04-16-2020 11:47 AM
Hello,
I've upgraded a Cisco 8821 to the new Firmware "11.0(5)SR3".
Sience this FW-Version, the phone does not connect to WLAN.
WLAN Security ist EAP-FAST with Local EAP Users on Cisco 2504.
With older Firmware on Cisco 8821 WLAN Phone, there were no issues, like this.
I use Cisco 3802 Access Points with Cisco 2504 WLC on Software Version 8.5.161.0.
Phone says in "Status messages" Ethernet Disconnected.
On WLC I see that the device is connecting but with no ip (0.0.0.0).
What can I do ?
04-16-2020 03:11 PM - edited 04-16-2020 04:13 PM
Let us start with a debug of the MAC address of the phone when attempting to join the SSID.
In the WLC CLI, log the output to the command "debug client <MAC ADDRESS>".
NOTE: Unfortunately, the documentation has not yet caught up. I am unable to find any Release Notes to "11.0(5)SR3".
04-16-2020 11:51 PM - edited 04-16-2020 11:51 PM
Here is the client Debug:
(Cisco Controller) >debug client f8:a5:c5:9f:43:96 (Cisco Controller) >*apfOpenDtlSocket: Apr 17 08:50:04.815: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0 *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_1: Apr 17 08:50:04.817: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 apf_policy.c:2454 Assigning the SGT 0 to mobile (earlier sgt 0) *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_1: Apr 17 08:50:04.818: RSNIE in Assoc. Req.: (20) *apfMsConnTask_1: Apr 17 08:50:04.818: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_1: Apr 17 08:50:04.818: [0016] ac 03 00 00 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Allocate AID 4 slot 1 on AP SK-Buero #clients on this slot 3 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_1: Apr 17 08:50:04.818: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfMsAssoStateInc *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Idle to Associated *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_1: Apr 17 08:50:04.819: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:04.820: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 74, seqno 207, action 1, count 207, last count 0) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 207 expected 207 action = 1 *spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 74) *spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask0: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 1, msg 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 1 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:47 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 Station f8:a5:c5:9f:43:96 setting dot1x reauth timeout = 86400 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.822: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.823: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.840: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.841: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.851: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.852: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:09.120: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_0: Apr 17 08:50:09.121: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_0: Apr 17 08:50:09.122: RSNIE in Assoc. Req.: (20) *apfMsConnTask_0: Apr 17 08:50:09.122: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Apr 17 08:50:09.122: [0016] ac 03 00 00 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40] *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Succesfully freed AID 4, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac: 78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 Allocate AID 6 slot 1 on AP SK-Kueche #clients on this slot 3 *apfMsConnTask_0: Apr 17 08:50:09.122: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Initializing policy *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3) *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_0: Apr 17 08:50:09.123: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *spamApTask0: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 75, seqno 208, action 6, count 208, last count 0) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248 *spamApTask1: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask1: Apr 17 08:50:09.127: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:09.128: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 97, seqno 74, action 1, count 74, last count 207) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask0: Apr 17 08:50:09.130: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 208 expected 208 action = 6 *spamApTask0: Apr 17 08:50:09.130: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 74 expected 74 action = 1 *spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 97) *spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask1: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 2, msg 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 reauth_sm state transition 1 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.131: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.144: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.146: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.148: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.149: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.153: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.154: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.156: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:09.157: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:13.421: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 ssid : HANIG.VOICE thread:1b82f198 *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_1: Apr 17 08:50:13.422: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_1: Apr 17 08:50:13.423: RSNIE in Assoc. Req.: (20) *apfMsConnTask_1: Apr 17 08:50:13.423: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_1: Apr 17 08:50:13.423: [0016] ac 03 00 00 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [70:0f:6a:8d:f8:c0] *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Succesfully freed AID 6, slot 1 on AP 70:0f:6a:8d:f8:c0, #client on this slot 2 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 78:72:5D:1E:18:40 New ctxOwnerApEthMac: 70:79:B3:17:4E:6C New ctxOwnerApSlotId: 1 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Updated location for station old AP 70:0f:6a:8d:f8:c0 oldSlot 1, new AP 78:72:5d:1e:18:40 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 Allocate AID 5 slot 1 on AP SK-Buero #clients on this slot 3 *apfMsConnTask_1: Apr 17 08:50:13.423: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Initializing policy *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3) *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_1: Apr 17 08:50:13.424: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *spamApTask1: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 98, seqno 75, action 6, count 75, last count 0) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 70:0f:6a:8d:f8:c0 IP: 10.2.99.246:5248 *spamApTask0: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:13.427: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask0: Apr 17 08:50:13.428: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:13.428: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 76, seqno 209, action 1, count 209, last count 74) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask1: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 75 expected 75 action = 6 *spamApTask1: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 209 expected 209 action = 1 *spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 76) *spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask0: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 3, msg 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.431: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.441: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.443: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.447: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.448: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.451: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.453: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 84) in 1 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 9) in 10 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:13.454: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98 *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_0: Apr 17 08:50:17.716: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_0: Apr 17 08:50:17.717: RSNIE in Assoc. Req.: (20) *apfMsConnTask_0: Apr 17 08:50:17.717: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Apr 17 08:50:17.717: [0016] ac 03 00 00 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_0: Apr 17 08:50:17.717: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40] *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Succesfully freed AID 5, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac: 78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Allocate AID 7 slot 1 on AP SK-Kueche #clients on this slot 3 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_0: Apr 17 08:50:17.718: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_0: Apr 17 08:50:17.719: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *spamApTask0: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 77, seqno 210, action 6, count 210, last count 0) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248 *spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:17.720: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 99, seqno 76, action 1, count 76, last count 209) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask0: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 210 expected 210 action = 6 *spamApTask0: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 76 expected 76 action = 1 *spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 99) *spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask1: Apr 17 08:50:17.724: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 4, msg 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.725: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.740: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.742: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.744: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.745: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.748: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.749: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.751: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 84) in 1 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 9) in 10 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:17.752: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e *apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 ssid : HANIG.VOICE thread:1b82f198 *apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero *apfMsConnTask_1: Apr 17 08:50:22.015: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_1: Apr 17 08:50:22.016: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_1: Apr 17 08:50:22.017: RSNIE in Assoc. Req.: (20) *apfMsConnTask_1: Apr 17 08:50:22.017: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_1: Apr 17 08:50:22.017: [0016] ac 03 00 00 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [70:0f:6a:8d:f8:c0] *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Succesfully freed AID 7, slot 1 on AP 70:0f:6a:8d:f8:c0, #client on this slot 2 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 78:72:5D:1E:18:40 New ctxOwnerApEthMac: 70:79:B3:17:4E:6C New ctxOwnerApSlotId: 1 *apfMsConnTask_1: Apr 17 08:50:22.017: f8:a5:c5:9f:43:96 Updated location for station old AP 70:0f:6a:8d:f8:c0 oldSlot 1, new AP 78:72:5d:1e:18:40 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Allocate AID 4 slot 1 on AP SK-Buero #clients on this slot 3 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_1: Apr 17 08:50:22.018: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_1: Apr 17 08:50:22.019: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *spamApTask1: Apr 17 08:50:22.021: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 0, seqno 77, action 6, count 77, last count 0) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 70:0f:6a:8d:f8:c0 IP: 10.2.99.246:5248 *spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:22.022: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 78, seqno 211, action 1, count 211, last count 76) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask1: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 77 expected 77 action = 6 *spamApTask1: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 211 expected 211 action = 1 *spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 78) *spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask0: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 5, msg 5) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.025: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.039: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.042: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.045: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.046: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.049: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.050: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.052: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 84) in 1 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 9) in 10 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:22.053: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98 *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Apr 17 08:50:26.317: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_0: Apr 17 08:50:26.318: RSNIE in Assoc. Req.: (20) *apfMsConnTask_0: Apr 17 08:50:26.318: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Apr 17 08:50:26.318: [0016] ac 03 00 00 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_0: Apr 17 08:50:26.318: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40] *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Succesfully freed AID 4, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac: 78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Allocate AID 6 slot 1 on AP SK-Kueche #clients on this slot 3 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Apr 17 08:50:26.319: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2 *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_0: Apr 17 08:50:26.320: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *spamApTask0: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 79, seqno 212, action 6, count 212, last count 0) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248 *spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:26.323: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 1, seqno 78, action 1, count 78, last count 211) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask0: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 212 expected 212 action = 6 *spamApTask0: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 78 expected 78 action = 1 *spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 1) *spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask1: Apr 17 08:50:26.325: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 6, msg 6) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.326: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.340: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.342: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.345: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.346: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.351: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.351: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.352: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.356: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 84) in 1 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 9) in 10 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:26.357: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:30.614: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 78:72:5d:1e:18:4e destination addr 78:72:5d:1e:18:4e *apfMsConnTask_1: Apr 17 08:50:30.614: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 ssid : HANIG.VOICE thread:1b82f198 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 78:72:5d:1e:18:4e AP SK-Buero *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 78:72:5D:1E:18:40 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_1: Apr 17 08:50:30.615: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_1: Apr 17 08:50:30.616: RSNIE in Assoc. Req.: (20) *apfMsConnTask_1: Apr 17 08:50:30.616: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_1: Apr 17 08:50:30.616: [0016] ac 03 00 00 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [70:0f:6a:8d:f8:c0] *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Succesfully freed AID 6, slot 1 on AP 70:0f:6a:8d:f8:c0, #client on this slot 2 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 78:72:5D:1E:18:40 New ctxOwnerApEthMac: 70:79:B3:17:4E:6C New ctxOwnerApSlotId: 1 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Updated location for station old AP 70:0f:6a:8d:f8:c0 oldSlot 1, new AP 78:72:5d:1e:18:40 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Allocate AID 5 slot 1 on AP SK-Buero #clients on this slot 3 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_1: Apr 17 08:50:30.616: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:78:72:5d:1e:18:40-01 on apVapId 2 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Buero on BSSID 78:72:5d:1e:18:4e ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_1: Apr 17 08:50:30.617: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 78:72:5d:1e:18:40 from Associated to Associated *spamApTask1: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 2, seqno 79, action 6, count 79, last count 0) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 70:0f:6a:8d:f8:c0 IP: 10.2.99.246:5248 *spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Add SGT:0 to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:30.620: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 80, seqno 213, action 1, count 213, last count 78) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask1: Apr 17 08:50:30.623: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 79 expected 79 action = 6 *spamApTask1: Apr 17 08:50:30.623: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask0: Apr 17 08:50:30.623: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 213 expected 213 action = 1 *spamApTask0: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 80) *spamApTask0: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask0: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 7, msg 7) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.624: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.637: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.639: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.642: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.643: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.643: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.646: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.647: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.649: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 84) in 1 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 9) in 10 