cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
386
Views
0
Helpful
10
Replies
Highlighted
Participant

phone Huawei  cannot connected to this access point number 5

hello

 

i have a problem with acces point 1815i wth number 5 .

 

that we have only phone Huawei  cannot connected to this access point number 5  but other phones can connect

with this accce point ??

 

so i have output for this acces point

 

============>  so why this phone connot connected to this acce point number 5 ???

show ap join stats detailed 28:ac:9e:89:46:00

Sync phase statistics
- Time at sync request received............................ Not applicable
- Time at sync completed................................... Not applicable

Discovery phase statistics
- Discovery requests received.............................. 14
- Successful discovery responses sent...................... 14
- Unsuccessful discovery request processing................ 0
- Reason for last unsuccessful discovery attempt........... Not applicable
- Time at last successful discovery attempt................ Feb 18 08:32:53.438
- Time at last unsuccessful discovery attempt.............. Not applicable

Join phase statistics
- Join requests received................................... 4
- Successful join responses sent........................... 4
- Unsuccessful join request processing..................... 0
- Reason for last unsuccessful join attempt................ Not applicable
- Time at last successful join attempt..................... Feb 18 08:33:03.038
- Time at last unsuccessful join attempt................... Not applicable

Configuration phase statistics

--More-- or (q)uit
- Configuration requests received.......................... 20
- Successful configuration responses sent.................. 8
- Unsuccessful configuration request processing............ 0
- Reason for last unsuccessful configuration attempt....... Not applicable
- Time at last successful configuration attempt............ Feb 18 08:33:04.091
- Time at last unsuccessful configuration attempt.......... Not applicable

Last AP message decryption failure details
- Reason for last message decryption failure............... Not applicable

Last AP disconnect details
- Reason for last AP connection failure.................... Number of message retransmission to the AP has reached maximum
- Last AP disconnect reason................................ Unknown failure reason

Last join error summary
- Type of error that occurred last......................... AP got or has been disconnected
- Reason for error that occurred last...................... Number of message retransmission to the AP has reached maximum
- Time at which the last join error occurred............... Feb 18 08:24:59.181

AP disconnect details
- Reason for last AP connection failure.................... Number of message retransmission to the AP has reached maximum
Ethernet Mac : 28:ac:9e:89:46:00 Ip Address : 10.30.30.7

 

10 REPLIES 10
Highlighted
VIP Mentor

Re: phone Huawei  cannot connected to this access point number 5

run the debug client <mac addres sof huwai phone> command on WLC and paste the output here..

 

Regards

Dont forget to rate helpful posts

Highlighted
Participant

Re: phone Huawei  cannot connected to this access point number 5

i send output from this phone 

 

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2020.02.19 11:56:47 =~=~=~=~=~=~=~=~=~=~=~=
debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca*emWeb: Feb 19 10:46:19.274:
Debugging session started on Feb 19 10:46:19.274 for WLC AIR-CTVM-K9 Version :8.9.111.0 SN :977F796IZ3N Hostname WLC


(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >*apfOpenDtlSocket: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Received management frame ASSOCIATION REQUEST on BSSID 70:79:b3:3b:54:20 destination addr 70:79:b3:3b:54:20 slotid 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Processing assoc-req station:44:55:c4:7b:0a:ca AP:70:79:b3:3b:54:20-00 ssid : WIFI-صوتيتال thread:f39caddf80
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA trying to join WLAN with RSSI 0. Checking for XOR roam conditions on AP: 70:79:B3:3B:54:20 Slot: 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA is associating to AP 70:79:B3:3B:54:20 which is not XOR roam capable
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Client AVC Roaming context transfer needed? NO
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Setting RTTS enabled to 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Association received from mobile on BSSID 70:79:b3:3b:54:20 AP AP-02
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA trying to join WLAN with RSSI 0. Checking for XOR roam conditions on AP: 70:79:B3:3B:54:20 Slot: 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA is associating to AP 70:79:B3:3B:54:20 which is not XOR roam capable
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Global 200 Clients are allowed to AP radio

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Max Client Trap Threshold: 0 cur: 0

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Updated local bridging VLAN to 30 while applying WLAN policy
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca override for default ap group, marking intgrp NULL
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Check the client SGT 0 policy and push it to AP 70:79:b3:3b:54:20
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca In processSsidIE:7159 setting Central switched to FALSE
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Applying site-specific Local Bridging override for station 44:55:c4:7b:0a:ca - vapId 1, site 'default-group', interface 'management'
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Applying Local Bridging Interface Policy for station 44:55:c4:7b:0a:ca - vlan 30, interface id 0, interface 'management', nasId:''
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca STA - rates (8): 130 132 139 150 12 18 24 36 48 72 96 108 0 0 0 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca STA - rates (12): 130 132 139 150 12 18 24 36 48 72 96 108 0 0 0 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca extSuppRates statusCode is 0 and gotExtSuppRatesElement is 1
*apfMsConnTask_5: Feb 19 10:49:12.952: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_5: Feb 19 10:49:12.952: [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_5: Feb 19 10:49:12.952: [0016] ac 02 28 00

