<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Client dropping WLC 5508 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596140#M241053</link>
    <description>&lt;P&gt;I noticed our fleet of HP Laptops has dropped the Cisco compatibility shortly after purchasing them HP Probook 435&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have noticed that the client drop. I have 802.11r and 802.11k with Radius authentication AES&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am at a loss with what is happening&lt;/P&gt;&lt;P&gt;I have Radius auth - windows with WPA2 AES 802.1x FT802.1x&lt;/P&gt;&lt;P&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received Identity Response (count=1) from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Resetting reauth count 1 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b EAP State update from Connecting to Authenticating for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticating state&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.755: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=2) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 2)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Allocating EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 2, EAP Type 3)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=3) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 3)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.760: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 3, EAP Type 13)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=4) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 4)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 4, EAP Type 13)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Processing Access-Accept for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Previous Radius Overrides:(0)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 acl from 255 to 255&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 Flex acl from 65535 to 65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_SEND_KEY: KeyLen: 32&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_RECV_KEY: KeyLen: 32&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting re-auth timeout to 1800 seconds, got from WLAN config.&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Station 84:1b:77:86:ce:4b setting dot1x reauth timeout = 1800&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Created PKC PMK Cache entry for station 84:1b:77:86:ce:4b (RSN 2)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting MSCB PMK Cache Entry @index 0 for station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 0 ---&amp;gt; 8&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 8 ---&amp;gt; 0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMKID PMK Cache for BSSID e4:aa:5d:4f:c9:ae at index 0 for station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: New PMKID: (16)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Using PMK of length 32 as TGr MSK (in 802.1X case) AKM:3&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMK Cache Entry for TGr AKM:802.1x 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b R0KH-ID:IPADDRESS R1KH-ID:6c:41:6a:5f:1e:60 MSK Len:48&lt;BR /&gt;pmkValidTime:1801&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b apfCreatePmkCacheEntry: added a new pmk cache entry for 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 1x: Updated the audit-session-id to PMK-Cache from client mscb: ac16440200002372625fe777&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b unsetting PmkIdValidatedByAp&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Zeroize AAA Overrides from local for station&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Adding Audit session ID payload in Mobility handoff&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 0 PMK-update groupcast messages sent&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b PMK sent to mobility group&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Disabling re-auth since PMK lifetime can take care of same.&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Sending EAP-Success to mobile 84:1b:77:86:ce:4b (EAP Id 4)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Freeing AAACB from Dot1xCB as AAA auth is done for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: Including PMKID in M1 (16)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: M1 - Key Data: (22)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] dd 14 00 0f ac 04 8a ee d9 02 c6 6c 83 f6 1c 7c&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0016] c0 45 8d b1 59 70&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Starting key exchange to mobile 84:1b:77:86:ce:4b, data packets will be dropped&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.02&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Entering Backend Auth Success state (id=4) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Received Auth Success while in Authenticating state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticated state&lt;BR /&gt;*dot1xSocketTask: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-key in PTK_START state (message 2) from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Encryption Policy: 4, PTK Key Length: 48&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: R1KHID+S1KHID: (12)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: [0000] 6c 41 6a 5f 1e 60 84 1b 77 86 ce 4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Successfully computed PTK from PMK!!!&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received valid MIC in EAPOL Key Message M2!!!!!&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b rsnieCapabilty = 3c00 rsnie_len =18&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b non-11w Capable mobile&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Dumping RSNIE received in Association request(len = 24):&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 00000000: 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: 00 0f ac 03 3c 00 00 00 ....&amp;lt;...&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Dumping RSNIE received in EAPOL M2 (len = 38):&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: ac 03 3c 00 01 00 78 d8 57 93 14 ea 9d d3 a5 bd ..&amp;lt;...x.W.......&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000020: 78 c6 5b 34 b6 95 x.[4..&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b 11r-FT: Validate MDIE info in M2 message from mobile&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Calculating PMKR0Name&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Encrypt EAPOL packets = TRUE&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Validate the 11r FTIE element received in the M2 against the assoc respnse FTIE&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Received EAPOL M2 with wepBit set in FTIE, validate R0KHID and R1KHID&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Successfully validated the FTIE in M2 with IE sent in association response&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Not Flex client. Do not distribute dot11r Key cache.