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14.4000005722046px;"&gt;For the FlexConnect local switching, central authentication deployments, if there is a passive client with a static IP address, it is recommended to disable the Learn Client IP Address feature under the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14.4000005722046px;"&gt;WLAN&lt;/STRONG&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14.4000005722046px;"&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14.4000005722046px;"&gt;Advanced&lt;/STRONG&gt;&lt;SPAN style="color: rgb(0, 0, 0); font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 14.4000005722046px;"&gt;&amp;nbsp;tab.&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so can you disable the flexconnect learn ip address ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for your reference :&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-guide/b_cg80/flexconnect.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691959#M175033</guid>
      <dc:creator>ali aqrabawi</dc:creator>
      <dc:date>2015-06-22T21:46:25Z</dc:date>
    </item>
    <item>
      <title>should I be doing something</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691960#M175034</link>
      <description>&lt;P&gt;should I be doing something other than local switching?&amp;nbsp; I have removed the check box from the learn client ip address flex connect setting&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:48:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691960#M175034</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T21:48:00Z</dc:date>
    </item>
    <item>
      <title>no its fine , but as you know</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691961#M175035</link>
      <description>&lt;P&gt;no its fine , but as you know the troubleshooting point of view is different when dealing with local switching or central switching ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any changes after disabling it ? &lt;span class="lia-unicode-emoji" title=":neutral_face:"&gt;😐&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 21:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691961#M175035</guid>
      <dc:creator>ali aqrabawi</dc:creator>
      <dc:date>2015-06-22T21:50:26Z</dc:date>
    </item>
    <item>
      <title>AliI am resetting the DVR to</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691962#M175036</link>
      <description>&lt;P&gt;Ali&lt;/P&gt;&lt;P&gt;I am resetting the DVR to capture video, will know in about 1 hour.&amp;nbsp; Will reply then&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 22:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691962#M175036</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T22:21:22Z</dc:date>
    </item>
    <item>
      <title>AliNow I am seeing rejection</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691963#M175037</link>
      <description>&lt;P&gt;Ali&lt;/P&gt;&lt;P&gt;Now I am seeing rejection messages in my message log on the WLC&lt;/P&gt;&lt;P&gt;*apfMsConnTask_3: Jun 22 15:44:03.066: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:43:49.785: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:12 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:43:03.483: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:42:29.721: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:42:03.233: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:41:03.228: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:40:49.868: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:38:29.782: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:37:29.848: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:37:03.166: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:36:29.970: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:36:03.177: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:12 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:36:03.174: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:35:03.162: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:34:49.836: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:12 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:33:49.855: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:12 192.168.128.20 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:33:03.301: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:32:29.858: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:32:03.302: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:31:03.317: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:30:29.958: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:30:03.284: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:29:30.001: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:29:03.176: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:28:30.028: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:28:03.187: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:27:49.921: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:55:07:4d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:27:43.161: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:27:03.449: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:26:30.008: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:26:03.163: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:25:30.240: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:25:03.633: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:24:30.030: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:24:03.222: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:24:03.216: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:5f:b1:e2 192.168.128.23 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:23:29.965: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_3: Jun 22 15:23:03.177: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:20:6d 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:22:30.340: %APF-3-ASSOCREQ: apf_utils.c:1514 00:80:f0:58:3c:13 0.0.0.0 RUN (20) Rejecting association attempt by ad-hoc client&lt;BR /&gt;*apfMsConnTask_1: Jun 22 15:21:34.006: %APF-3-CHECK_SUPP_RATES_FAILED: apf_utils.c:437 Could not check supported rates. Missing Supported Rate. Length :0. Mobile MAC: 00:80:f0:58:a0:10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 22:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691963#M175037</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T22:45:57Z</dc:date>
    </item>
    <item>
      <title>Also in my trap logMon Jun 22</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691964#M175038</link>
      <description>&lt;P&gt;Also in my trap log&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="1" width="800"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:44:37 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;1&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:44:36 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:74 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;2&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:43:48 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;3&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:43:35 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;4&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:41:33 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;5&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:40:48 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP: 9c:d3:6d:a6:88:79 detected on Base Radio MAC: 34:a8:4e:81:2a:50 Interface no: 0(802.11n(2.4 GHz)) Channel: 8 RSSI: -71 SNR: 21 Classification: unclassified, State: Alert, RuleClassified : N, Severity Score: 0, RuleName: N.A. ,Classified AP MAC: 00:00:00:00:00:00 ,Classified RSSI: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;6&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:40:45 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;7&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:40:32 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;8&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:39:33 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC c4:14:3c:28:2f:64 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: c4:14:3c:28:2f:60 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;9&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:38:31 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;10&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:37:41 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;11&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:37:31 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;12&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:36:55 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP: 00:25:3c:08:50:d1 detected on Base Radio MAC: 64:d8:14:d1:3c:70 Interface no: 0(802.11b/g) Channel: 3 RSSI: -73 SNR: 6 Classification: unclassified, State: Alert, RuleClassified : N, Severity Score: 0, RuleName: N.A. ,Classified AP MAC: 00:00:00:00:00:00 ,Classified RSSI: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;13&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:35:29 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;14&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:34:36 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;15&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:34:28 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;16&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:33:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP : 9c:d3:6d:a6:88:79 removed from Base Radio MAC : 34:a8:4e:81:2a:50 Interface no:0(802.11n(2.4 GHz))&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;17&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:33:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP : 9c:d3:6d:a6:88:79 removed from Base Radio MAC : c4:14:3c:28:2f:60 Interface no:0(802.11n(2.4 GHz))&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;18&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:32:25 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;19&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:31:49 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP : 00:25:3c:08:50:d1 removed from Base Radio MAC : 64:d8:14:d1:3c:70 Interface no:0(802.11b/g)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;20&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:31:33 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;21&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:31:25 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;22&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:29:22 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;23&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:28:30 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;24&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:28:21 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;25&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:28:20 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:74 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;26&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:27:49 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP: 00:25:3c:08:50:d1 detected on Base Radio MAC: 64:d8:14:d1:3c:70 Interface no: 0(802.11b/g) Channel: 3 RSSI: -77 SNR: 1 Classification: unclassified, State: Alert, RuleClassified : N, Severity Score: 0, RuleName: N.A. ,Classified AP MAC: 00:00:00:00:00:00 ,Classified RSSI: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;27&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:27:38 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP : 9c:d3:6d:b3:e2:89 removed from Base Radio MAC : 34:a8:4e:81:2a:50 Interface no:0(802.11n(2.4 GHz))&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;28&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:26:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;29&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:26:15 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP: 9c:d3:6d:a6:88:79 detected on Base Radio MAC: c4:14:3c:28:2f:60 Interface no: 0(802.11n(2.4 GHz)) Channel: 8 RSSI: -78 SNR: 1 Classification: unclassified, State: Alert, RuleClassified : N, Severity Score: 0, RuleName: N.A. ,Classified AP MAC: 00:00:00:00:00:00 ,Classified RSSI: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;30&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:25:27 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;31&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:25:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;32&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:23:38 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP: 9c:d3:6d:b3:e2:89 detected on Base Radio MAC: 34:a8:4e:81:2a:50 Interface no: 0(802.11n(2.4 GHz)) Channel: 8 RSSI: -62 SNR: 4 Classification: unclassified, State: Alert, RuleClassified : N, Severity Score: 0, RuleName: N.A. ,Classified AP MAC: 00:00:00:00:00:00 ,Classified RSSI: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;33&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:23:23 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Interference Profile Updated to Pass for Base Radio MAC: 64:d8:14:d1:3c:70 and slotNo: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;34&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:23:18 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;35&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:22:23 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;36&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:22:18 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;37&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:20:16 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;38&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:20:08 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC c4:14:3c:28:2f:64 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: c4:14:3c:28:2f:60 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;39&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:19:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;40&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:19:15 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;41&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:17:13 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;42&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:17:06 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC c4:14:3c:28:2f:64 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: c4:14:3c:28:2f:60 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;43&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:16:13 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;44&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:16:11 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:74 using source address of 00:80:f0:8c:43:06 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;45&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:15:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP : 9c:d3:6d:a6:88:79 removed from Base Radio MAC : 34:a8:4e:81:2a:50 Interface no:0(802.11n(2.4 GHz))&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;46&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:15:17 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 34:a8:4e:81:2a:54 using source address of 00:80:f0:8c:43:07 has been detected by the AP with MAC Address: 34:a8:4e:81:2a:50 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;47&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:14:10 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;48&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:14:02 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC c4:14:3c:28:2f:64 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: c4:14:3c:28:2f:60 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;49&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:13:10 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;50&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:13:09 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:74 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;51&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:11:25 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Noise Profile Updated to Pass for Base Radio MAC: 34:a8:4e:81:2a:50 and slotNo: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;52&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:11:19 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Rogue AP: 9c:d3:6d:a6:88:79 detected on Base Radio MAC: 34:a8:4e:81:2a:50 Interface no: 0(802.11n(2.4 GHz)) Channel: 8 RSSI: -71 SNR: 21 Classification: unclassified, State: Alert, RuleClassified : N, Severity Score: 0, RuleName: N.A. ,Classified AP MAC: 00:00:00:00:00:00 ,Classified RSSI: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;53&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:11:07 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;54&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:10:06 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;55&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:10:05 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:74 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;56&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:10:00 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC c4:14:3c:28:2f:64 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: c4:14:3c:28:2f:60 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;57&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:08:26 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Interference Profile Failed for Base Radio MAC: 64:d8:14:d1:3c:70 and slotNo: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;58&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:08:25 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Noise Profile Failed for Base Radio MAC: 34:a8:4e:81:2a:50 and slotNo: 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;59&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:08:03 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:75 using source address of 64:d8:14:d1:3c:75 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;60&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:07:03 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:77 using source address of 64:d8:14:d1:3c:77 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11a radio whose slot ID is 1&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;61&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:06:56 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC c4:14:3c:28:2f:64 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: c4:14:3c:28:2f:60 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;62&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:06:02 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Impersonation of AP with Base Radio MAC 64:d8:14:d1:3c:74 using source address of 00:80:f0:58:a0:10 has been detected by the AP with MAC Address: 64:d8:14:d1:3c:70 on its 802.11b/g radio whose slot ID is 0&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class="listNoPad"&gt;63&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Mon Jun 22 15:05:26 2015&lt;/TD&gt;&lt;TD class="listNoPad"&gt;Noise Profile Updated to Pass for Base Radio MAC: 34:a8:4e:81:2a:50 and slotNo: 0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 22 Jun 2015 22:46:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691964#M175038</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T22:46:41Z</dc:date>
    </item>
    <item>
      <title>all of my camera MAC</title>
      <link>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691965#M175039</link>
      <description>&lt;P&gt;all of my camera MAC addresses start 00:80:f0.&amp;nbsp; I am noticing these cameras are now showing up in the client monitor table with both their wireless MAC address and their wired MAC address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I fighting cleanair now?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2015 22:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/statically-addressed-devices-cannot-achive-run-state/m-p/2691965#M175039</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2015-06-22T22:52:39Z</dc:date>
    </item>
  </channel>
</rss>