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Processing RSN IE type 48, length 20 for mobile 44:55:c4:7b:0a:ca
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Received 802.11i PSK key management suite, enabling Authentication
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca RSN Capabilities: 40
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca non-11w Capable mobile
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Received RSN IE with 0 PMKIDs from mobile 44:55:c4:7b:0a:ca
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca the value of url acl preserve flag is 1 for mobile 44:55:c4:7b:0a:ca (caller pem_api.c:5155)
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 RUN (20) Deleted mobile LWAPP rule on AP [28:ac:9e:b6:f9:c0]
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Succesfully freed AID 4, slot 0 on AP 28:ac:9e:b6:f9:c0, #client on this slot 6
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca New ctxOwnerMwarIp: 10.30.30.2 New ctxOwnerApMac: 70:79:B3:3B:54:20 New ctxOwnerApEthMac: 28:AC:9E:77:A4:90 New ctxOwnerApSlotId: 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Updated location for station old AP 28:ac:9e:b6:f9:c0 oldSlot 0, new AP 70:79:b3:3b:54:20 newSlot 0, AID 0 MsType 0 MobilityRole 1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Assigned flex post-auth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Updating AID for REAP AP Client 70:79:b3:3b:54:20 - AID ===> 1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca apfMsRunStateDec
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca apfMs1xStateDec
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 RUN (20) Change state to START (0) last state RUN (20)

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca the value of url acl preserve flag is 0 for mobile 44:55:c4:7b:0a:ca (caller pem_api.c:3709)
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 START (0) Initializing policy
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca apfVapSecurity=0x40004040 L2=16384 SkipWeb=0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca AuthenticationRequired = 1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Encryption policy is set to 0x80000001
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001]
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 8021X_REQD (3) DHCP Not required on AP 70:79:b3:3b:54:20 vapId 1 apVapId 1for this client
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Not Using WMM Compliance code qosCap 00
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Vlan while overriding the policy = -1
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca 10.30.30.35 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:79:b3:3b:54:20 vapId 1 apVapId 1 flex acl-name: v6acl-name
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 44:55:c4:7b:0a:ca on AP 70:79:b3:3b:54:20 from Associated to Associated

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca apfPemAddUser2:session timeout forstation 44:55:c4:7b:0a:ca - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_5: Feb 19 10:49:12.952: 44:55:c4:7b:0a:ca Sending assoc-resp with status 0 station:44:55:c4:7b:0a:ca AP:70:79:b3:3b:54:20-00 on apVapId 1
*apfMsConnTask_5: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Sending Assoc Response (status: '0') to station on AP AP-02 on BSSID 70:79:b3:3b:54:20 ApVapId 1 Slot 0, mobility role 1
*apfMsConnTask_5: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca apfProcessAssocReq (apf_80211.c:12327) Changing state for mobile 44:55:c4:7b:0a:ca on AP 70:79:b3:3b:54:20 from Associated to Associated

*spamApTask6: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Delete Mobile request with reason 'MN_DEL_INTER_AP_ROAM' on slot 0 sent to the AP 28:ac:9e:b6:f9:c0 IP: 10.30.30.8:5256.
*spamApTask0: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Add SGT:0 to AP 70:79:b3:3b:54:20
*spamApTask0: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask0: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask0: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Successful transmission of LWAPP Add-Mobile to AP 70:79:b3:3b:54:20 idx@31
*spamApTask0: Feb 19 10:49:12.953: 44:55:c4:7b:0a:ca Setting ADD_MOBILE (idx 0, seqno 0, action 1, count 1674811423) ack state for STA on AP 70:79:b3:3b:54:20
*spamApTask0: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Received ADD_MOBILE ack - Initiating 1x to STA 44:55:c4:7b:0a:ca (idx 31)
*spamApTask0: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca APF Initiating 1x to STA 44:55:c4:7b:0a:ca
*spamApTask0: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Sent dot1x auth initiate message for mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca dot1xProcessInitiate1XtoMobile to mobile station 44:55:c4:7b:0a:ca (mscb 3, msg 3)
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca reauth_sm state transition 0 ---> 0 for mobile 44:55:c4:7b:0a:ca at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Normal psk client, full auth
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Creating a PKC PMKID Cache entry for station 44:55:c4:7b:0a:ca (RSN 2)
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Resetting MSCB PMK Cache Entry @index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Removing BSSID 28:ac:9e:b6:f9:c0 from PMKID cache of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Created PMKID PMK Cache for BSSID 70:79:b3:3b:54:20 at index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: New PMKID: (16)

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: [0000] ac 88 61 45 da 6e d7 61 d3 b0 02 18 9d 00 75 56

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Initiating RSN PSK to mobile 44:55:c4:7b:0a:cakeyMgmtType : 0
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca dot1x - moving mobile 44:55:c4:7b:0a:ca into Force Auth state
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Skipping EAP-Success to mobile 44:55:c4:7b:0a:ca (encryptBit:0)
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Found an cache entry for BSSID 70:79:b3:3b:54:20 in PMKID cache at index 0 of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Found an cache entry for BSSID 70:79:b3:3b:54:20 in PMKID cache at index 0 of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: Including PMKID in M1 (16)

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: [0000] ac 88 61 45 da 6e d7 61 d3 b0 02 18 9d 00 75 56

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: M1 - Key Data: (22)

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: [0000] dd 14 00 0f ac 04 ac 88 61 45 da 6e d7 61 d3 b0