&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.03&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*dot1xSocketTask: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Freeing EAP Retransmit Bufer for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b STA [84:1b:77:86:ce:4b, IPADDRESS] Deleting Fast Path Rule (8021X_AUTH)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b the value of url acl preserve flag is 0 for mobile 84:1b:77:86:ce:4b (caller pem_api.c:6008)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateDec&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateDec&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Change state to 8021X_REQD (3) last state RUN (20)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateInc&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Not Using WMM Compliance code qosCap 00&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent when fabric is disabled:65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent :65535 name : client acl id : 65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Vlan while overriding the policy = -1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP e4:aa:5d:4f:c9:a0 vapId 3 apVapId 2 flex-acl-name:&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateInc&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add SGT:0 to AP e4:aa:5d:4f:c9:a0&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Reached PLUMBFASTPATH: from line 7157, null&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Adding Fast Path rule&lt;BR /&gt;type = Airespace AP Client&lt;BR /&gt;on AP e4:aa:5d:4f:c9:a0, slot 1, interface = 13, QOS = 2&lt;BR /&gt;IPv4 ACL ID = 255, IPv6 ACL ID =&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Successful transmission of LWAPP Add-Mobile to AP e4:aa:5d:4f:c9:a0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 46, TokenID = 15206, IntfId = 18 Local Bridging Vlan = 511, Local Bridging intf id = 18&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Setting ADD_MOBILE (idx 96, action 0, last count 142) ack state for STA on AP e4:aa:5d:4f:c9:a0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;BR /&gt;*Dot1x_NW_&lt;/P&gt;</description>
    <pubDate>Wed, 20 Apr 2022 13:46:34 GMT</pubDate>
    <dc:creator>dazza007</dc:creator>
    <dc:date>2022-04-20T13:46:34Z</dc:date>
    <item>
      <title>Client dropping WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596140#M241053</link>
      <description>&lt;P&gt;I noticed our fleet of HP Laptops has dropped the Cisco compatibility shortly after purchasing them HP Probook 435&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have noticed that the client drop. I have 802.11r and 802.11k with Radius authentication AES&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am at a loss with what is happening&lt;/P&gt;&lt;P&gt;I have Radius auth - windows with WPA2 AES 802.1x FT802.1x&lt;/P&gt;&lt;P&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received Identity Response (count=1) from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Resetting reauth count 1 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b EAP State update from Connecting to Authenticating for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticating state&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.755: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=2) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 2)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Allocating EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 2, EAP Type 3)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=3) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 3)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.760: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 3, EAP Type 13)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=4) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 4)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 4, EAP Type 13)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Processing Access-Accept for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Previous Radius Overrides:(0)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 acl from 255 to 255&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 Flex acl from 65535 to 65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_SEND_KEY: KeyLen: 32&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_RECV_KEY: KeyLen: 32&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting re-auth timeout to 1800 seconds, got from WLAN config.&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Station 84:1b:77:86:ce:4b setting dot1x reauth timeout = 1800&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Created PKC PMK Cache entry for station 84:1b:77:86:ce:4b (RSN 2)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting MSCB PMK Cache Entry @index 0 for station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 0 ---&amp;gt; 8&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 8 ---&amp;gt; 0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMKID PMK Cache for BSSID e4:aa:5d:4f:c9:ae at index 0 for station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: New PMKID: (16)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Using PMK of length 32 as TGr MSK (in 802.1X case) AKM:3&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMK Cache Entry for TGr AKM:802.1x 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b R0KH-ID:IPADDRESS R1KH-ID:6c:41:6a:5f:1e:60 MSK Len:48&lt;BR /&gt;pmkValidTime:1801&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b apfCreatePmkCacheEntry: added a new pmk cache entry for 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 1x: Updated the audit-session-id to PMK-Cache from client mscb: ac16440200002372625fe777&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b unsetting PmkIdValidatedByAp&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Zeroize AAA Overrides from local for station&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Adding Audit session ID payload in Mobility handoff&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 0 PMK-update groupcast messages sent&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b PMK sent to mobility group&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Disabling re-auth since PMK lifetime can take care of same.