cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3640
Views
0
Helpful
5
Replies

Wireless Client dropped right after association

Donald Wolfe
Level 1
Level 1

Hello,

We have a client that keeps getting dropped right after association is completed.  I have run a debug on the client but I am not 100% sure of the issue and wanted to see if anyone has run into this before:

(Cisco Controller) >debug client 00:10:40:a1:65:12

(Cisco Controller) >*spamApTask6: Jan 24 12:33:59.246: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0  cur: 3

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA]      [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA]      [0016] ac 01 28 00 00 00

*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 RSN Capabilities:  40
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated

*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated

*spamApTask6: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879e38/00:10:40:a1:65:12/105795) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=196) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 196 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 196)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 196, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=197) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 197)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 197, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=198) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 198)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 198, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=199) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 199)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 199, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=200) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 200)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 200, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=201) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 201)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 201, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
    MAC: 00:10:40:a1:65:12, source 4

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] New PMKID: (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA]      [0000] f0 51 60 9d 2b 2b cb 50 28 e9 5d 9a 2e 1e 99 a7

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 201)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] Including PMKID in M1  (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA]      [0000] f0 51 60 9d 2b 2b cb 50 28 e9 5d 9a 2e 1e 99 a7

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=201) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.388: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.388: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000000: 30 16 01 00 00 0f ac 02  01 00 00 0f ac 04 01 00  0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000010: 00 0f ac 01 28 00 00 00                           ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000000: 01 00 00 0f ac 02 01 00  00 0f ac 04 01 00 00 0f  ................
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000010: ac 01 28 00 00 00                                 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12   Building Client Payload:

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12     Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12     Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12     Client Vap Security: 16448

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12     Virtual Ip: 1.1.1.1

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12     ssid: usftwctrHH

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12   Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*Apf Guest: Jan 24 12:34:39.888: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0

*DHCP Socket Task: Jan 24 12:34:41.006: [PA] 00:10:40:a1:65:12 DHCP received op BOOTREPLY (2) (len 343,vlan 401, port 4, encap 0xec03)
*DHCP Socket Task: Jan 24 12:34:41.006: [PA] 00:10:40:a1:65:12 DHCP setting server from OFFER (server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:34:41.033: [PA] 00:10:40:a1:65:12 DHCP received op BOOTREPLY (2) (len 343,vlan 401, port 4, encap 0xec03)
*DHCP Socket Task: Jan 24 12:34:41.033: [PA] 00:10:40:a1:65:12 DHCP setting server from ACK (mscb=0x2eca9a20 ip=0xa004bdb)(server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 apfMsRunStateInc
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 10.0.75.219 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)

*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*pemReceiveTask: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 10.0.75.219 Removed NPU entry.
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 Assigning Address 10.0.75.219 to mobile
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*spamApTask6: Jan 24 12:34:56.949: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:34:56.949: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1

*spamApTask6: Jan 24 12:34:56.949: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:34:56.950: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:34:56.950: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1

*spamApTask6: Jan 24 12:34:56.950: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated

*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle

*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 10.0.75.219 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:34:57.891: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)

(Cisco Controller) >*spamApTask6: Jan 24 12:35:17.255: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0  cur: 3

*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA]      [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA]      [0016] ac 01 28 00 00 00

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 RSN Capabilities:  40
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated

*spamApTask6: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879e76/00:10:40:a1:65:12/105796) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=146) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 146 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 146)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 146, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=147) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 147)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 147, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=148) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 148)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 148, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=149) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 149)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 149, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=150) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 150)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 150, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=151) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 151)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 151, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
    MAC: 00:10:40:a1:65:12, source 4

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] New PMKID: (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA]      [0000] 08 85 cf 67 f4 21 19 35 00 b8 1f 05 89 aa ba 62

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 151)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] Including PMKID in M1  (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA]      [0000] 08 85 cf 67 f4 21 19 35 00 b8 1f 05 89 aa ba 62

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=151) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000000: 30 16 01 00 00 0f ac 02  01 00 00 0f ac 04 01 00  0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000010: 00 0f ac 01 28 00 00 00                           ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000000: 01 00 00 0f ac 02 01 00  00 0f ac 04 01 00 00 0f  ................
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000010: ac 01 28 00 00 00                                 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12   Building Client Payload:

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12     Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12     Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12     Client Vap Security: 16448

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12     Virtual Ip: 1.1.1.1

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12     ssid: usftwctrHH

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12   Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 DHCP received op BOOTREPLY (2) (len 343,vlan 401, port 4, encap 0xec03)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 DHCP setting server from ACK (mscb=0x2eca6160 ip=0xa004bdb)(server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 DHCP setting server from ACK (server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 apfMsRunStateInc
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 10.0.75.219 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)

*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*pemReceiveTask: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 10.0.75.219 Removed NPU entry.
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 Assigning Address 10.0.75.219 to mobile
*DHCP Socket Task: Jan 24 12:35:41.111: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*DHCP Socket Task: Jan 24 12:35:41.111: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*Apf Guest: Jan 24 12:36:10.948: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0

*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 4, reasonCode 4

*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 0 PMK-remove groupcast messages sent
*osapiBsnTimer: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated

*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Global PMK Cache deletion failed.
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle

*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 10.0.75.219 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:36:26.249: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0  cur: 3

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA]      [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA]      [0016] ac 01 28 00 00 00

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 RSN Capabilities:  40
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated

*spamApTask6: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879ebe/00:10:40:a1:65:12/105798) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=27) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 27 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 27)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 27, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=28) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 28)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 28, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=29) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 29)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 29, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=30) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 30)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 30, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=31) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 31)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 31, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=32) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 32)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 32, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
    MAC: 00:10:40:a1:65:12, source 4

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] New PMKID: (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA]      [0000] 71 60 be c6 79 58 04 1a d0 47 3b 98 34 24 3a 85

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 32)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] Including PMKID in M1  (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA]      [0000] 71 60 be c6 79 58 04 1a d0 47 3b 98 34 24 3a 85

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=32) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000000: 30 16 01 00 00 0f ac 02  01 00 00 0f ac 04 01 00  0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000010: 00 0f ac 01 28 00 00 00                           ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000000: 01 00 00 0f ac 02 01 00  00 0f ac 04 01 00 00 0f  ................
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000010: ac 01 28 00 00 00                                 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12   Building Client Payload:

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12     Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12     Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12     Client Vap Security: 16448

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12     Virtual Ip: 1.1.1.1

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12     ssid: usftwctrHH

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12   Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:36:49.302: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1

*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1

*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:36:57.257: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:36:57.257: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated

*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle

*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*pemReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 0.0.0.0 Removed NPU entry.
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*spamApTask6: Jan 24 12:37:16.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0  cur: 3

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA]      [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA]      [0016] ac 01 28 00 00 00

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 RSN Capabilities:  40
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated

*spamApTask6: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879eec/00:10:40:a1:65:12/105800) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=227) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 227 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 227)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 227, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=228) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 228)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 228, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=229) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 229)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 229, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.299: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.299: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=230) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.299: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 230)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.300: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 230, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=231) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 231)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 231, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=232) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 232)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 232, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
    MAC: 00:10:40:a1:65:12, source 4

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] New PMKID: (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA]      [0000] 27 de bd 94 b4 d9 f9 ea f4 7c 2b b4 ad f3 c4 23

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 232)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] Including PMKID in M1  (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA]      [0000] 27 de bd 94 b4 d9 f9 ea f4 7c 2b b4 ad f3 c4 23

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=232) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000000: 30 16 01 00 00 0f ac 02  01 00 00 0f ac 04 01 00  0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000010: 00 0f ac 01 28 00 00 00                           ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000000: 01 00 00 0f ac 02 01 00  00 0f ac 04 01 00 00 0f  ................
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000010: ac 01 28 00 00 00                                 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12   Building Client Payload:

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12     Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12     Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12     Client Vap Security: 16448

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12     Virtual Ip: 1.1.1.1

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12     ssid: usftwctrHH

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12   Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:37:42.380: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:37:42.380: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1

*spamApTask6: Jan 24 12:37:42.380: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:37:42.381: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:37:42.381: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1

*spamApTask6: Jan 24 12:37:42.381: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*Apf Guest: Jan 24 12:37:42.715: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0

*osapiBsnTimer: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated

*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle

*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*pemReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 0.0.0.0 Removed NPU entry.

(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >*spamApTask6: Jan 24 12:38:03.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA]      [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA]      [0016] ac 01 28 00 00 00

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 RSN Capabilities:  40
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 2
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated

*spamApTask6: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879f2d/00:10:40:a1:65:12/105802) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=55) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 55 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 55)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 55, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=56) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 56)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 56, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=57) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 57)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 57, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=58) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 58)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 58, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=59) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 59)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 59, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=60) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 60)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 60, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
    MAC: 00:10:40:a1:65:12, source 4

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] New PMKID: (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA]      [0000] b2 50 8c a3 de ae 83 b1 02 b6 69 69 a2 c8 21 e7

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 60)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] Including PMKID in M1  (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA]      [0000] b2 50 8c a3 de ae 83 b1 02 b6 69 69 a2 c8 21 e7

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=60) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000000: 30 16 01 00 00 0f ac 02  01 00 00 0f ac 04 01 00  0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000010: 00 0f ac 01 28 00 00 00                           ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000000: 01 00 00 0f ac 02 01 00  00 0f ac 04 01 00 00 0f  ................
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000010: ac 01 28 00 00 00                                 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12   Building Client Payload:

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12     Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12     Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12     Client Vap Security: 16448

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12     Virtual Ip: 1.1.1.1

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12     ssid: usftwctrHH

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12   Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:38:48.728: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:38:48.728: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1

*spamApTask6: Jan 24 12:38:48.728: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:38:48.730: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:38:48.730: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1

*spamApTask6: Jan 24 12:38:48.730: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:38:49.606: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:38:49.609: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated

*apfReceiveTask: Jan 24 12:38:49.609: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle

*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*spamApTask6: Jan 24 12:39:09.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*Apf Guest: Jan 24 12:39:13.474: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0  cur: 2