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: [0016] 02 18 9d 00 75 56

*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Starting key exchange to mobile 44:55:c4:7b:0a:ca, data packets will be dropped
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Sending EAPOL-Key Message to mobile 44:55:c4:7b:0a:ca
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Feb 19 10:49:12.960: 44:55:c4:7b:0a:ca Allocating EAP Pkt for retransmission to mobile 44:55:c4:7b:0a:ca
*dot1xSocketTask: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Received EAPOL-Key from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Received EAPOL-key in PTK_START state (message 2) from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca rsnieCapabilty = 28 rsnie_len =20
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Dumping RSNIE received in Association request(len = 22):
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 00000000: 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 00000010: 00 0f ac 02 28 00 ....(.
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 44:55:c4:7b:0a:ca Dumping RSNIE received in EAPOL M2 (len = 20):
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080: 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Feb 19 10:49:13.080:*osapiBsnTimer: Feb 19 10:49:28.049: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 10:49:28.049: 44:55:c4:7b:0a:ca apfMsExpireMobileStation (apf_ms.c:8078) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:40 from Associated to Disassociated

*apfReceiveTask: Feb 19 10:49:28.049: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
*osapiBsnTimer: Feb 19 10:49:38.249: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 10:49:38.249: 44:55:c4:7b:0a:ca apfSendDisAssocMsgDebug (apf_80211.c:4013) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:40 from Disassociated to Disassociated

*apfReceiveTask: Feb 19 10:49:38.249: 44:55:c4:7b:0a:ca Sent Disassociate to mobile on AP 28:ac:9e:b6:f9:40-0 on BSSID 28:ac:9e:b6:f9:40(reason 1, caller apf_ms.c:8163)
*apfReceiveTask: Feb 19 10:49:38.249: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 8
*apfReceiveTask: Feb 19 10:49:38.249: 44:55:c4:7b:0a:ca Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Feb 19 10:49:38.249: 44:55:c4:7b:0a:ca Global PMK Cache deletion failed.
*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca Sent Deauthenticate to mobile on BSSID 28:ac:9e:b6:f9:40 slot 0(caller apf_ms.c:8171)
*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca Initiating Accounting request(2) update for mobile
*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca PemLocationConfigured [1]Adding VSA with NAS update and Role[1] with state[0]
*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca apfMsAssoStateDec
*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca apfMsWepPskStateDec
*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca apfMsExpireMobileStation (apf_ms.c:8229) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:40 from Disassociated to Idle

*apfReceiveTask: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 47) in 10 seconds
*spamApTask3: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 28:ac:9e:b6:f9:40
*spamApTask3: Feb 19 10:49:38.250: 44:55:c4:7b:0a:ca Delete Mobile request with reason 'MN_DEL_REAUTH_TIMEOUT' on slot 0 sent to the AP 28:ac:9e:b6:f9:40 IP: 10.30.30.5:5248.
*osapiBsnTimer: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca the value of url acl preserve flag is 0 for mobile 44:55:c4:7b:0a:ca (caller pem_api.c:5155)
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca 10.30.30.35 START (0) Deleted mobile LWAPP rule on AP [28:ac:9e:b6:f9:40]
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca 0 PMK-remove groupcast messages sent
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca Deleting mobile on AP 28:ac:9e:b6:f9:40(0)
*apfReceiveTask: Feb 19 10:49:48.449: 44:55:c4:7b:0a:ca apf_ms.c:5579 Clearing the SGT 0 of mobile
*apfReceiveTask: Feb 19 10:49:48.450: 44:55:c4:7b:0a:ca Decrement the SGT 0 policy count reference by the clients 14
*apfOpenDtlSocket: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Received management frame ASSOCIATION REQUEST on BSSID 28:ac:9e:b6:f9:c0 destination addr 28:ac:9e:b6:f9:c0 slotid 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Processing assoc-req station:44:55:c4:7b:0a:ca AP:28:ac:9e:b6:f9:c0-00 ssid : WIFI-صوتيتال thread:f39caddf80
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfCreateMobileStationEntryWrapper (apf_ms.c:4462) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Idle to Idle

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Adding mobile on LWAPP AP 28:ac:9e:b6:f9:c0(0)
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Created Acct-Session-ID (5e4d12dd/44:55:c4:7b:0a:ca/2739) for the mobile
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Client AVC Roaming context transfer needed? NO
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Setting RTTS enabled to 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Association received from mobile on BSSID 28:ac:9e:b6:f9:c0 AP AP7
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA trying to join WLAN with RSSI 0. Checking for XOR roam conditions on AP: 28:AC:9E:B6:F9:C0 Slot: 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA is associating to AP 28:AC:9E:B6:F9:C0 which is not XOR roam capable
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Global 200 Clients are allowed to AP radio

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Max Client Trap Threshold: 0 cur: 5

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Updated local bridging VLAN to 30 while applying WLAN policy
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca override for default ap group, marking intgrp NULL
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Not re-applying interface policy for local switching Client

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca After applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3338)
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3358)
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3379)
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apf_policy.c:2623 Assigning the SGT 0 to mobile (earlier sgt 0)
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Increment the SGT 0 policy count reference by the clients 15
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Check the client SGT 0 policy and push it to AP 28:ac:9e:b6:f9:c0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca In processSsidIE:7159 setting Central switched to FALSE
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Applying site-specific Local Bridging override for station 44:55:c4:7b:0a:ca - vapId 1, site 'default-group', interface 'management'
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Applying Local Bridging Interface Policy for station 44:55:c4:7b:0a:ca - vlan 30, interface id 0, interface 'management', nasId:''
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca STA - rates (8): 130 132 139 150 12 18 24 36 0 0 0 0 0 0 0 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca STA - rates (12): 130 132 139 150 12 18 24 36 48 72 96 108 0 0 0 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca extSuppRates statusCode is 0 and gotExtSuppRatesElement is 1
*apfMsConnTask_5: Feb 19 10:50:05.296: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_5: Feb 19 10:50:05.296: [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_5: Feb 19 10:50:05.296: [0016] ac 02 28 00