&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Sending EAP-Success to mobile 84:1b:77:86:ce:4b (EAP Id 4)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Freeing AAACB from Dot1xCB as AAA auth is done for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: Including PMKID in M1 (16)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: M1 - Key Data: (22)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] dd 14 00 0f ac 04 8a ee d9 02 c6 6c 83 f6 1c 7c&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0016] c0 45 8d b1 59 70&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Starting key exchange to mobile 84:1b:77:86:ce:4b, data packets will be dropped&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.02&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Entering Backend Auth Success state (id=4) for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Received Auth Success while in Authenticating state for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticated state&lt;BR /&gt;*dot1xSocketTask: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-key in PTK_START state (message 2) from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Encryption Policy: 4, PTK Key Length: 48&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: R1KHID+S1KHID: (12)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: [0000] 6c 41 6a 5f 1e 60 84 1b 77 86 ce 4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Successfully computed PTK from PMK!!!&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received valid MIC in EAPOL Key Message M2!!!!!&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b rsnieCapabilty = 3c00 rsnie_len =18&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b non-11w Capable mobile&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Dumping RSNIE received in Association request(len = 24):&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 00000000: 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: 00 0f ac 03 3c 00 00 00 ....&amp;lt;...&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Dumping RSNIE received in EAPOL M2 (len = 38):&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: ac 03 3c 00 01 00 78 d8 57 93 14 ea 9d d3 a5 bd ..&amp;lt;...x.W.......&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000020: 78 c6 5b 34 b6 95 x.[4..&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b 11r-FT: Validate MDIE info in M2 message from mobile&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Calculating PMKR0Name&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Encrypt EAPOL packets = TRUE&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Validate the 11r FTIE element received in the M2 against the assoc respnse FTIE&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Received EAPOL M2 with wepBit set in FTIE, validate R0KHID and R1KHID&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Successfully validated the FTIE in M2 with IE sent in association response&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Not Flex client. Do not distribute dot11r Key cache.&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.03&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*dot1xSocketTask: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b key Desc Version FT - 1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Freeing EAP Retransmit Bufer for mobile 84:1b:77:86:ce:4b&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b STA [84:1b:77:86:ce:4b, IPADDRESS] Deleting Fast Path Rule (8021X_AUTH)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b the value of url acl preserve flag is 0 for mobile 84:1b:77:86:ce:4b (caller pem_api.c:6008)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateDec&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateDec&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Change state to 8021X_REQD (3) last state RUN (20)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateInc&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Not Using WMM Compliance code qosCap 00&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent when fabric is disabled:65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent :65535 name : client acl id : 65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Vlan while overriding the policy = -1&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP e4:aa:5d:4f:c9:a0 vapId 3 apVapId 2 flex-acl-name:&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateInc&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add SGT:0 to AP e4:aa:5d:4f:c9:a0&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Reached PLUMBFASTPATH: from line 7157, null&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Adding Fast Path rule&lt;BR /&gt;type = Airespace AP Client&lt;BR /&gt;on AP e4:aa:5d:4f:c9:a0, slot 1, interface = 13, QOS = 2&lt;BR /&gt;IPv4 ACL ID = 255, IPv6 ACL ID =&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Successful transmission of LWAPP Add-Mobile to AP e4:aa:5d:4f:c9:a0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 46, TokenID = 15206, IntfId = 18 Local Bridging Vlan = 511, Local Bridging intf id = 18&lt;BR /&gt;*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Setting ADD_MOBILE (idx 96, action 0, last count 142) ack state for STA on AP e4:aa:5d:4f:c9:a0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;BR /&gt;*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0&lt;BR /&gt;*Dot1x_NW_&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 13:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596140#M241053</guid>
      <dc:creator>dazza007</dc:creator>
      <dc:date>2022-04-20T13:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: Client dropping WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596150#M241054</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;non-11w Capable mobile" How Management Frame Protection is configured on the WLC?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 14:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596150#M241054</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-04-20T14:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: Client dropping WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596151#M241055</link>
      <description>&lt;P&gt;Thank you for your help&lt;/P&gt;&lt;P&gt;It is disabled on the WLAN&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 14:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596151#M241055</guid>
      <dc:creator>dazza007</dc:creator>
      <dc:date>2022-04-20T14:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Client dropping WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596217#M241059</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- Below you will find output from your debugging-trail when processed with :&amp;nbsp;&lt;A href="https://cway.cisco.com/wireless-debug-analyzer/" target="_blank"&gt;https://cway.cisco.com/wireless-debug-analyzer/&lt;/A&gt;&amp;nbsp; , &lt;STRONG&gt;Show All&lt;/STRONG&gt; flag was checked (too) :&amp;nbsp;&lt;/P&gt;
