cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5726
Views
20
Helpful
25
Replies

Cisco 8821 with 11.0(5)SR3 WLAN Issue

florian.hanig1
Level 1
Level 1

Hello,

 

I've upgraded a Cisco 8821 to the new Firmware "11.0(5)SR3".

Sience this FW-Version, the phone does not connect to WLAN.

WLAN Security ist EAP-FAST with Local EAP Users on Cisco 2504.

 

With older Firmware on Cisco 8821 WLAN Phone, there were no issues, like this.

 

I use Cisco 3802 Access Points with Cisco 2504 WLC on Software Version 8.5.161.0.

 

Phone says in "Status messages" Ethernet Disconnected.

On WLC I see that the device is connecting but with no ip (0.0.0.0).

 

What can I do ?

25 Replies 25

Leo Laohoo
Hall of Fame
Hall of Fame

Let us start with a debug of the MAC address of the phone when attempting to join the SSID.
In the WLC CLI, log the output to the command "debug client <MAC ADDRESS>".

NOTE:  Unfortunately, the documentation has not yet caught up.  I am unable to find any Release Notes to "11.0(5)SR3".  

Here is the client Debug:

 

(Cisco Controller) >debug client f8:a5:c5:9f:43:96

(Cisco Controller) >*apfOpenDtlSocket: Apr 17 08:50:04.815: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 apf_policy.c:2454 Assigning the SGT 0 to mobile (earlier sgt 0)
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_1: Apr 17 08:50:04.818: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_1: Apr 17 08:50:04.818:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_1: Apr 17 08:50:04.818:      [0016] ac 03 00 00

*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Allocate AID 4 slot 1 on AP SK-Buero #clients on this slot 3
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfMsAssoStateInc
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Idle to Associated

*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 74, seqno 207, action 1, count 207, last count 0) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 207 expected 207 action = 1
*spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 74)
*spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 1, msg 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 1 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Station f8:a5:c5:9f:43:96 setting dot1x reauth timeout = 86400
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.823: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:09.120: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_0: Apr 17 08:50:09.122: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_0: Apr 17 08:50:09.122:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Apr 17 08:50:09.122:      [0016] ac 03 00 00

*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40]
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Succesfully freed AID 4, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac:  78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Allocate AID 6 slot 1 on AP SK-Kueche #clients on this slot 3
*apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Initializing policy
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3)

*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*spamApTask0: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 75, seqno 208, action 6, count 208, last count 0) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248

*spamApTask1: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask1: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:09.128: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 97, seqno 74, action 1, count 74, last count 207) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask0: Apr 17 08:50:09.130: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 208 expected 208 action = 6
*spamApTask0: Apr 17 08:50:09.130: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 74 expected 74 action = 1
*spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 97)
*spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 2, msg 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 reauth_sm state transition 1 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.148: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:13.421: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 ssid : HANIG.VOICE thread:1b82f198
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_1: Apr 17 08:50:13.423: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_1: Apr 17 08:50:13.423:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_1: Apr 17 08:50:13.423:      [0016] ac 03 00 00

*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [70:0f:6a:8d:f8:c0]
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Succesfully freed AID 6, slot 1 on AP 70:0f:6a:8d:f8:c0, #client on this slot 2
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  78:72:5D:1E:18:40 New ctxOwnerApEthMac:  70:79:B3:17:4E:6C New ctxOwnerApSlotId: 1
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Updated location for station old AP 70:0f:6a:8d:f8:c0 oldSlot 1, new AP 78:72:5d:1e:18:40 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Allocate AID 5 slot 1 on AP SK-Buero #clients on this slot 3
*apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Initializing policy
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3)

*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*spamApTask1: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 98, seqno 75, action 6, count 75, last count 0) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 70:0f:6a:8d:f8:c0 IP: 10.2.99.246:5248