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Processing RSN IE type 48, length 20 for mobile 44:55:c4:7b:0a:ca
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Received 802.11i PSK key management suite, enabling Authentication
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca RSN Capabilities: 40
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca non-11w Capable mobile
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Received RSN IE with 0 PMKIDs from mobile 44:55:c4:7b:0a:ca
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Assigned flex post-auth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Updating AID for REAP AP Client 28:ac:9e:b6:f9:c0 - AID ===> 3
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfVapSecurity=0x40004040 L2=16384 SkipWeb=0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca AuthenticationRequired = 1
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Encryption policy is set to 0x80000001
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001]
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 8021X_REQD (3) DHCP required on AP 28:ac:9e:b6:f9:c0 vapId 1 apVapId 1for this client
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Not Using WMM Compliance code qosCap 00
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Vlan while overriding the policy = -1
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 28:ac:9e:b6:f9:c0 vapId 1 apVapId 1 flex acl-name: v6acl-name
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfMsAssoStateInc
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfMsWepPskStateInc
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Idle to Associated

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfPemAddUser2:session timeout forstation 44:55:c4:7b:0a:ca - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Sending assoc-resp with status 0 station:44:55:c4:7b:0a:ca AP:28:ac:9e:b6:f9:c0-00 on apVapId 1
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca Sending Assoc Response (status: '0') to station on AP AP7 on BSSID 28:ac:9e:b6:f9:c0 ApVapId 1 Slot 0, mobility role 0
*apfMsConnTask_5: Feb 19 10:50:05.296: 44:55:c4:7b:0a:ca apfProcessAssocReq (apf_80211.c:12327) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Associated to Associated

*spamApTask6: Feb 19 10:50:05.297: 44:55:c4:7b:0a:ca Add SGT:0 to AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:50:05.297: 44:55:c4:7b:0a:ca Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask6: Feb 19 10:50:05.297: 44:55:c4:7b:0a:ca Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask6: Feb 19 10:50:05.297: 44:55:c4:7b:0a:ca Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask6: Feb 19 10:50:05.297: 44:55:c4:7b:0a:ca Successful transmission of LWAPP Add-Mobile to AP 28:ac:9e:b6:f9:c0 idx@92
*spamApTask6: Feb 19 10:50:05.297: 44:55:c4:7b:0a:ca Setting ADD_MOBILE (idx 0, seqno 0, action 1, count 2082663097) ack state for STA on AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Received ADD_MOBILE ack - Initiating 1x to STA 44:55:c4:7b:0a:ca (idx 92)
*spamApTask6: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca APF Initiating 1x to STA 44:55:c4:7b:0a:ca
*spamApTask6: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Sent dot1x auth initiate message for mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca dot1xProcessInitiate1XtoMobile to mobile station 44:55:c4:7b:0a:ca (mscb 1, msg 1)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca reauth_sm state transition 0 ---> 1 for mobile 44:55:c4:7b:0a:ca at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Normal psk client, full auth
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Creating a PKC PMKID Cache entry for station 44:55:c4:7b:0a:ca (RSN 2)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Resetting MSCB PMK Cache Entry @index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Created PMKID PMK Cache for BSSID 28:ac:9e:b6:f9:c0 at index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: New PMKID: (16)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: [0000] 6a 5e 38 fc 18 7f b4 f6 cb 8a 6d cc ba e9 05 5b

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Initiating RSN PSK to mobile 44:55:c4:7b:0a:cakeyMgmtType : 0
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca dot1x - moving mobile 44:55:c4:7b:0a:ca into Force Auth state
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Skipping EAP-Success to mobile 44:55:c4:7b:0a:ca (encryptBit:0)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Found an cache entry for BSSID 28:ac:9e:b6:f9:c0 in PMKID cache at index 0 of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Found an cache entry for BSSID 28:ac:9e:b6:f9:c0 in PMKID cache at index 0 of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: Including PMKID in M1 (16)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: [0000] 6a 5e 38 fc 18 7f b4 f6 cb 8a 6d cc ba e9 05 5b

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: M1 - Key Data: (22)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: [0000] dd 14 00 0f ac 04 6a 5e 38 fc 18 7f b4 f6 cb 8a

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: [0016] 6d cc ba e9 05 5b

*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Starting key exchange to mobile 44:55:c4:7b:0a:ca, data packets will be dropped
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Sending EAPOL-Key Message to mobile 44:55:c4:7b:0a:ca
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Feb 19 10:50:05.308: 44:55:c4:7b:0a:ca Allocating EAP Pkt for retransmission to mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 10:50:06.401: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M2
*Dot1x_NW_MsgTask_2: Feb 19 10:50:06.401: 44:55:c4:7b:0a:ca Retransmit 1 of EAPOL-Key M1 (length 121) for mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 10:50:07.421: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M2
*Dot1x_NW_MsgTask_2: Feb 19 10:50:07.421: 44:55:c4:7b:0a:ca Retransmit 2 of EAPOL-Key M1 (length 121) for mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M2
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Retransmit failure for EAPOL-Key M1 to mobile 44:55:c4:7b:0a:ca, retransmit count 3, mscb deauth count 0
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Resetting MSCB PMK Cache Entry @index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Removing BSSID 28:ac:9e:b6:f9:c0 from PMKID cache of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Deleting the PMK cache when de-authenticating the client.
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Global PMK Cache deletion failed.
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Succesfully freed AID 3, slot 0 on AP 28:ac:9e:b6:f9:c0, #client on this slot 5
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Sent Deauthenticate to mobile on BSSID 28:ac:9e:b6:f9:c0 slot 0(caller 1x_ptsm.c:692)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 57) in 10 seconds
*Dot1x_NW_MsgTask_2: Feb 19 10:50:08.441: 44:55:c4:7b:0a:ca Freeing EAP Retransmit Bufer for mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 10:50:18.641: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 10:50:18.641: 44:55:c4:7b:0a:ca apfMsExpireMobileStation (apf_ms.c:8078) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Associated to Disassociated

*apfReceiveTask: Feb 19 10:50:18.641: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
*osapiBsnTimer: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca apfMsAssoStateDec
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca apfMsWepPskStateDec
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca apfMsExpireMobileStation (apf_ms.c:8229) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Disassociated to Idle

*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca the value of url acl preserve flag is 0 for mobile 44:55:c4:7b:0a:ca (caller pem_api.c:5155)
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [28:ac:9e:b6:f9:c0]
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca 0 PMK-remove groupcast messages sent
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca Deleting mobile on AP 28:ac:9e:b6:f9:c0(0)
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca apf_ms.c:5579 Clearing the SGT 0 of mobile
*apfReceiveTask: Feb 19 10:50:28.841: 44:55:c4:7b:0a:ca Decrement the SGT 0 policy count reference by the clients 14
*spamApTask6: Feb 19 10:50:28.842: 44:55:c4:7b:0a:ca Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:50:28.842: 44:55:c4:7b:0a:ca Delete Mobile request with reason 'MN_DEL_PEM_CLEANUP' on slot 0 sent to the AP 28:ac:9e:b6:f9:c0 IP: 10.30.30.8:5256.
*apfOpenDtlSocket: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Received management frame ASSOCIATION REQUEST on BSSID 28:ac:9e:b6:f9:c0 destination addr 28:ac:9e:b6:f9:c0 slotid 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Processing assoc-req station:44:55:c4:7b:0a:ca AP:28:ac:9e:b6:f9:c0-00 ssid : WIFI-صوتيتال thread:f39caddf80
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca apfCreateMobileStationEntryWrapper (apf_ms.c:4462) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Idle to Idle

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Adding mobile on LWAPP AP 28:ac:9e:b6:f9:c0(0)
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Created Acct-Session-ID (5e4d1307/44:55:c4:7b:0a:ca/2741) for the mobile
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Client AVC Roaming context transfer needed? NO
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Setting RTTS enabled to 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Association received from mobile on BSSID 28:ac:9e:b6:f9:c0 AP AP7
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA trying to join WLAN with RSSI 0. Checking for XOR roam conditions on AP: 28:AC:9E:B6:F9:C0 Slot: 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Station: 44:55:C4:7B:0A:CA is associating to AP 28:AC:9E:B6:F9:C0 which is not XOR roam capable
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Global 200 Clients are allowed to AP radio

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Max Client Trap Threshold: 0 cur: 5

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Updated local bridging VLAN to 30 while applying WLAN policy
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca override for default ap group, marking intgrp NULL
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Not re-applying interface policy for local switching Client

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca After applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3338)
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3358)
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3379)
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca apf_policy.c:2623 Assigning the SGT 0 to mobile (earlier sgt 0)
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Increment the SGT 0 policy count reference by the clients 14
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Check the client SGT 0 policy and push it to AP 28:ac:9e:b6:f9:c0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca In processSsidIE:7159 setting Central switched to FALSE
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Applying site-specific Local Bridging override for station 44:55:c4:7b:0a:ca - vapId 1, site 'default-group', interface 'management'
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Applying Local Bridging Interface Policy for station 44:55:c4:7b:0a:ca - vlan 30, interface id 0, interface 'management', nasId:''
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca STA - rates (8): 130 132 139 150 12 18 24 36 0 0 0 0 0 0 0 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca STA - rates (12): 130 132 139 150 12 18 24 36 48 72 96 108 0 0 0 0
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca extSuppRates statusCode is 0 and gotExtSuppRatesElement is 1
*apfMsConnTask_5: Feb 19 10:50:47.996: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_5: Feb 19 10:50:47.996: [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_5: Feb 19 10:50:47.996: [0016] ac 02 28 00

*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Processing RSN IE type 48, length 20 for mobile 44:55:c4:7b:0a:ca
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Received 802.11i PSK key management suite, enabling Authentication
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca RSN Capabilities: 40
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca non-11w Capable mobile
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Received RSN IE with 0 PMKIDs from mobile 44:55:c4:7b:0a:ca
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 19 10:50:47.996: 44:55:c4:7b:0a:ca Assigned flex post-auth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Updating AID for REAP AP Client 28:ac:9e:b6:f9:c0 - AID ===> 3
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca apfVapSecurity=0x40004040 L2=16384 SkipWeb=0
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca AuthenticationRequired = 1
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Encryption policy is set to 0x80000001
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001]
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca 0.0.0.0 8021X_REQD (3) DHCP required on AP 28:ac:9e:b6:f9:c0 vapId 1 apVapId 1for this client
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Not Using WMM Compliance code qosCap 00
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Vlan while overriding the policy = -1
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 28:ac:9e:b6:f9:c0 vapId 1 apVapId 1 flex acl-name: v6acl-name
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca apfMsAssoStateInc
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca apfMsWepPskStateInc
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Idle to Associated

*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca apfPemAddUser2:session timeout forstation 44:55:c4:7b:0a:ca - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Sending assoc-resp with status 0 station:44:55:c4:7b:0a:ca AP:28:ac:9e:b6:f9:c0-00 on apVapId 1
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca Sending Assoc Response (status: '0') to station on AP AP7 on BSSID 28:ac:9e:b6:f9:c0 ApVapId 1 Slot 0, mobility role 0
*apfMsConnTask_5: Feb 19 10:50:47.997: 44:55:c4:7b:0a:ca apfProcessAssocReq (apf_80211.c:12327) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Associated to Associated

*spamApTask6: Feb 19 10:50:47.998: 44:55:c4:7b:0a:ca Add SGT:0 to AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:50:47.998: 44:55:c4:7b:0a:ca Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask6: Feb 19 10:50:47.998: 44:55:c4:7b:0a:ca Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask6: Feb 19 10:50:47.998: 44:55:c4:7b:0a:ca Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask6: Feb 19 10:50:47.998: 44:55:c4:7b:0a:ca Successful transmission of LWAPP Add-Mobile to AP 28:ac:9e:b6:f9:c0 idx@94
*spamApTask6: Feb 19 10:50:47.998: 44:55:c4:7b:0a:ca Setting ADD_MOBILE (idx 0, seqno 0, action 1, count 1831482965) ack state for STA on AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Received ADD_MOBILE ack - Initiating 1x to STA 44:55:c4:7b:0a:ca (idx 94)
*spamApTask6: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca APF Initiating 1x to STA 44:55:c4:7b:0a:ca
*spamApTask6: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Sent dot1x auth initiate message for mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca dot1xProcessInitiate1XtoMobile to mobile station 44:55:c4:7b:0a:ca (mscb 1, msg 1)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca reauth_sm state transition 0 ---> 1 for mobile 44:55:c4:7b:0a:ca at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Normal psk client, full auth
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Creating a PKC PMKID Cache entry for station 44:55:c4:7b:0a:ca (RSN 2)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Resetting MSCB PMK Cache Entry @index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Created PMKID PMK Cache for BSSID 28:ac:9e:b6:f9:c0 at index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: New PMKID: (16)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: [0000] 6a 5e 38 fc 18 7f b4 f6 cb 8a 6d cc ba e9 05 5b

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Initiating RSN PSK to mobile 44:55:c4:7b:0a:cakeyMgmtType : 0
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca dot1x - moving mobile 44:55:c4:7b:0a:ca into Force Auth state
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Skipping EAP-Success to mobile 44:55:c4:7b:0a:ca (encryptBit:0)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Found an cache entry for BSSID 28:ac:9e:b6:f9:c0 in PMKID cache at index 0 of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Found an cache entry for BSSID 28:ac:9e:b6:f9:c0 in PMKID cache at index 0 of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: Including PMKID in M1 (16)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: [0000] 6a 5e 38 fc 18 7f b4 f6 cb 8a 6d cc ba e9 05 5b

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: M1 - Key Data: (22)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: [0000] dd 14 00 0f ac 04 6a 5e 38 fc 18 7f b4 f6 cb 8a

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: [0016] 6d cc ba e9 05 5b

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Starting key exchange to mobile 44:55:c4:7b:0a:ca, data packets will be dropped
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Sending EAPOL-Key Message to mobile 44:55:c4:7b:0a:ca
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.009: 44:55:c4:7b:0a:ca Allocating EAP Pkt for retransmission to mobile 44:55:c4:7b:0a:ca
*dot1xSocketTask: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Received EAPOL-Key from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Received EAPOL-key in PTK_START state (message 2) from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca rsnieCapabilty = 28 rsnie_len =20
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Dumping RSNIE received in Association request(len = 22):
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 00000000: 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 00000010: 00 0f ac 02 28 00 ....(.
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Dumping RSNIE received in EAPOL M2 (len = 20):
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 00000010: ac 02 28 00 ..(.
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Stopping retransmission timer for mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Sending EAPOL-Key Message to mobile 44:55:c4:7b:0a:ca
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.110: 44:55:c4:7b:0a:ca Reusing allocated memory for EAP Pkt for retransmission to mobile 44:55:c4:7b:0a:ca
*dot1xSocketTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Received EAPOL-Key from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Stopping retransmission timer for mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Freeing EAP Retransmit Bufer for mobile 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Mobility query, PEM State: L2AUTHCOMPLETE

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 L2AUTHCOMPLETE (4) NO release MSCB
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Building Mobile Announce :

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Building Client Payload:

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Client Ip: 0.0.0.0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Client Vlan Ip: 10.30.30.2, Vlan mask : 255.255.255.0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Client Vap Security: 1073758272

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Virtual Ip: 2.2.2.2

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca ssid: WIFI-صوتيتال

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Building VlanIpPayload.

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 28:ac:9e:b6:f9:c0 vapId 1 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Vlan while overriding the policy = -1
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 28:ac:9e:b6:f9:c0 vapId 1 apVapId 1 flex acl-name: v6acl-name
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 7237, Adding TMP rule
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 28:ac:9e:b6:f9:c0, slot 0, interface = 1, QOS = 0
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 15206, IntfId = 0 Local Bridging Vlan = 30, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0

*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0)
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Updating info change db with CMX bitmap 0x0000
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) NO release MSCB
*Dot1x_NW_MsgTask_2: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Successfully Plumbed PTK session Keysfor mobile 44:55:c4:7b:0a:ca
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.30.30.2
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Created Cisco-Audit-Session-ID for the mobile: 021e1e0a000008b108134d5e type: local
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Audit session id is created 021e1e0a000008b108134d5e for mobility complete
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca pemAdvanceState2 (pem_api.c:6741) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Associated to Associated

*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6875, Adding TMP rule
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 28:ac:9e:b6:f9:c0, slot 0, interface = 1, QOS = 0
IPv4 ACL ID = 255,
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 15206, IntfId = 0 Local Bridging Vlan = 30, Local Bridging intf id = 0
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0

*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0

*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0

*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0)
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Updating info change db with CMX bitmap 0x0000
*apfReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 DHCP_REQD (7) NO release MSCB
*pemReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*pemReceiveTask: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Add SGT:0 to AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask6: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask6: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask6: Feb 19 10:50:48.118: 44:55:c4:7b:0a:ca Successful transmission of LWAPP Add-Mobile to AP 28:ac:9e:b6:f9:c0 idx@95
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP received op BOOTREQUEST (1) (len 334,vlan 30, port 1, encap 0xec03, xid 0xd0f66c7)
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP processing DHCP REQUEST (3)
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP xid: 0xc7660f0d (3345354509), secs: 0, flags: 0
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP chaddr: 44:55:c4:7b:0a:ca
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP requested ip: 10.30.30.35
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP (Request): recording dhcp start timestamp (1582109448245797)
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP received op BOOTREQUEST (1) (len 334,vlan 30, port 1, encap 0xec00, xid 0xd0f66c7)
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 19 10:50:48.245: 44:55:c4:7b:0a:ca DHCP dropping looped REQUEST from DS (encap type 0xec00)
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP received op BOOTREPLY (2) (len 308,vlan 30, port 1, encap 0xec03, xid 0xd0f66c7)
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP processing DHCP ACK (5)
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP xid: 0xc7660f0d (3345354509), secs: 0, flags: 0
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP chaddr: 44:55:c4:7b:0a:ca
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP ciaddr: 0.0.0.0, yiaddr: 10.30.30.35
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP server id: 10.30.30.254 rcvd server id: 10.30.30.254
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca apfMsRunStateInc
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca 10.30.30.35 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)

*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca the value of url acl preserve flag is 0 for mobile 44:55:c4:7b:0a:ca (caller pem_api.c:7860)
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca Initiating Accounting request(0) update for mobile
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca PemLocationConfigured [1]Adding VSA with NAS update and Role[1] with state[0]
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca 10.30.30.35 RUN (20) NO release MSCB
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca Assigning Address 10.30.30.35 to mobile
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP success event for client. Clearing dhcp failure count for interface management.
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca DHCP success event for client. Clearing dhcp failure count for interface management.
*DHCP Socket Task: Feb 19 10:50:48.247: 44:55:c4:7b:0a:ca Updated the GW a*apfOpenDtlSocket: Feb 19 10:50:53.454: 44:55:c4:7b:0a:ca Received management frame ACTION on BSSID 28:ac:9e:b6:f9:c0 destination addr 28:ac:9e:b6:f9:c0 slotid 0
*apfMsConnTask_5: Feb 19 10:50:53.454: 44:55:c4:7b:0a:ca Got action frame from the client (ActionCategory:10), payloadLen:4
*apfOpenDtlSocket: Feb 19 10:50:53.519: 44:55:c4:7b:0a:ca Received management frame ACTION on BSSID 28:ac:9e:b6:f9:c0 destination addr 28:ac:9e:b6:f9:c0 slotid 0
*apfMsConnTask_5: Feb 19 10:50:53.519: 44:55:c4:7b:0a:ca Got action frame from the client (ActionCategory:10), payloadLen:5

(Cisco Controller) >

 

 

Highlighted
Participant

Re: phone Huawei  cannot connected to this access point number 5

i send you the second output but this phone also connected  to  AP7 and not to ap 5 ??,

 

so what do you think about problem for this phone Huawei !!

 

//////////////////////////////////////////////////////////////////////////////////////////////////////////////

 

 

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2020.02.19 14:13:51 =~=~=~=~=~=~=~=~=~=~=~=
debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >debug client 44:55:c4:7b:0a:ca

(Cisco Controller) >*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca GTK rotation for the client
*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca Key exchange done, data packets from mobile 44:55:c4:7b:0a:ca should be forwarded shortly
*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca Sending EAPOL-Key Message to mobile 44:55:c4:7b:0a:ca
state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca Allocating EAP Pkt for retransmission to mobile 44:55:c4:7b:0a:ca
*dot1xMsgTask: Feb 19 13:05:08.132: 44:55:c4:7b:0a:ca Updated broadcast key sent to mobile 44:55:C4:7B:0A:CA
*osapiBsnTimer: Feb 19 13:05:09.332: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M5
*Dot1x_NW_MsgTask_2: Feb 19 13:05:09.332: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 13:05:09.332: 44:55:c4:7b:0a:ca Retransmit 1 of EAPOL-Key M5 (length 147) for mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 13:05:10.332: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M5
*Dot1x_NW_MsgTask_2: Feb 19 13:05:10.333: 44:55:c4:7b:0a:ca key Desc Version FT - 0

*Dot1x_NW_MsgTask_2: Feb 19 13:05:10.333: 44:55:c4:7b:0a:ca Retransmit 2 of EAPOL-Key M5 (length 147) for mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M5
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Retransmit failure for EAPOL-Key M5 to mobile 44:55:c4:7b:0a:ca, retransmit count 3, mscb deauth count 0
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Resetting MSCB PMK Cache Entry @index 0 for station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Removing BSSID 28:ac:9e:b6:f9:c0 from PMKID cache of station 44:55:c4:7b:0a:ca
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Deleting the PMK cache when de-authenticating the client.
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Global PMK Cache deletion failed.
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Succesfully freed AID 6, slot 0 on AP 28:ac:9e:b6:f9:c0, #client on this slot 4
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Sent Deauthenticate to mobile on BSSID 28:ac:9e:b6:f9:c0 slot 0(caller 1x_ptsm.c:692)
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 57) in 10 seconds
*Dot1x_NW_MsgTask_2: Feb 19 13:05:11.332: 44:55:c4:7b:0a:ca Freeing EAP Retransmit Bufer for mobile 44:55:c4:7b:0a:ca
*osapiBsnTimer: Feb 19 13:05:21.332: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 13:05:21.332: 44:55:c4:7b:0a:ca apfMsExpireMobileStation (apf_ms.c:8078) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Associated to Disassociated

*apfReceiveTask: Feb 19 13:05:21.332: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
*osapiBsnTimer: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca apfSendDisAssocMsgDebug (apf_80211.c:4013) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Disassociated to Disassociated

*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Sent Disassociate to mobile on AP 28:ac:9e:b6:f9:c0-0 on BSSID 28:ac:9e:b6:f9:c0(reason 1, caller apf_ms.c:8163)
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Setting active key cache index 8 ---> 8
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Global PMK Cache deletion failed.
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Sent Deauthenticate to mobile on BSSID 28:ac:9e:b6:f9:c0 slot 0(caller apf_ms.c:8171)
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Initiating Accounting request(2) update for mobile
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca PemLocationConfigured [1]Adding VSA with NAS update and Role[1] with state[0]
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca apfMsAssoStateDec
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca apfMsWepPskStateDec
*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca apfMsExpireMobileStation (apf_ms.c:8229) Changing state for mobile 44:55:c4:7b:0a:ca on AP 28:ac:9e:b6:f9:c0 from Disassociated to Idle

*apfReceiveTask: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Scheduling deletion of Mobile Station: (callerId: 47) in 10 seconds
*spamApTask6: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 28:ac:9e:b6:f9:c0
*spamApTask6: Feb 19 13:05:31.332: 44:55:c4:7b:0a:ca Delete Mobile request with reason 'MN_DEL_REAUTH_TIMEOUT' on slot 0 sent to the AP 28:ac:9e:b6:f9:c0 IP: 10.30.30.8:5256.
*osapiBsnTimer: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca apfMsExpireCallback (apf_ms.c:665) Expiring Mobile!
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca the value of url acl preserve flag is 0 for mobile 44:55:c4:7b:0a:ca (caller pem_api.c:5155)
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca 10.30.30.35 START (0) Deleted mobile LWAPP rule on AP [28:ac:9e:b6:f9:c0]
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca 0 PMK-remove groupcast messages sent
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca Deleted global PMK cache and MSCB PMKID/PMK cache entry for the client
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca Deleting mobile on AP 28:ac:9e:b6:f9:c0(0)
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca apf_ms.c:5579 Clearing the SGT 0 of mobile
*apfReceiveTask: Feb 19 13:05:41.332: 44:55:c4:7b:0a:ca Decrement the SGT 0 policy count reference by the clients 8

(Cisco Controller) >

Highlighted
VIP Advocate

Re: phone Huawei  cannot connected to this access point number 5

I tend to say it's a firmware bug of either the Huawei or the AP:
*osapiBsnTimer: Feb 19 10:50:06.401: 44:55:c4:7b:0a:ca 802.1x 'timeoutEvt' Timer expired for station 44:55:c4:7b:0a:ca and for message = M2
*Dot1x_NW_MsgTask_2: Feb 19 10:50:06.401: 44:55:c4:7b:0a:ca Retransmit 1 of EAPOL-Key M1 (length 121) for mobile 44:55:c4:7b:0a:ca

What software version is on the AP?
Highlighted
Participant

Re: phone Huawei  cannot connected to this access point number 5

phone Huaweu Y7  and acces point 1815i version 8.8.100 and Vcontroller 

 

this phone can only conntect all acces point only this access point ap5

 

yesterday this phone is ok but to day this phone can't connect to AP5

 

so please what do you think about this problem !!!?,

 

 

Highlighted
Participant

Re: phone Huawei  cannot connected to this access point number 5

i wait a solution for problem of mobile huawei y 7  that it can't join to accces point number 5 but it can join other access point 

 

i need what i can doing for this problem of Mobile huawei y 7  ??????????

 

acces point 1815i with version 8.8.100

and V controller with version 8.9.111

 

So i need troubleshooting and a solution ??

 

also we have a FW in network entreprise 

 

 

Highlighted
VIP Mentor

Re: phone Huawei  cannot connected to this access point number 5

I would say if all other phone are connecting to AP5 and only one phone have an issue then it must be the problem with phone not with wireless.

 

Regards

Dont forget to rate helpful posts

Highlighted
Participant

Re: phone Huawei  cannot connected to this access point number 5

fisrt : i try to rest AP5 and i send you the result 

 

second , later i try side phone 

 

thanks in advance

 

Highlighted
Participant

Re: phone Huawei  cannot connected to this access point number 5

i sand you about Traps Logs about this phone in controller cisco

 

can you check this output Traps Logs from the controller

 

 

 

 

Highlighted
VIP Advocate

Re: phone Huawei  cannot connected to this access point number 5

CreatePlease to create content
Content for Community-Ad

Cisco COVID-19 Survey