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:30.650: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state *apfOpenDtlSocket: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Received management frame ASSOCIATION REQUEST on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce *apfMsConnTask_0: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Processing assoc-req station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 ssid : HANIG.VOICE thread:1b82ed98 *apfMsConnTask_0: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:34.817: f8:a5:c5:9f:43:96 Client AVC Roaming context transfer needed? NO *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Setting RTTS enabled to 0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Association received from mobile on BSSID 70:0f:6a:8d:f8:ce AP SK-Kueche *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Station: F8:A5:C5:9F:43:96 11v BSS Transition not enabled on the AP 70:0F:6A:8D:F8:C0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Max Client Trap Threshold: 0 cur: 2 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 override for default ap group, marking intgrp NULL *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Applying Interface(we_voice) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 20 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Re-applying interface policy for client *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:WERNE-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Check before Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Setting the NAS Id to WLAN specific Id 'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Applying site-specific Local Bridging override for station f8:a5:c5:9f:43:96 - vapId 2, site 'default-group', interface 'we_voice' *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Applying Local Bridging Interface Policy for station f8:a5:c5:9f:43:96 - vlan 20, interface id 12, interface 'we_voice', nasId:'WERNE-WLC' *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 STA - rates (8): 140 18 24 36 48 72 96 108 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Apr 17 08:50:34.818: f8:a5:c5:9f:43:96 Marking this mobile as TGr capable. *apfMsConnTask_0: Apr 17 08:50:34.819: RSNIE in Assoc. Req.: (20) *apfMsConnTask_0: Apr 17 08:50:34.819: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Apr 17 08:50:34.819: [0016] ac 03 00 00 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Processing RSN IE type 48, length 20 for mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 RSN Capabilities: 0 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 non-11w Capable mobile *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Received RSN IE with 0 PMKIDs from mobile f8:a5:c5:9f:43:96 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 the value of url acl preserve flag is 1 for mobile f8:a5:c5:9f:43:96 (caller pem_api.c:4931) *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40] *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Succesfully freed AID 5, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac: 78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 0 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Allocate AID 7 slot 1 on AP SK-Kueche #clients on this slot 3 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Initializing policy *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 apfVapSecurity=0x4000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 AuthenticationRequired = 1 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Encryption policy is set to 0x80000001 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Not Using WMM Compliance code qosCap 0f *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 Vlan while overriding the policy = -1 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 2 apVapId 2 flex-acl-name: *apfMsConnTask_0: Apr 17 08:50:34.819: f8:a5:c5:9f:43:96 apfPemAddUser2 (apf_policy.c:438) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 apfPemAddUser2:session timeout forstation f8:a5:c5:9f:43:96 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending assoc-resp with status 0 station:f8:a5:c5:9f:43:96 AP:70:0f:6a:8d:f8:c0-01 on apVapId 2 *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 VHT Operation IE: width 80/1 ch 100 freq0 106 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending R1KH-ID as 00:a2:89:b8:b9:00 *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending R0KH-ID as:10.2.99.250 *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Including FT IE (length 98) in Initial Assoc Resp to mobile *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Clearing the existing FT session data for mobile as we received a fresh Association. *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 0 *apfMsConnTask_0: Apr 17 08:50:34.820: f8:a5:c5:9f:43:96 apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile f8:a5:c5:9f:43:96 on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *spamApTask0: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 81, seqno 214, action 6, count 214, last count 0) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5248 *spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Add SGT:0 to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Apr 17 08:50:34.823: f8:a5:c5:9f:43:96 Setting ADD_MOBILE (idx 3, seqno 80, action 1, count 80, last count 213) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask0: Apr 17 08:50:34.825: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 214 expected 214 action = 6 *spamApTask0: Apr 17 08:50:34.825: f8:a5:c5:9f:43:96 apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Received add/del ack packet with sequence number: got 80 expected 80 action = 1 *spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Received ADD_MOBILE ack - Initiating 1x to STA f8:a5:c5:9f:43:96 (idx 3) *spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 APF Initiating 1x to STA f8:a5:c5:9f:43:96 *spamApTask1: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Sent dot1x auth initiate message for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 dot1xProcessInitiate1XtoMobile to mobile station f8:a5:c5:9f:43:96 (mscb 8, msg 8) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 reauth_sm state transition 0 ---> 0 for mobile f8:a5:c5:9f:43:96 at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Connecting state *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.828: f8:a5:c5:9f:43:96 Sending EAP-Request/Identity to mobile f8:a5:c5:9f:43:96 (EAP Id 1) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Received Identity Response (count=1) from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Resetting reauth count 1 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 EAP State update from Connecting to Authenticating for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Authenticating state *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.840: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=2) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 2) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.842: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 2, EAP Type 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.844: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=3) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.845: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 3, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.848: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Processing Access-Challenge for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Entering Backend Auth Req state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Sending EAP Request from AAA to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.849: f8:a5:c5:9f:43:96 Reusing allocated memory for EAP Pkt for retransmission to mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Received EAPOL EAPPKT from mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Received EAP Response from mobile f8:a5:c5:9f:43:96 (EAP Id 4, EAP Type 43) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Resetting reauth count 0 to 0 for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Entering Backend Auth Response state for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.851: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 84) in 1 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 0.0.0.0 8021X_REQD (3) Change state to START (0) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 0.0.0.0 START (0) Reached FAILURE: from line 6070 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Scheduling deletion of Mobile Station: (callerId: 9) in 10 seconds *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Max AAA failure for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 Setting quiet timer for 5 seconds for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:34.852: f8:a5:c5:9f:43:96 dot1x - moving mobile f8:a5:c5:9f:43:96 into Unknown state
04-17-2020 02:46 AM
*Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Processing Access-Reject for mobile f8:a5:c5:9f:43:96 *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 0 PMK-remove groupcast messages sent *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.859: f8:a5:c5:9f:43:96 Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Removing PMK cache due to EAP-Failure for mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Sending EAP-Failure to mobile f8:a5:c5:9f:43:96 (EAP Id 4) *Dot1x_NW_MsgTask_6: Apr 17 08:50:04.860: f8:a5:c5:9f:43:96 Entering Backend Auth Failure state (id=4) for mobile f8:a5:c5:9f:43:96
What happens if you enable OPEN authentication?
04-17-2020 03:08 AM - edited 04-17-2020 04:10 AM
Open Auth, or PSK Auth works...