&lt;DIV class="clearfix"&gt;
&lt;DIV class="pull-left"&gt;
&lt;DIV class="form-group dropdown" tabindex="-1" title="84:1b:77:86:ce:4b"&gt;
&lt;DIV class="form-group__text"&gt;&lt;INPUT id="select-706fbbdd-c648-4038-3701-d3b1c26f5712" class="ng-untouched ng-pristine ng-valid" autocomplete="off" type="text" placeholder="" data-auto-id="cui-select" /&gt;
&lt;DIV&gt;84:1b:77:86:ce:4b&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="pull-right"&gt;
&lt;DIV class="flex flex-left"&gt;&lt;SPAN class="pager-text"&gt;Lines 1-12 of 12&lt;/SPAN&gt;
&lt;DIV class="cui-pager"&gt;
&lt;DIV class="flex-center-vertical"&gt;
&lt;UL class="pagination pagination--bordered"&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI class="active"&gt;&lt;A class="cui-pager-page" data-auto-id="CUIPager-Page1" target="_blank"&gt;&lt;SPAN&gt;1&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&lt;LABEL class="checkbox"&gt;&lt;INPUT id="showTime-filter" class="ng-untouched ng-pristine ng-valid" type="checkbox" data-auto-id="Results-ShowTimeFilter-Checkbox" /&gt;&lt;SPAN class="checkbox__label"&gt;Show Time&lt;/SPAN&gt;&lt;/LABEL&gt;&lt;/DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&lt;LABEL class="checkbox"&gt;&lt;INPUT id="showTask-filter" class="ng-untouched ng-pristine ng-valid" type="checkbox" data-auto-id="Results-ShowTaskFilter-Checkbox" /&gt;&lt;SPAN class="checkbox__label"&gt;Show Task&lt;/SPAN&gt;&lt;/LABEL&gt;&lt;/DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&lt;LABEL class="checkbox"&gt;&lt;INPUT id="showTranslated-filter" class="ng-untouched ng-pristine ng-valid" type="checkbox" data-auto-id="Results-ShowTranslatedFilter-Checkbox" /&gt;&lt;SPAN class="checkbox__label"&gt;Show Translated&lt;/SPAN&gt;&lt;/LABEL&gt;&lt;/DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&lt;LABEL class="checkbox"&gt;&lt;INPUT id="showOriginal-filter" class="ng-untouched ng-pristine ng-valid" type="checkbox" data-auto-id="Results-ShowOriginalFilter-Checkbox" /&gt;&lt;SPAN class="checkbox__label"&gt;Show Original&lt;/SPAN&gt;&lt;/LABEL&gt;&lt;/DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&lt;LABEL class="checkbox disabled"&gt;&lt;INPUT id="showPriorFC-filter" class="ng-untouched ng-pristine ng-valid" type="checkbox" data-auto-id="Results-ShowPriorFCFilter-Checkbox" /&gt;&lt;SPAN class="checkbox__label"&gt;Show Prior First Connection&lt;/SPAN&gt;&lt;/LABEL&gt;&lt;/DIV&gt;
&lt;DIV class="form-group form-group--inline"&gt;&lt;LABEL class="checkbox"&gt;&lt;INPUT id="showAll-filter" class="ng-valid ng-dirty ng-touched" type="checkbox" data-auto-id="Results-ShowAllFilter-Checkbox" /&gt;&lt;SPAN class="checkbox__label"&gt;Show All&lt;/SPAN&gt;&lt;/LABEL&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR /&gt;
&lt;P&gt;TimeTaskTranslated&lt;/P&gt;
&lt;TABLE class="table table--striped table--wrapped table--bordered"&gt;
&lt;THEAD&gt;&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.750&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;Client sent EAP-Identity-Response to WLC/AP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.750&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;Client sent EAP-Identity-Response to WLC/AP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.776&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;RADIUS Server permitted access&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.776&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;Client will be required to Reauthenticate in 1800&lt;BR /&gt;seconds&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.777&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;WLC creates a PMK cache entry for this client, which is used for FT with AKM:802.1xin this case, so the PMKID is computed with the AP MAC address&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.778&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Sending M1&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.803&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Received M2&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.804&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Sending M3&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.807&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;4-Way PTK Handshake, Received M4&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.808&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;Client is entering the 802.1x or PSK Authentication state&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.808&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;Client has completed PSK Dot1x or WEP authentication phase&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Apr 20 12:57:46.808&lt;/TD&gt;
&lt;TD&gt;*Dot1x_NW_MsgTask_3&lt;/TD&gt;
&lt;TD&gt;Client has entered RUN state&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 20 Apr 2022 15:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4596217#M241059</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-04-20T15:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Client dropping WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4597668#M241138</link>
      <description>&lt;P&gt;Thank you that is very helpful to see the wood for the trees thank you!&lt;/P&gt;&lt;P&gt;I have a clients (60) with Intel Wifi-6 AX200 adapters which have random disconnects.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The drivers (22.80.1.1) and board fw are the latests provided.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The device only states an NEtwtw10 6062- Lso was triggered&amp;nbsp; when a disconnect happens.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The WLC is the latest and the WAP&amp;nbsp;&lt;SPAN&gt;AIR-CAP3702I-E-K9 are too.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 12:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4597668#M241138</guid>
      <dc:creator>dazza007</dc:creator>
      <dc:date>2022-04-22T12:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Client dropping WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4597883#M241145</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://community.intel.com/t5/Wireless/6062-Lso-was-triggered-problem-on-Intel-R-Wireless-AC-9560/td-p/1274201" target="_blank"&gt;https://community.intel.com/t5/Wireless/6062-Lso-was-triggered-problem-on-Intel-R-Wireless-AC-9560/td-p/1274201&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 13:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/client-dropping-wlc-5508/m-p/4597883#M241145</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2022-04-22T13:41:04Z</dc:date>
    </item>
  </channel>
</rss>