*spamApTask0: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Apr 17 08:50:13.428: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:13.428: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 76, seqno 209, action 1, count 209, last count 74) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask1: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 75 expected 75 action = 6
*spamApTask1: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 209 expected 209 action = 1
*spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 76)
*spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 3, msg 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 84) in 1 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 9) in 10 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_0: Apr 17 08:50:17.717: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_0: Apr 17 08:50:17.717:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Apr 17 08:50:17.717:      [0016] ac 03 00 00

*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40]
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Succesfully freed AID 5, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac:  78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Allocate AID 7 slot 1 on AP SK-Kueche #clients on this slot 3
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*spamApTask0: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 77, seqno 210, action 6, count 210, last count 0) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248

*spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 99, seqno 76, action 1, count 76, last count 209) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask0: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 210 expected 210 action = 6
*spamApTask0: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 76 expected 76 action = 1
*spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 99)
*spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 4, msg 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 84) in 1 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 9) in 10 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e
*apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 ssid : HANIG.VOICE thread:1b82f198
*apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero
*apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_1: Apr 17 08:50:22.017: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_1: Apr 17 08:50:22.017:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_1: Apr 17 08:50:22.017:      [0016] ac 03 00 00

*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [70:0f:6a:8d:f8:c0]
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Succesfully freed AID 7, slot 1 on AP 70:0f:6a:8d:f8:c0, #client on this slot 2
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  78:72:5D:1E:18:40 New ctxOwnerApEthMac:  70:79:B3:17:4E:6C New ctxOwnerApSlotId: 1
*apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Updated location for station old AP 70:0f:6a:8d:f8:c0 oldSlot 1, new AP 78:72:5d:1e:18:40 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Allocate AID 4 slot 1 on AP SK-Buero #clients on this slot 3
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_1: Apr 17 08:50:22.019: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*spamApTask1: Apr 17 08:50:22.021: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 0, seqno 77, action 6, count 77, last count 0) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 70:0f:6a:8d:f8:c0 IP: 10.2.99.246:5248

*spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 78, seqno 211, action 1, count 211, last count 76) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask1: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 77 expected 77 action = 6
*spamApTask1: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 211 expected 211 action = 1
*spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 78)
*spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 5, msg 5)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 84) in 1 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 9) in 10 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_0: Apr 17 08:50:26.318: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_0: Apr 17 08:50:26.318:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Apr 17 08:50:26.318:      [0016] ac 03 00 00

*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40]
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Succesfully freed AID 4, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac:  78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Allocate AID 6 slot 1 on AP SK-Kueche #clients on this slot 3
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*spamApTask0: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 79, seqno 212, action 6, count 212, last count 0) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248

*spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 1, seqno 78, action 1, count 78, last count 211) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask0: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 212 expected 212 action = 6
*spamApTask0: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 78 expected 78 action = 1
*spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 1)
*spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 6, msg 6)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.351: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.351: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 84) in 1 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 9) in 10 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:30.614: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e
*apfMsConnTask_1: Apr 17 08:50:30.614: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 ssid : HANIG.VOICE thread:1b82f198
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  78:72:5D:1E:18:40
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_1: Apr 17 08:50:30.616: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_1: Apr 17 08:50:30.616:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_1: Apr 17 08:50:30.616:      [0016] ac 03 00 00

*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [70:0f:6a:8d:f8:c0]
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Succesfully freed AID 6, slot 1 on AP 70:0f:6a:8d:f8:c0, #client on this slot 2
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  78:72:5D:1E:18:40 New ctxOwnerApEthMac:  70:79:B3:17:4E:6C New ctxOwnerApSlotId: 1
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Updated location for station old AP 70:0f:6a:8d:f8:c0 oldSlot 1, new AP 78:72:5d:1e:18:40 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Allocate AID 5 slot 1 on AP SK-Buero #clients on this slot 3
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated

*spamApTask1: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 2, seqno 79, action 6, count 79, last count 0) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 70:0f:6a:8d:f8:c0 IP: 10.2.99.246:5248

*spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 80, seqno 213, action 1, count 213, last count 78) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask1: Apr 17 08:50:30.623: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 79 expected 79 action = 6
*spamApTask1: Apr 17 08:50:30.623: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask0: Apr 17 08:50:30.623: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 213 expected 213 action = 1
*spamApTask0: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 80)
*spamApTask0: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask0: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 7, msg 7)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.643: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.643: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 84) in 1 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 9) in 10 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
*apfOpenDtlSocket: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST  on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce
*apfMsConnTask_0: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98
*apfMsConnTask_0: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Station:  F8:A5:C5:9F:43:96  11v BSS Transition not enabled on the AP  70:0F:6A:8D:F8:C0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20

*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Re-applying interface policy for client

*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice'
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC'
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable.
*apfMsConnTask_0: Apr 17 08:50:34.819: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_0: Apr 17 08:50:34.819:      [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Apr 17 08:50:34.819:      [0016] ac 03 00 00

*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 RSN Capabilities:  0
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 non-11w Capable mobile
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931)
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40]
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Succesfully freed AID 5, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp:  10.2.99.250 New ctxOwnerApMac:  70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac:  78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Allocate AID 7 slot 1 on AP SK-Kueche #clients on this slot 3
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96  apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96  AuthenticationRequired = 1
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name:
*apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0
*apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated

*spamApTask0: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 81, seqno 214, action 6, count 214, last count 0) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248

*spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 3, seqno 80, action 1, count 80, last count 213) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask0: Apr 17 08:50:34.825: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 214 expected 214 action = 6
*spamApTask0: Apr 17 08:50:34.825: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 80 expected 80 action = 1
*spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 3)
*spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96
*spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 8, msg 8)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Reusing allocated memory for  EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 84) in 1 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station:  (callerId: 9) in 10 seconds
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state

*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4)
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96

What happens if you enable OPEN authentication? 

Open Auth, or PSK Auth works...

 

 

EDIT:

The last Version it works for me is "11.0(4)SR3".

All other FW-Versions over it, like 11.0.(5)XXX do not work with EAP-FAST for me...

 

Can it be:

CSCvi80433 

??

What does the authentication server say?

I use the local net user (Local EAP) on my WLC 2504.

The WLC ist the authentication server.

 

I don't know how to check this.

 

Then use PSK.

This is not very helpful.

 

It's recommended to use EAP-FAST for 8821 Phone, so I want to use it.

And in previous versions it works as well.

 


@florian.hanig1 wrote:

It's recommended to use EAP-FAST for 8821 Phone


Nowhere in the recommendation says to use the WLC as the authentication server. 

Get, for example, a cheap Raspberry Pi and use that as the authentication server. 

I am not going to have any discussion about the usefulness for 5 users to set up an external authentication server.

The WLC offers the feature of Local Users für EAP-FAST, so it must also work.

Apologies on my part.
My intention was to say "using the WLC as an authentication server can be a b1tch to troubleshoot".

migilles
Cisco Employee
Cisco Employee

Which 8821 firmware version did you upgrade from that last worked?

Did you also upgrade the WLC 2500 version recently?

Also curious if PEAP works for you or not. 

 

TLS 1.2 for WLAN authentication was added in 11.0(5) for 8821 phones. 

And 8821 supports the latest ciphers would shouldn’t be an issue there. 

Suggest to open a support case with Cisco TAC for further troubleshooting. 

So I've run the following command on my WLC to troubleshoot the local-EAP Authentication...:

debug aaa local-auth eap framework all enable
debug aaa local-auth eap method all enable

 

(Cisco Controller) >debug aaa local-auth eap framework all enable

(Cisco Controller) >debug aaa local-auth eap method all enable

(Cisco Controller) >
(Cisco Controller) >*aaaQueueReader: Apr 21 10:13:01.568: id_manager.c-ID-MGR: Got new ID 69000009 - id_get
*EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.570: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.570: eap_core.c:1541: Code:RESPONSE  ID:0x 1  Length:0x000c  Type:IDENTITY
*EAP_Framework_0: Apr 21 10:13:01.570: eap_core.c:1478:     Payload:  38383231666C6F
*EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009
*EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity
*EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo
*EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
*EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (69000009)
*EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 69000009
*EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.571: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.572: id_manager.c-ID-MGR: Got new ID f000001 - id_get
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = f000001)
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.573: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.573: eap_core.c:1541: Code:REQUEST  ID:0x 2  Length:0x0006  Type:PEAP
*EAP_Framework_0: Apr 21 10:13:01.573: eap_core.c:1478:     Payload:  21
*EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.574: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:01.574: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.579: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.579: eap_core.c:1541: Code:RESPONSE  ID:0x 2  Length:0x0006  Type:NAK
*EAP_Framework_0: Apr 21 10:13:01.579: eap_core.c:1478:     Payload:  2B
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1)
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.579: id_manager.c-ID-MGR: Entry deleted fine id f000001 - id_delete
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 69000009
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(69000009)
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 69000009
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.580: id_manager.c-ID-MGR: Got new ID 76000018 - id_get
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = 76000018)
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26
*EAP_Framework_0: Apr 21 10:13:01.580: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000)
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start
*EAP_Framework_0: Apr 21 10:13:01.580: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start
*EAP_Framework_0: Apr 21 10:13:01.580: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:01.580: eap_fast.c:151: Version: 1  Flags:S  Length:0x0014
*EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1478:     Payload:  00040010436973636F00000000000000 ...
*EAP_Framework_0: Apr 21 10:13:01.580: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.580: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1541: Code:REQUEST  ID:0x 3  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.581: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:01.581: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.581: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:01.581: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.596: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x017e  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1478:     Payload:  0116030101730100016F0303C712735E ...
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.596: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x017e  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1478:     Payload:  0116030101730100016F0303C712735E ...
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start
*EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake
*EAP_Framework_0: Apr 21 10:13:01.596: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:01.596: eap_fast.c:292: Content:Handshake  Version:0301  Length:0x0173
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478:     Payload:  0100016F0303C712735E917FB09B162D ...
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:239: Handshake type:Client Hello  Length:0x016F
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478:     Payload:  0303C712735E917FB09B162DFCD68570 ...
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:292: Content:Alert  Version:0301  Length:0x0002
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478:     Payload:  020A
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200)
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:151: Version: 1  Flags:L  Length:0x0007
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478:     Payload:  1503010002020A
*EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.597: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1541: Code:REQUEST  ID:0x 4  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b)
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.605: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (69000009) (status 4)
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 69000009)
*EAP_Framework_0: Apr 21 10:13:01.605: id_manager.c-ID-MGR: Entry deleted fine id 76000018 - id_delete
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (69000009) from lower layer
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 69000009
*EAP_Framework_0: Apr 21 10:13:01.605: id_manager.c-ID-MGR: Entry deleted fine id 69000009 - id_delete
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context
*EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context



*aaaQueueReader: Apr 21 10:13:05.805: id_manager.c-ID-MGR: Got new ID c000000a - id_get
*aaaQueueReader: Apr 21 10:13:05.805: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL
*aaaQueueReader: Apr 21 10:13:05.805: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL
*aaaQueueReader: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)'
*aaaQueueReader: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = c000000a)
*aaaQueueReader: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3643)
*EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.806: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.806: eap_core.c:1541: Code:RESPONSE  ID:0x 1  Length:0x000c  Type:IDENTITY
*EAP_Framework_0: Apr 21 10:13:05.806: eap_core.c:1478:     Payload:  38383231666C6F
*EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a
*EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity
*EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo
*EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (c000000a)
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context c000000a
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.808: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.808: id_manager.c-ID-MGR: Got new ID f0000002 - id_get
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = f0000002)
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.810: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.810: eap_core.c:1541: Code:REQUEST  ID:0x 2  Length:0x0006  Type:PEAP
*EAP_Framework_0: Apr 21 10:13:05.810: eap_core.c:1478:     Payload:  21
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.814: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.814: eap_core.c:1541: Code:RESPONSE  ID:0x 2  Length:0x0006  Type:NAK
*EAP_Framework_0: Apr 21 10:13:05.814: eap_core.c:1478:     Payload:  2B
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1)
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.815: id_manager.c-ID-MGR: Entry deleted fine id f0000002 - id_delete
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = c000000a
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(c000000a)
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context c000000a
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.815: id_manager.c-ID-MGR: Got new ID 64000019 - id_get
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = 64000019)
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26
*EAP_Framework_0: Apr 21 10:13:05.815: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000)
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start
*EAP_Framework_0: Apr 21 10:13:05.815: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start
*EAP_Framework_0: Apr 21 10:13:05.815: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:05.815: eap_fast.c:151: Version: 1  Flags:S  Length:0x0014
*EAP_Framework_0: Apr 21 10:13:05.815: eap_core.c:1478:     Payload:  00040010436973636F00000000000000 ...
*EAP_Framework_0: Apr 21 10:13:05.815: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:05.815: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.815: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.815: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.816: eap_core.c:1541: Code:REQUEST  ID:0x 3  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.816: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:05.816: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.816: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:05.816: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.820: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.820: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x017e  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.820: eap_core.c:1478:     Payload:  0116030101730100016F0303820B0869 ...
*EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a
*EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x017e  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  0116030101730100016F0303820B0869 ...
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:292: Content:Handshake  Version:0301  Length:0x0173
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  0100016F0303820B0869EDF4C9630217 ...
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:239: Handshake type:Client Hello  Length:0x016F
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  0303820B0869EDF4C96302175DA1341E ...
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:292: Content:Alert  Version:0301  Length:0x0002
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  020A
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200)
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:151: Version: 1  Flags:L  Length:0x0007
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  1503010002020A
*EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.821: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1541: Code:REQUEST  ID:0x 4  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.827: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.827: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:05.827: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.827: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:05.827: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b)
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.828: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:05.828: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:05.828: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (c000000a) (status 4)
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = c000000a)
*EAP_Framework_0: Apr 21 10:13:05.828: id_manager.c-ID-MGR: Entry deleted fine id 64000019 - id_delete
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (c000000a) from lower layer
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle c000000a
*EAP_Framework_0: Apr 21 10:13:05.828: id_manager.c-ID-MGR: Entry deleted fine id c000000a - id_delete
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context
*EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context
*aaaQueueReader: Apr 21 10:13:10.049: id_manager.c-ID-MGR: Got new ID 3500000b - id_get
*aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL
*aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL
*aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)'
*aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 3500000b)
*aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3644)
*EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.050: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.050: eap_core.c:1541: Code:RESPONSE  ID:0x 1  Length:0x000c  Type:IDENTITY
*EAP_Framework_0: Apr 21 10:13:10.050: eap_core.c:1478:     Payload:  38383231666C6F
*EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity
*EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo
*EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
*EAP_Framework_0: Apr 21 10:13:10.051: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (3500000b)
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.052: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.052: id_manager.c-ID-MGR: Got new ID ef000003 - id_get
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = ef000003)
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25
*EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.054: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.054: eap_core.c:1541: Code:REQUEST  ID:0x 2  Length:0x0006  Type:PEAP
*EAP_Framework_0: Apr 21 10:13:10.054: eap_core.c:1478:     Payload:  21
*EAP_Framework_0: Apr 21 10:13:10.054: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.054: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:10.054: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.058: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.058: eap_core.c:1541: Code:RESPONSE  ID:0x 2  Length:0x0006  Type:NAK
*EAP_Framework_0: Apr 21 10:13:10.058: eap_core.c:1478:     Payload:  2B
*EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1)
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.059: id_manager.c-ID-MGR: Entry deleted fine id ef000003 - id_delete
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3500000b
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(3500000b)
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.059: id_manager.c-ID-MGR: Got new ID f900001a - id_get
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = f900001a)
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26
*EAP_Framework_0: Apr 21 10:13:10.059: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000)
*EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start
*EAP_Framework_0: Apr 21 10:13:10.059: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start
*EAP_Framework_0: Apr 21 10:13:10.059: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:10.059: eap_fast.c:151: Version: 1  Flags:S  Length:0x0014
*EAP_Framework_0: Apr 21 10:13:10.059: eap_core.c:1478:     Payload:  00040010436973636F00000000000000 ...
*EAP_Framework_0: Apr 21 10:13:10.059: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:10.059: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.060: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.060: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.060: eap_core.c:1541: Code:REQUEST  ID:0x 3  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.060: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.065: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.065: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.065: eap_core.c:1478:     Payload:  01160301005501000051030351CED7B1 ...
*EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  01160301005501000051030351CED7B1 ...
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:292: Content:Handshake  Version:0301  Length:0x0055
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  01000051030351CED7B13FA6E9B0E3AB ...
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:239: Handshake type:Client Hello  Length:0x0051
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  030351CED7B13FA6E9B0E3AB3A5D6187 ...
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:292: Content:Alert  Version:0301  Length:0x0002
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  020A
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200)
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:151: Version: 1  Flags:L  Length:0x0007
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  1503010002020A
*EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.066: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1541: Code:REQUEST  ID:0x 4  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b)
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.071: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (3500000b) (status 4)
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 3500000b)
*EAP_Framework_0: Apr 21 10:13:10.071: id_manager.c-ID-MGR: Entry deleted fine id f900001a - id_delete
*EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (3500000b) from lower layer
*EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 3500000b
*EAP_Framework_0: Apr 21 10:13:10.072: id_manager.c-ID-MGR: Entry deleted fine id 3500000b - id_delete
*EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context
*EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context
*aaaQueueReader: Apr 21 10:13:14.348: id_manager.c-ID-MGR: Got new ID 3600000c - id_get
*aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL
*aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL
*aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)'
*aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 3600000c)
*aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3645)
*EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.349: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.349: eap_core.c:1541: Code:RESPONSE  ID:0x 1  Length:0x000c  Type:IDENTITY
*EAP_Framework_0: Apr 21 10:13:14.349: eap_core.c:1478:     Payload:  38383231666C6F
*EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity
*EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo
*EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (3600000c)
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.351: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.351: id_manager.c-ID-MGR: Got new ID e8000004 - id_get
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = e8000004)
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.354: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.354: eap_core.c:1541: Code:REQUEST  ID:0x 2  Length:0x0006  Type:PEAP
*EAP_Framework_0: Apr 21 10:13:14.354: eap_core.c:1478:     Payload:  21
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.358: eap_core.c:1541: Code:RESPONSE  ID:0x 2  Length:0x0006  Type:NAK
*EAP_Framework_0: Apr 21 10:13:14.358: eap_core.c:1478:     Payload:  2B
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1)
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.358: id_manager.c-ID-MGR: Entry deleted fine id e8000004 - id_delete
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(3600000c)
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.358: id_manager.c-ID-MGR: Got new ID d500001b - id_get
*EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = d500001b)
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26
*EAP_Framework_0: Apr 21 10:13:14.359: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000)
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start
*EAP_Framework_0: Apr 21 10:13:14.359: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start
*EAP_Framework_0: Apr 21 10:13:14.359: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:14.359: eap_fast.c:151: Version: 1  Flags:S  Length:0x0014
*EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1478:     Payload:  00040010436973636F00000000000000 ...
*EAP_Framework_0: Apr 21 10:13:14.359: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.359: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1541: Code:REQUEST  ID:0x 3  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.364: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  01160301005501000051030394AB39C0 ...
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  01160301005501000051030394AB39C0 ...
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:292: Content:Handshake  Version:0301  Length:0x0055
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  01000051030394AB39C0F1B132A9E451 ...
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:239: Handshake type:Client Hello  Length:0x0051
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  030394AB39C0F1B132A9E451CC61B4F5 ...
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:292: Content:Alert  Version:0301  Length:0x0002
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  020A
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200)
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:151: Version: 1  Flags:L  Length:0x0007
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  1503010002020A
*EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.365: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.365: eap_core.c:1541: Code:REQUEST  ID:0x 4  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.365: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b)
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.369: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (3600000c) (status 4)