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 processSsidIE  statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 suppRates  statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA]      [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA]      [0016] ac 01 28 00 00 00

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 RSN Capabilities:  40
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 2
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated

*spamApTask6: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879f6e/00:10:40:a1:65:12/105803) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=214) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 214 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 214)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 214, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=215) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 215)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 215, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=216) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 216)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 216, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=217) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 217)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 217, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=218) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 218)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 218, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=219) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 219)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 219, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
    MAC: 00:10:40:a1:65:12, source 4

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] New PMKID: (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA]      [0000] 30 5d 56 3a 7f 9c a3 5f 3d 11 7d 1c 50 f4 23 bd

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 219)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] Including PMKID in M1  (16)

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA]      [0000] 30 5d 56 3a 7f 9c a3 5f 3d 11 7d 1c 50 f4 23 bd

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=219) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000000: 30 16 01 00 00 0f ac 02  01 00 00 0f ac 04 01 00  0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000010: 00 0f ac 01 28 00 00 00                           ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000000: 01 00 00 0f ac 02 01 00  00 0f ac 04 01 00 00 0f  ................
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000010: ac 01 28 00 00 00                                 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Reusing allocated memory for  EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12   Building Client Payload:

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12     Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12     Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12     Client Vap Security: 16448

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12     Virtual Ip: 1.1.1.1

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12     ssid: usftwctrHH

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12   Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  type = Airespace AP - Learn IP address
  on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
  IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0  Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit:  AppID = 0 ,AppAction = 0, AppToken = 64206  AverageRate = 0, BurstRate = 0

*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:39:51.592: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:39:51.592: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1

*spamApTask6: Jan 24 12:39:51.592: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:39:51.593: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:39:51.593: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1

*spamApTask6: Jan 24 12:39:51.593: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station:  (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated

*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle

*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*pemReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 0.0.0.0 Removed NPU entry.
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*spamApTask6: Jan 24 12:40:12.281: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb

5 Replies 5

I would suspect this is a bug of the software version you running. What version of software you run on your WLC ?

Rasika

8.0.133.0 

Im still waiting on the client to get back to me on the model of end device they are using.

Hi,

Running a cisco tool i can see the below:

Jan 24 12:39:42.416 *apfMsConnTask_0 Client made new Association to AP/BSSID BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
Jan 24 12:39:42.416 *apfMsConnTask_0 The WLC/AP has found from client association request Information Element that claims PMKID Caching support
Jan 24 12:39:42.416 *apfMsConnTask_0 The Reassociation Request from the client comes with 0 PMKID
Jan 24 12:39:42.416 *apfMsConnTask_0 Client is entering the 802.1x or PSK Authentication state
Jan 24 12:39:42.416 *apfMsConnTask_0 Client has successfully cleared AP association phase
Jan 24 12:39:42.416 *apfMsConnTask_0 WLC/AP is sending an Association Response to the client with status code 0 = Successful association
Jan 24 12:39:42.418 *Dot1x_NW_MsgTask_2 Client will be required to Reauthenticate in 0 seconds
Jan 24 12:39:42.418 *Dot1x_NW_MsgTask_2 WLC/AP is sending EAP-Identity-Request to the client
Jan 24 12:39:42.447 *Dot1x_NW_MsgTask_2 Client sent EAP-Identity-Response to WLC/AP
Jan 24 12:39:42.587 *Dot1x_NW_MsgTask_2 RADIUS Server permitted access
Jan 24 12:39:42.587 *Dot1x_NW_MsgTask_2 Client will be required to Reauthenticate in 0 seconds
Jan 24 12:39:42.587 *Dot1x_NW_MsgTask_2 4-Way PTK Handshake, Sending M1
Jan 24 12:39:42.607 *Dot1x_NW_MsgTask_2 4-Way PTK Handshake, Received M2
Jan 24 12:39:42.607 *Dot1x_NW_MsgTask_2 4-Way PTK Handshake, Sending M3
Jan 24 12:39:42.623 *Dot1x_NW_MsgTask_2 4-Way PTK Handshake, Received M4
Jan 24 12:39:42.624 *Dot1x_NW_MsgTask_2 Client has completed PSK Dot1x or WEP authentication phase
Jan 24 12:39:42.624 *Dot1x_NW_MsgTask_2 Client has entered DHCP Required state
Jan 24 12:39:51.593 *spamApTask6 Client delete code: Default reason code for all client delete requests That can be due to possible reasons: Error during PMIPv6 MAG config/ Error during dataplane rule creation for client/ Redirect URL is present and Radius NAC with mac filtering is set, pending for posture/ No dot1x control block found for client, internal error/ Client did not answer retries for SA query (802.11w)/ Default value for flex local auth clients/ Client ACL not present on AP
Jan 24 12:39:52.440 *apfReceiveTask Client session has timed out
Jan 24 12:39:52.440 *apfReceiveTask Client has been deauthenticated
Jan 24 12:39:52.440 *apfReceiveTask Client session has timed out

So based on the logs there is an issue when the client gets an IP address. You could check the error log above for more info.

HTH

konstantinoschiotakis,

 

Which Cisco tool were you using?

Review Cisco Networking products for a $25 gift card