EDIT:
The last Version it works for me is "11.0(4)SR3".
All other FW-Versions over it, like 11.0.(5)XXX do not work with EAP-FAST for me...
Can it be:
CSCvi80433
??
04-17-2020 04:32 AM
04-18-2020 01:45 AM
I use the local net user (Local EAP) on my WLC 2504.
The WLC ist the authentication server.
I don't know how to check this.
04-18-2020 07:18 AM
04-20-2020 12:18 AM
This is not very helpful.
It's recommended to use EAP-FAST for 8821 Phone, so I want to use it.
And in previous versions it works as well.
04-20-2020 12:36 AM - edited 04-20-2020 12:49 AM
@florian.hanig1 wrote:
It's recommended to use EAP-FAST for 8821 Phone
Nowhere in the recommendation says to use the WLC as the authentication server.
Get, for example, a cheap Raspberry Pi and use that as the authentication server.
04-20-2020 01:03 AM
I am not going to have any discussion about the usefulness for 5 users to set up an external authentication server.
The WLC offers the feature of Local Users für EAP-FAST, so it must also work.
04-20-2020 02:25 AM
04-20-2020 09:03 AM - edited 04-20-2020 10:09 AM
Which 8821 firmware version did you upgrade from that last worked?
Did you also upgrade the WLC 2500 version recently?
Also curious if PEAP works for you or not.
04-20-2020 09:18 AM - edited 04-20-2020 10:15 AM
TLS 1.2 for WLAN authentication was added in 11.0(5) for 8821 phones.
And 8821 supports the latest ciphers would shouldn’t be an issue there.
Suggest to open a support case with Cisco TAC for further troubleshooting.
04-21-2020 01:15 AM - edited 04-21-2020 01:28 AM
So I've run the following command on my WLC to troubleshoot the local-EAP Authentication...:
debug aaa local-auth eap framework all enable debug aaa local-auth eap method all enable
(Cisco Controller) >debug aaa local-auth eap framework all enable (Cisco Controller) >debug aaa local-auth eap method all enable (Cisco Controller) > (Cisco Controller) >*aaaQueueReader: Apr 21 10:13:01.568: id_manager.c-ID-MGR: Got new ID 69000009 - id_get *EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.570: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:01.570: eap_core.c:1541: Code:RESPONSE ID:0x 1 Length:0x000c Type:IDENTITY *EAP_Framework_0: Apr 21 10:13:01.570: eap_core.c:1478: Payload: 38383231666C6F *EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009 *EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity *EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo *EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.570: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL *EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (69000009) *EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 69000009 *EAP_Framework_0: Apr 21 10:13:01.571: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.571: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.572: id_manager.c-ID-MGR: Got new ID f000001 - id_get *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = f000001) *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1 *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.572: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25 *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.573: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:01.573: eap_core.c:1541: Code:REQUEST ID:0x 2 Length:0x0006 Type:PEAP *EAP_Framework_0: Apr 21 10:13:01.573: eap_core.c:1478: Payload: 21 *EAP_Framework_0: Apr 21 10:13:01.573: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.574: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:01.574: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.579: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:01.579: eap_core.c:1541: Code:RESPONSE ID:0x 2 Length:0x0006 Type:NAK *EAP_Framework_0: Apr 21 10:13:01.579: eap_core.c:1478: Payload: 2B *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009 *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43 *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1) *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.579: id_manager.c-ID-MGR: Entry deleted fine id f000001 - id_delete *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.579: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 69000009 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(69000009) *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 69000009 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.580: id_manager.c-ID-MGR: Got new ID 76000018 - id_get *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = 76000018) *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26 *EAP_Framework_0: Apr 21 10:13:01.580: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000) *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start *EAP_Framework_0: Apr 21 10:13:01.580: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start *EAP_Framework_0: Apr 21 10:13:01.580: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:01.580: eap_fast.c:151: Version: 1 Flags:S Length:0x0014 *EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1478: Payload: 00040010436973636F00000000000000 ... *EAP_Framework_0: Apr 21 10:13:01.580: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:01.580: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.580: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:01.580: eap_core.c:1541: Code:REQUEST ID:0x 3 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:01.581: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:01.581: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.581: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:01.581: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.596: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x017e Type:FAST *EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1478: Payload: 0116030101730100016F0303C712735E ... *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009 *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.596: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x017e Type:FAST *EAP_Framework_0: Apr 21 10:13:01.596: eap_core.c:1478: Payload: 0116030101730100016F0303C712735E ... *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start *EAP_Framework_0: Apr 21 10:13:01.596: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake *EAP_Framework_0: Apr 21 10:13:01.596: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:01.596: eap_fast.c:292: Content:Handshake Version:0301 Length:0x0173 *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478: Payload: 0100016F0303C712735E917FB09B162D ... *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:239: Handshake type:Client Hello Length:0x016F *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478: Payload: 0303C712735E917FB09B162DFCD68570 ... *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17 *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:292: Content:Alert Version:0301 Length:0x0002 *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478: Payload: 020A *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200) *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c:151: Version: 1 Flags:L Length:0x0007 *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478: Payload: 1503010002020A *EAP_Framework_0: Apr 21 10:13:01.597: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.597: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1541: Code:REQUEST ID:0x 4 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:01.597: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:01.597: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b) *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.605: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:01.605: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (69000009) (status 4) *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 69000009) *EAP_Framework_0: Apr 21 10:13:01.605: id_manager.c-ID-MGR: Entry deleted fine id 76000018 - id_delete *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (69000009) from lower layer *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 69000009 *EAP_Framework_0: Apr 21 10:13:01.605: id_manager.c-ID-MGR: Entry deleted fine id 69000009 - id_delete *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context *EAP_Framework_0: Apr 21 10:13:01.605: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context *aaaQueueReader: Apr 21 10:13:05.805: id_manager.c-ID-MGR: Got new ID c000000a - id_get *aaaQueueReader: Apr 21 10:13:05.805: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL *aaaQueueReader: Apr 21 10:13:05.805: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL *aaaQueueReader: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)' *aaaQueueReader: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = c000000a) *aaaQueueReader: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3643) *EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.806: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:05.806: eap_core.c:1541: Code:RESPONSE ID:0x 1 Length:0x000c Type:IDENTITY *EAP_Framework_0: Apr 21 10:13:05.806: eap_core.c:1478: Payload: 38383231666C6F *EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a *EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity *EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo *EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.806: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (c000000a) *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context c000000a *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.808: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.808: id_manager.c-ID-MGR: Got new ID f0000002 - id_get *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = f0000002) *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1 *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.808: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context c000000a *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25 *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context c000000a *EAP_Framework_0: Apr 21 10:13:05.810: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:05.810: eap_core.c:1541: Code:REQUEST ID:0x 2 Length:0x0006 Type:PEAP *EAP_Framework_0: Apr 21 10:13:05.810: eap_core.c:1478: Payload: 21 *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle c000000a *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:05.810: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.814: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:05.814: eap_core.c:1541: Code:RESPONSE ID:0x 2 Length:0x0006 Type:NAK *EAP_Framework_0: Apr 21 10:13:05.814: eap_core.c:1478: Payload: 2B *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle c000000a *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43 *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1) *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.814: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.815: id_manager.c-ID-MGR: Entry deleted fine id f0000002 - id_delete *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = c000000a *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(c000000a) *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context c000000a *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.815: id_manager.c-ID-MGR: Got new ID 64000019 - id_get *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = 64000019) *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26 *EAP_Framework_0: Apr 21 10:13:05.815: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000) *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start *EAP_Framework_0: Apr 21 10:13:05.815: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start *EAP_Framework_0: Apr 21 10:13:05.815: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:05.815: eap_fast.c:151: Version: 1 Flags:S Length:0x0014 *EAP_Framework_0: Apr 21 10:13:05.815: eap_core.c:1478: Payload: 00040010436973636F00000000000000 ... *EAP_Framework_0: Apr 21 10:13:05.815: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:05.815: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:05.815: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:05.815: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context c000000a *EAP_Framework_0: Apr 21 10:13:05.815: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:05.816: eap_core.c:1541: Code:REQUEST ID:0x 3 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:05.816: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:05.816: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle c000000a *EAP_Framework_0: Apr 21 10:13:05.816: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:05.816: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.820: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:05.820: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x017e Type:FAST *EAP_Framework_0: Apr 21 10:13:05.820: eap_core.c:1478: Payload: 0116030101730100016F0303820B0869 ... *EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle c000000a *EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a *EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a *EAP_Framework_0: Apr 21 10:13:05.820: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x017e Type:FAST *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 0116030101730100016F0303820B0869 ... *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:292: Content:Handshake Version:0301 Length:0x0173 *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 0100016F0303820B0869EDF4C9630217 ... *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:239: Handshake type:Client Hello Length:0x016F *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 0303820B0869EDF4C96302175DA1341E ... *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17 *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:292: Content:Alert Version:0301 Length:0x0002 *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 020A *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200) *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c:151: Version: 1 Flags:L Length:0x0007 *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 1503010002020A *EAP_Framework_0: Apr 21 10:13:05.821: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context c000000a *EAP_Framework_0: Apr 21 10:13:05.821: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1541: Code:REQUEST ID:0x 4 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:05.821: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle c000000a *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:05.821: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.827: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.827: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:05.827: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:05.827: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:05.827: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle c000000a *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context c000000a *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context c000000a *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b) *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.828: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:05.828: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:05.828: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (c000000a) (status 4) *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = c000000a) *EAP_Framework_0: Apr 21 10:13:05.828: id_manager.c-ID-MGR: Entry deleted fine id 64000019 - id_delete *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (c000000a) from lower layer *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle c000000a *EAP_Framework_0: Apr 21 10:13:05.828: id_manager.c-ID-MGR: Entry deleted fine id c000000a - id_delete *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context *EAP_Framework_0: Apr 21 10:13:05.828: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context *aaaQueueReader: Apr 21 10:13:10.049: id_manager.c-ID-MGR: Got new ID 3500000b - id_get *aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL *aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL *aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)' *aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 3500000b) *aaaQueueReader: Apr 21 10:13:10.049: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3644) *EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.050: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:10.050: eap_core.c:1541: Code:RESPONSE ID:0x 1 Length:0x000c Type:IDENTITY *EAP_Framework_0: Apr 21 10:13:10.050: eap_core.c:1478: Payload: 38383231666C6F *EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b *EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity *EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo *EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.050: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL *EAP_Framework_0: Apr 21 10:13:10.051: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (3500000b) *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3500000b *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.052: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.052: id_manager.c-ID-MGR: Got new ID ef000003 - id_get *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = ef000003) *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1 *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.052: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25 *EAP_Framework_0: Apr 21 10:13:10.053: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.054: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:10.054: eap_core.c:1541: Code:REQUEST ID:0x 2 Length:0x0006 Type:PEAP *EAP_Framework_0: Apr 21 10:13:10.054: eap_core.c:1478: Payload: 21 *EAP_Framework_0: Apr 21 10:13:10.054: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.054: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:10.054: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.058: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:10.058: eap_core.c:1541: Code:RESPONSE ID:0x 2 Length:0x0006 Type:NAK *EAP_Framework_0: Apr 21 10:13:10.058: eap_core.c:1478: Payload: 2B *EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b *EAP_Framework_0: Apr 21 10:13:10.058: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43 *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1) *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.059: id_manager.c-ID-MGR: Entry deleted fine id ef000003 - id_delete *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3500000b *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(3500000b) *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3500000b *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.059: id_manager.c-ID-MGR: Got new ID f900001a - id_get *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = f900001a) *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26 *EAP_Framework_0: Apr 21 10:13:10.059: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000) *EAP_Framework_0: Apr 21 10:13:10.059: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start *EAP_Framework_0: Apr 21 10:13:10.059: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start *EAP_Framework_0: Apr 21 10:13:10.059: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:10.059: eap_fast.c:151: Version: 1 Flags:S Length:0x0014 *EAP_Framework_0: Apr 21 10:13:10.059: eap_core.c:1478: Payload: 00040010436973636F00000000000000 ... *EAP_Framework_0: Apr 21 10:13:10.059: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:10.059: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:10.060: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.060: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:10.060: eap_core.c:1541: Code:REQUEST ID:0x 3 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:10.060: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:10.060: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.065: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:10.065: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:10.065: eap_core.c:1478: Payload: 01160301005501000051030351CED7B1 ... *EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b *EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.065: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 01160301005501000051030351CED7B1 ... *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:292: Content:Handshake Version:0301 Length:0x0055 *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 01000051030351CED7B13FA6E9B0E3AB ... *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:239: Handshake type:Client Hello Length:0x0051 *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 030351CED7B13FA6E9B0E3AB3A5D6187 ... *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17 *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:292: Content:Alert Version:0301 Length:0x0002 *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 020A *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200) *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c:151: Version: 1 Flags:L Length:0x0007 *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 1503010002020A *EAP_Framework_0: Apr 21 10:13:10.066: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.066: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1541: Code:REQUEST ID:0x 4 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:10.066: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:10.066: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b) *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.071: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:10.071: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (3500000b) (status 4) *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 3500000b) *EAP_Framework_0: Apr 21 10:13:10.071: id_manager.c-ID-MGR: Entry deleted fine id f900001a - id_delete *EAP_Framework_0: Apr 21 10:13:10.071: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (3500000b) from lower layer *EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 3500000b *EAP_Framework_0: Apr 21 10:13:10.072: id_manager.c-ID-MGR: Entry deleted fine id 3500000b - id_delete *EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context *EAP_Framework_0: Apr 21 10:13:10.072: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context *aaaQueueReader: Apr 21 10:13:14.348: id_manager.c-ID-MGR: Got new ID 3600000c - id_get *aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL *aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL *aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)' *aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 3600000c) *aaaQueueReader: Apr 21 10:13:14.348: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3645) *EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.349: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:14.349: eap_core.c:1541: Code:RESPONSE ID:0x 1 Length:0x000c Type:IDENTITY *EAP_Framework_0: Apr 21 10:13:14.349: eap_core.c:1478: Payload: 38383231666C6F *EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c *EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity *EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo *EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.349: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (3600000c) *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3600000c *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.351: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.351: id_manager.c-ID-MGR: Got new ID e8000004 - id_get *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = e8000004) *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1 *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.351: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25 *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.354: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:14.354: eap_core.c:1541: Code:REQUEST ID:0x 2 Length:0x0006 Type:PEAP *EAP_Framework_0: Apr 21 10:13:14.354: eap_core.c:1478: Payload: 21 *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:14.354: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:14.358: eap_core.c:1541: Code:RESPONSE ID:0x 2 Length:0x0006 Type:NAK *EAP_Framework_0: Apr 21 10:13:14.358: eap_core.c:1478: Payload: 2B *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43 *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1) *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.358: id_manager.c-ID-MGR: Entry deleted fine id e8000004 - id_delete *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(3600000c) *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.358: id_manager.c-ID-MGR: Got new ID d500001b - id_get *EAP_Framework_0: Apr 21 10:13:14.358: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = d500001b) *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26 *EAP_Framework_0: Apr 21 10:13:14.359: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000) *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start *EAP_Framework_0: Apr 21 10:13:14.359: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start *EAP_Framework_0: Apr 21 10:13:14.359: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:14.359: eap_fast.c:151: Version: 1 Flags:S Length:0x0014 *EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1478: Payload: 00040010436973636F00000000000000 ... *EAP_Framework_0: Apr 21 10:13:14.359: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.359: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1541: Code:REQUEST ID:0x 3 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:14.359: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:14.359: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.364: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 01160301005501000051030394AB39C0 ... *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 01160301005501000051030394AB39C0 ... *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:292: Content:Handshake Version:0301 Length:0x0055 *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 01000051030394AB39C0F1B132A9E451 ... *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:239: Handshake type:Client Hello Length:0x0051 *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 030394AB39C0F1B132A9E451CC61B4F5 ... *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17 *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:292: Content:Alert Version:0301 Length:0x0002 *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 020A *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200) *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c:151: Version: 1 Flags:L Length:0x0007 *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 1503010002020A *EAP_Framework_0: Apr 21 10:13:14.364: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:14.364: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:14.364: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.365: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:14.365: eap_core.c:1541: Code:REQUEST ID:0x 4 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:14.365: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:14.365: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b) *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.369: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:14.369: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (3600000c) (status 