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 3600000c)
*EAP_Framework_0: Apr 21 10:13:14.369: id_manager.c-ID-MGR: Entry deleted fine id d500001b - id_delete
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (3600000c) from lower layer
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 3600000c
*EAP_Framework_0: Apr 21 10:13:14.369: id_manager.c-ID-MGR: Entry deleted fine id 3600000c - id_delete
*EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context
*EAP_Framework_0: Apr 21 10:13:14.370: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context
*aaaQueueReader: Apr 21 10:13:18.651: id_manager.c-ID-MGR: Got new ID 3700000d - id_get
*aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL
*aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL
*aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)'
*aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 3700000d)
*aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3646)
*EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.652: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.652: eap_core.c:1541: Code:RESPONSE  ID:0x 1  Length:0x000c  Type:IDENTITY
*EAP_Framework_0: Apr 21 10:13:18.652: eap_core.c:1478:     Payload:  38383231666C6F
*EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity
*EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo
*EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (3700000d)
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.653: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.653: id_manager.c-ID-MGR: Got new ID 13000005 - id_get
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = 13000005)
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.655: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.655: eap_core.c:1541: Code:REQUEST  ID:0x 2  Length:0x0006  Type:PEAP
*EAP_Framework_0: Apr 21 10:13:18.655: eap_core.c:1478:     Payload:  21
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.660: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.660: eap_core.c:1541: Code:RESPONSE  ID:0x 2  Length:0x0006  Type:NAK
*EAP_Framework_0: Apr 21 10:13:18.660: eap_core.c:1478:     Payload:  2B
*EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1)
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.661: id_manager.c-ID-MGR: Entry deleted fine id 13000005 - id_delete
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3700000d
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(3700000d)
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.661: id_manager.c-ID-MGR: Got new ID d300001c - id_get
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = d300001c)
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26
*EAP_Framework_0: Apr 21 10:13:18.661: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000)
*EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start
*EAP_Framework_0: Apr 21 10:13:18.661: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start
*EAP_Framework_0: Apr 21 10:13:18.661: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:18.661: eap_fast.c:151: Version: 1  Flags:S  Length:0x0014
*EAP_Framework_0: Apr 21 10:13:18.661: eap_core.c:1478:     Payload:  00040010436973636F00000000000000 ...
*EAP_Framework_0: Apr 21 10:13:18.661: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:18.661: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.662: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.662: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.662: eap_core.c:1541: Code:REQUEST  ID:0x 3  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.662: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.669: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478:     Payload:  0116030100550100005103031BF57B98 ...
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.669: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478:     Payload:  0116030100550100005103031BF57B98 ...
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake
*EAP_Framework_0: Apr 21 10:13:18.669: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:18.669: eap_fast.c:292: Content:Handshake  Version:0301  Length:0x0055
*EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478:     Payload:  0100005103031BF57B9870BBD22626DC ...
*EAP_Framework_0: Apr 21 10:13:18.669: eap_fast.c:239: Handshake type:Client Hello  Length:0x0051
*EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478:     Payload:  03031BF57B9870BBD22626DC9B286E95 ...
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
*EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17
*EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:292: Content:Alert  Version:0301  Length:0x0002
*EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478:     Payload:  020A
*EAP_Framework_0: Apr 21 10:13:18.670: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200)
*EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:151: Version: 1  Flags:L  Length:0x0007
*EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478:     Payload:  1503010002020A
*EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.670: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1541: Code:REQUEST  ID:0x 4  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b)
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.675: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (3700000d) (status 4)
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 3700000d)
*EAP_Framework_0: Apr 21 10:13:18.675: id_manager.c-ID-MGR: Entry deleted fine id d300001c - id_delete
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (3700000d) from lower layer
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 3700000d
*EAP_Framework_0: Apr 21 10:13:18.675: id_manager.c-ID-MGR: Entry deleted fine id 3700000d - id_delete
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context
*EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context
*aaaQueueReader: Apr 21 10:13:22.952: id_manager.c-ID-MGR: Got new ID 9a00000e - id_get
*aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL
*aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL
*aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)'
*aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 9a00000e)
*aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3647)
*EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.953: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.953: eap_core.c:1541: Code:RESPONSE  ID:0x 1  Length:0x000c  Type:IDENTITY
*EAP_Framework_0: Apr 21 10:13:22.953: eap_core.c:1478:     Payload:  38383231666C6F
*EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity
*EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo
*EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.955: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.955: id_manager.c-ID-MGR: Got new ID 48000006 - id_get
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = 48000006)
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.957: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.957: eap_core.c:1541: Code:REQUEST  ID:0x 2  Length:0x0006  Type:PEAP
*EAP_Framework_0: Apr 21 10:13:22.957: eap_core.c:1478:     Payload:  21
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.962: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.962: eap_core.c:1541: Code:RESPONSE  ID:0x 2  Length:0x0006  Type:NAK
*EAP_Framework_0: Apr 21 10:13:22.962: eap_core.c:1478:     Payload:  2B
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1)
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.962: id_manager.c-ID-MGR: Entry deleted fine id 48000006 - id_delete
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96

*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.963: id_manager.c-ID-MGR: Got new ID 9000001d - id_get
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = 9000001d)
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26
*EAP_Framework_0: Apr 21 10:13:22.963: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000)
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start
*EAP_Framework_0: Apr 21 10:13:22.963: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start
*EAP_Framework_0: Apr 21 10:13:22.963: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:22.963: eap_fast.c:151: Version: 1  Flags:S  Length:0x0014
*EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1478:     Payload:  00040010436973636F00000000000000 ...
*EAP_Framework_0: Apr 21 10:13:22.963: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.963: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1541: Code:REQUEST  ID:0x 3  Length:0x001a  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1478:     Payload:  2100040010436973636F000000000000 ...
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.969: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  01160301005501000051030358E880B5 ...
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1541: Code:RESPONSE  ID:0x 3  Length:0x0060  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  01160301005501000051030358E880B5 ...
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:292: Content:Handshake  Version:0301  Length:0x0055
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  01000051030358E880B54BA8AE3A7EE4 ...
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:239: Handshake type:Client Hello  Length:0x0051
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  030358E880B54BA8AE3A7EE46DC92725 ...
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD:
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:292: Content:Alert  Version:0301  Length:0x0002
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  020A
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200)
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:2490: eap-fast tx packet:
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:151: Version: 1  Flags:L  Length:0x0007
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  1503010002020A
*EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c-TX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1541: Code:REQUEST  ID:0x 0  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue
*EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43
*EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.970: EAP-AUTH-TX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.970: eap_core.c:1541: Code:REQUEST  ID:0x 4  Length:0x0011  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.970: eap_core.c:1478:     Payload:  81000000071503010002020A
*EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer
*EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: EAP-AUTH-RX-PAK:
*EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43)
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b)
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.974: eap_fast_auth.c-RX-AUTH-PAK:
*EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1541: Code:RESPONSE  ID:0x 4  Length:0x0006  Type:FAST
*EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1478:     Payload:  01
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (9a00000e) (status 4)
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 9a00000e)
*EAP_Framework_0: Apr 21 10:13:22.974: id_manager.c-ID-MGR: Entry deleted fine id 9000001d - id_delete
*EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.975: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (9a00000e) from lower layer
*EAP_Framework_0: Apr 21 10:13:22.975: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 9a00000e
*EAP_Framework_0: Apr 21 10:13:22.975: id_manager.c-ID-MGR: Entry deleted fine id 9a00000e - id_delete
*EAP_Framework_0: Apr 21 10:13:22.975: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context

 

 

I think this is the "magic" line, who tells the problem:

eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 

 

 

TLS 1.0 (0x0301)

TLS 1.2 (0x0303)

 

How to activate TLS 1.2 for the wlc ?