4) *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 3600000c) *EAP_Framework_0: Apr 21 10:13:14.369: id_manager.c-ID-MGR: Entry deleted fine id d500001b - id_delete *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (3600000c) from lower layer *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 3600000c *EAP_Framework_0: Apr 21 10:13:14.369: id_manager.c-ID-MGR: Entry deleted fine id 3600000c - id_delete *EAP_Framework_0: Apr 21 10:13:14.369: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context *EAP_Framework_0: Apr 21 10:13:14.370: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context *aaaQueueReader: Apr 21 10:13:18.651: id_manager.c-ID-MGR: Got new ID 3700000d - id_get *aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL *aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL *aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)' *aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 3700000d) *aaaQueueReader: Apr 21 10:13:18.651: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3646) *EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.652: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:18.652: eap_core.c:1541: Code:RESPONSE ID:0x 1 Length:0x000c Type:IDENTITY *EAP_Framework_0: Apr 21 10:13:18.652: eap_core.c:1478: Payload: 38383231666C6F *EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d *EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity *EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo *EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.652: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (3700000d) *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3700000d *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.653: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.653: id_manager.c-ID-MGR: Got new ID 13000005 - id_get *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = 13000005) *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1 *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.653: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25 *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.655: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:18.655: eap_core.c:1541: Code:REQUEST ID:0x 2 Length:0x0006 Type:PEAP *EAP_Framework_0: Apr 21 10:13:18.655: eap_core.c:1478: Payload: 21 *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:18.655: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.660: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:18.660: eap_core.c:1541: Code:RESPONSE ID:0x 2 Length:0x0006 Type:NAK *EAP_Framework_0: Apr 21 10:13:18.660: eap_core.c:1478: Payload: 2B *EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d *EAP_Framework_0: Apr 21 10:13:18.660: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43 *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1) *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.661: id_manager.c-ID-MGR: Entry deleted fine id 13000005 - id_delete *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 3700000d *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(3700000d) *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 3700000d *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.661: id_manager.c-ID-MGR: Got new ID d300001c - id_get *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = d300001c) *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26 *EAP_Framework_0: Apr 21 10:13:18.661: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000) *EAP_Framework_0: Apr 21 10:13:18.661: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start *EAP_Framework_0: Apr 21 10:13:18.661: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start *EAP_Framework_0: Apr 21 10:13:18.661: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:18.661: eap_fast.c:151: Version: 1 Flags:S Length:0x0014 *EAP_Framework_0: Apr 21 10:13:18.661: eap_core.c:1478: Payload: 00040010436973636F00000000000000 ... *EAP_Framework_0: Apr 21 10:13:18.661: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:18.661: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:18.662: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.662: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:18.662: eap_core.c:1541: Code:REQUEST ID:0x 3 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:18.662: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:18.662: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.669: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478: Payload: 0116030100550100005103031BF57B98 ... *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.669: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478: Payload: 0116030100550100005103031BF57B98 ... *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake *EAP_Framework_0: Apr 21 10:13:18.669: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:18.669: eap_fast.c:292: Content:Handshake Version:0301 Length:0x0055 *EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478: Payload: 0100005103031BF57B9870BBD22626DC ... *EAP_Framework_0: Apr 21 10:13:18.669: eap_fast.c:239: Handshake type:Client Hello Length:0x0051 *EAP_Framework_0: Apr 21 10:13:18.669: eap_core.c:1478: Payload: 03031BF57B9870BBD22626DC9B286E95 ... *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 *EAP_Framework_0: Apr 21 10:13:18.669: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17 *EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:292: Content:Alert Version:0301 Length:0x0002 *EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478: Payload: 020A *EAP_Framework_0: Apr 21 10:13:18.670: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200) *EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c:151: Version: 1 Flags:L Length:0x0007 *EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478: Payload: 1503010002020A *EAP_Framework_0: Apr 21 10:13:18.670: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.670: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1541: Code:REQUEST ID:0x 4 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:18.670: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:18.670: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b) *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.675: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:18.675: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (3700000d) (status 4) *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 3700000d) *EAP_Framework_0: Apr 21 10:13:18.675: id_manager.c-ID-MGR: Entry deleted fine id d300001c - id_delete *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (3700000d) from lower layer *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 3700000d *EAP_Framework_0: Apr 21 10:13:18.675: id_manager.c-ID-MGR: Entry deleted fine id 3700000d - id_delete *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context *EAP_Framework_0: Apr 21 10:13:18.675: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP context *aaaQueueReader: Apr 21 10:13:22.952: id_manager.c-ID-MGR: Got new ID 9a00000e - id_get *aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Received credential profile name: "(null)" from LL *aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Received EAP profile name: "wlc-local-eap" from LL *aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-ERROR Credential profile is '(null)' *aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Allocated new EAP context (handle = 9a00000e) *aaaQueueReader: Apr 21 10:13:22.952: f8:a5:c5:9f:43:96 EAP-EVENT: Received context create from lower layer (3647) *EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.953: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:22.953: eap_core.c:1541: Code:RESPONSE ID:0x 1 Length:0x000c Type:IDENTITY *EAP_Framework_0: Apr 21 10:13:22.953: eap_core.c:1478: Payload: 38383231666C6F *EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Identity *EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Received peer identity: 8821flo *EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_USERNAME' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.953: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from LL *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_LL_REPLY' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Using credential profile name: 8821flo (9a00000e) *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.955: 00:00:00:00:00:00 peap.c-PEER-EVENT: New PEAP context (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.955: id_manager.c-ID-MGR: Got new ID 48000006 - id_get *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: peap_new_inner_method eap inner method context create: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Allocated new PEAP context (handle = 48000006) *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Process RX_DATA directive *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Proposing PEAP version 1 *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP start message received *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-METHOD-EVENT: Setting up PEAP SSL context *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_GET_CREDENTIAL_PROFILE_FROM_PROFILE_NAME' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.955: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Setting default PKI trustpoint to cisco *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Waiting for asynchronous reply from method *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_METHOD_REPLY' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Handling asynchronous method response for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 25 *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.957: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:22.957: eap_core.c:1541: Code:REQUEST ID:0x 2 Length:0x0006 Type:PEAP *EAP_Framework_0: Apr 21 10:13:22.957: eap_core.c:1478: Payload: 21 *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:22.957: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.962: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:22.962: eap_core.c:1541: Code:RESPONSE ID:0x 2 Length:0x0006 Type:NAK *EAP_Framework_0: Apr 21 10:13:22.962: eap_core.c:1478: Payload: 2B *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = NAK *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Received supplicant preferred eap method 43 *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Initiate client preferred eap method (num of avail methods: 1, num of req methods: 1) *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.962: id_manager.c-ID-MGR: Entry deleted fine id 48000006 - id_delete *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Sending PEAP context cleanup message (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Received PEAP event context: f8:a5:c5:9f:43:96 *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: PEAP cleanup SSL message received *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap.c-AUTH-EVENT: Free PEAP EAP handle = 9a00000e *EAP_Framework_0: Apr 21 10:13:22.962: f8:a5:c5:9f:43:96 peap_inner_method.c-AUTH-EVENT: Cleaning up the inner method for PEAP handle = 0 EAP handle(9a00000e) *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Maximum EAP packet size: 1200 *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method new context directive for EAP context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'New Context' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast.c-PEER-EVENT: New context (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.963: id_manager.c-ID-MGR: Got new ID 9000001d - id_get *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Allocated new EAP-FAST context (handle = 9000001d) *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received Identity *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 26 *EAP_Framework_0: Apr 21 10:13:22.963: eap_fast_tlv.c-AUTH-DETAIL: Adding PAC A-ID TLV (436973636f0000000000000000000000) *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Sending Start *EAP_Framework_0: Apr 21 10:13:22.963: eap_fast_auth.c-AUTH-SM: Changing state: Reset -> Start *EAP_Framework_0: Apr 21 10:13:22.963: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:22.963: eap_fast.c:151: Version: 1 Flags:S Length:0x0014 *EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1478: Payload: 00040010436973636F00000000000000 ... *EAP_Framework_0: Apr 21 10:13:22.963: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Unknown *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.963: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1541: Code:REQUEST ID:0x 3 Length:0x001a Type:FAST *EAP_Framework_0: Apr 21 10:13:22.963: eap_core.c:1478: Payload: 2100040010436973636F000000000000 ... *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:22.963: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.969: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 01160301005501000051030358E880B5 ... *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1541: Code:RESPONSE ID:0x 3 Length:0x0060 Type:FAST *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 01160301005501000051030358E880B5 ... *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received TLS record type: Handshake in state: Start *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Reading Client Hello handshake *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:323: EAP-FAST-AUTH-RX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:292: Content:Handshake Version:0301 Length:0x0055 *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 01000051030358E880B54BA8AE3A7EE4 ... *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:239: Handshake type:Client Hello Length:0x0051 *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 030358E880B54BA8AE3A7EE46DC92725 ... *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303 *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: EAP-FAST tx pkt len 17 *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:323: EAP-FAST-AUTH-TX-TLS-RECORD: *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:292: Content:Alert Version:0301 Length:0x0002 *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 020A *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast_auth.c-AUTH-SM: Changing state: Start -> Alert *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Tx packet fragmentation required 17 (max 1200) *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:2490: eap-fast tx packet: *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c:151: Version: 1 Flags:L Length:0x0007 *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 1503010002020A *EAP_Framework_0: Apr 21 10:13:22.969: eap_fast.c-TX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1541: Code:REQUEST ID:0x 0 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:22.969: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:22.969: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Continue *EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Current method = 43 *EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending packet to lower layer for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.970: EAP-AUTH-TX-PAK: *EAP_Framework_0: Apr 21 10:13:22.970: eap_core.c:1541: Code:REQUEST ID:0x 4 Length:0x0011 Type:FAST *EAP_Framework_0: Apr 21 10:13:22.970: eap_core.c:1478: Payload: 81000000071503010002020A *EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-EVENT: Started 'Authenticator Retransmit' timer (60) for EAP session handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-EVENT: Started EAP tick timer *EAP_Framework_0: Apr 21 10:13:22.970: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_TX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_RX_PACKET' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: EAP-AUTH-RX-PAK: *EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Stopping 'Authenticator Retransmit' timer for EAP session handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response received by context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP Response type = Method (43) *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: Sending method data for context 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Receive Packet' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: eap_fast_rx_packet(): EAP Fast NoData (0x2b) *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Process Response, type: 0x2b *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Process Response (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.974: eap_fast_auth.c-RX-AUTH-PAK: *EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1541: Code:RESPONSE ID:0x 4 Length:0x0006 Type:FAST *EAP_Framework_0: Apr 21 10:13:22.974: eap_core.c:1478: Payload: 01 *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast_auth.c-AUTH-EVENT: Received ACK from peer *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method state: Done *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-AUTH-EVENT: EAP method decision: Fail *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Received get canned status from lower layer (9a00000e) (status 4) *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Sending method directive 'Free Context' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 eap_fast.c-AUTH-EVENT: Free context (EAP handle = 9a00000e) *EAP_Framework_0: Apr 21 10:13:22.974: id_manager.c-ID-MGR: Entry deleted fine id 9000001d - id_delete *EAP_Framework_0: Apr 21 10:13:22.974: f8:a5:c5:9f:43:96 EAP-EVENT: Sending lower layer event 'EAP_FAIL' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.975: f8:a5:c5:9f:43:96 EAP-EVENT: Received free context (9a00000e) from lower layer *EAP_Framework_0: Apr 21 10:13:22.975: f8:a5:c5:9f:43:96 EAP-EVENT: Received event 'EAP_DELETE' on handle 9a00000e *EAP_Framework_0: Apr 21 10:13:22.975: id_manager.c-ID-MGR: Entry deleted fine id 9a00000e - id_delete *EAP_Framework_0: Apr 21 10:13:22.975: f8:a5:c5:9f:43:96 EAP-EVENT: Freed EAP auth context
I think this is the "magic" line, who tells the problem:
eap_fast.c-AUTH-ERROR: Hello version mismatch, expect 0x0301, received 0x303
TLS 1.0 (0x0301)
TLS 1.2 (0x0303)
How to activate TLS 1.2 for the wlc ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide