cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2874
Views
0
Helpful
2
Replies

802.1x 'txWhen' Timer expired

Please attech the files

 

WLC_Client_Capture.png

 

(Cisco Controller) >debug client 74:e5:f9:ac:8c:bc

(Cisco Controller) >debug aaa events enable

(Cisco Controller) >*radiusTransportThread: Feb 14 00:18:32.224: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*apfOpenDtlSocket: Feb 14 00:18:52.876: [PA] 74:e5:f9:ac:8c:bc Recevied management frame ASSOCIATION REQUEST on BSSID 5c:a4:8a:1e:15:7c destination addr 5c:a4:8a:1e:15:7c
*apfMsConnTask_1: Feb 14 00:18:52.876: [PA] 74:e5:f9:ac:8c:bc Processing assoc-req station:74:e5:f9:ac:8c:bc AP:5c:a4:8a:1e:15:70-01 ssid : ns thread:1a94d430
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Created Acct-Session-ID (5e4568dc/74:e5:f9:ac:8c:bc/690360) for the mobile
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Adding mobile on LWAPP AP 5c:a4:8a:1e:15:70(1)
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Association received from mobile on BSSID 5c:a4:8a:1e:15:7c AP NS_AP_6F_C
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Station: 74:E5:F9:AC:8C:BC 11v BSS Transition not enabled on the AP 5C:A4:8A:1E:15:70
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Global 200 Clients are allowed to AP radio

*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc override for default ap group, marking intgrp NULL
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Applying Interface(144) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Re-applying interface policy for client

*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'deny_server' (ACL ID 1) --- (caller apf_policy.c:2920)
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942)
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963)
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_1: Feb 14 00:18:52.877: [PA] 74:e5:f9:ac:8c:bc Applying site-specific Local Bridging override for station 74:e5:f9:ac:8c:bc - vapId 4, site 'default-group', interface '144'
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Applying Local Bridging Interface Policy for station 74:e5:f9:ac:8c:bc - vlan 144, interface id 14, interface '144'
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc STA - rates (7): 12 18 24 36 176 72 96 0 0 0 0 0 0 0 0 0
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] [0016] ac 01 3c 00 00 00

*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Processing RSN IE type 48, length 22 for mobile 74:e5:f9:ac:8c:bc
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc RSN Capabilities: 60
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Marking Mobile as non-11w Capable
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Received RSN IE with 0 PMKIDs from mobile 74:e5:f9:ac:8c:bc
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Setting active key cache index 8 ---> 8
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc unsetting PmkIdValidatedByAp
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Created Cisco-Audit-Session-ID for the mobile: ac14c9090009f7005e4568dc
*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc apfProcessAssocReq (apf_80211.c:10886) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:15:70 from Idle to AAA Pending

*apfMsConnTask_1: Feb 14 00:18:52.878: [PA] 74:e5:f9:ac:8c:bc Scheduling deletion of Mobile Station: (callerId: 20) in 10 seconds
*aaaQueueReader: Feb 14 00:18:52.879: [PA] 74:e5:f9:ac:8c:bc radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.30.1.55 port 1812 index 2 active 1
*aaaQueueReader: Feb 14 00:18:52.879: [PA] 74:e5:f9:ac:8c:bc radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.30.1.45 port 1812 index 0 active 1
*aaaQueueReader: Feb 14 00:18:52.879: [PA] 74:e5:f9:ac:8c:bc Send Radius Auth Request with pktId:226 into qid:4 of server at index:2
*aaaQueueReader: Feb 14 00:18:52.879: [PA] Request Authenticator 2d:24:ef:7c:31:1d:7d:5a:dc:dc:d9:bb:be:0c:74:37
*aaaQueueReader: Feb 14 00:18:52.879: [PA] 74:e5:f9:ac:8c:bc Sending the packet to v4 host 172.30.1.55:1812
*aaaQueueReader: Feb 14 00:18:52.879: [PA] 74:e5:f9:ac:8c:bc Successful transmission of Authentication Packet (pktId 226) to 172.30.1.55:1812 from server queue 4, proxy state 74:e5:f9:ac:8c:bc-00:00
*radiusTransportThread: Feb 14 00:18:52.885: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:18:52.885: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:18:52.885: [PA] 74:e5:f9:ac:8c:bc Access-Accept received from RADIUS server 172.30.1.55 (qid:4) with port:1812, pktId:226 for mobile 74:e5:f9:ac:8c:bc receiveId = 0
*radiusTransportThread: Feb 14 00:18:52.885: [PA] 74:e5:f9:ac:8c:bc processing avps[0]: attribute 1
*radiusTransportThread: Feb 14 00:18:52.885: [PA] 74:e5:f9:ac:8c:bc username = 74-E5-F9-AC-8C-BC
*radiusTransportThread: Feb 14 00:18:52.885: [PA] 74:e5:f9:ac:8c:bc processing avps[1]: attribute 25
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Received SGT for this Client.
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc SGT received is '' with length 0 for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Resetting web IPv4 acl from 255 to 255

*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Resetting web IPv4 Flex acl from 65535 to 65535

*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Username entry (74-E5-F9-AC-8C-BC) created for mobile, length = 253
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Username entry (74-E5-F9-AC-8C-BC) created in mscb for mobile, length = 253
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Allocate AID 5 slot 1 on AP NS_AP_6F_C #clients on this slot 3
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Applying new AAA override for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Override values for station 74:e5:f9:ac:8c:bc
source: 2, valid bits: 0x0
qosLevel: -1, dscp: 0xffffffff, dot1pTag: 0xffffffff, sessionTimeout: -1

*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Override values (cont..) dataAvgC: -1, rTAvgC: -1, dataBurstC: -1, rTimeBurstC: -1
vlanIfName: '', vlanId:0, aclName: ', ipv6AclName: , avcProfileName: '

*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc override for default ap group, marking intgrp NULL
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Applying Interface(144) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 144

*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Re-applying interface policy for client

*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv4 ACL 'deny_server' (ACL ID 1) ===> 'deny_server' (ACL ID 1) --- (caller apf_policy.c:2920)
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942)
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963)
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfReceiveTask: Feb 14 00:18:52.886: [PA] 74:e5:f9:ac:8c:bc Inserting AAA Override struct for mobile
MAC: 74:e5:f9:ac:8c:bc, source 2

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Inserting new RADIUS override into chain for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Override values for station 74:e5:f9:ac:8c:bc
source: 2, valid bits: 0x0
qosLevel: -1, dscp: 0xffffffff, dot1pTag: 0xffffffff, sessionTimeout: -1

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Override values (cont..) dataAvgC: -1, rTAvgC: -1, dataBurstC: -1, rTimeBurstC: -1
vlanIfName: '', vlanId:0, aclName: ', ipv6AclName: , avcProfileName: '

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Initializing policy
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc AuthenticationRequired = 1
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Encryption policy is set to 0x80000001
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Not Using WMM Compliance code qosCap 00
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Vlan while overriding the policy = -1
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 5c:a4:8a:1e:15:70 vapId 4 apVapId 4 flex-acl-name:
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc apfMsAssoStateInc
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc apfPemAddUser2 (apf_policy.c:416) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:15:70 from AAA Pending to Associated

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc apfPemAddUser2:session timeout forstation 74:e5:f9:ac:8c:bc - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Stopping deletion of Mobile Station: (callerId: 48)
*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfReceiveTask: Feb 14 00:18:52.887: [PA] 74:e5:f9:ac:8c:bc Sending assoc-resp with status 0 station:74:e5:f9:ac:8c:bc AP:5c:a4:8a:1e:15:70-01 on apVapId 4
*apfReceiveTask: Feb 14 00:18:52.888: [PA] 74:e5:f9:ac:8c:bc Sending Assoc Response (status: '0') to station on AP NS_AP_6F_C on BSSID 5c:a4:8a:1e:15:7c ApVapId 4 Slot 1, mobility role 0
*apfReceiveTask: Feb 14 00:18:52.888: [PA] 74:e5:f9:ac:8c:bc apfProcessRadiusAssocResp (apf_80211.c:4677) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:15:70 from Associated to Associated

*apfOpenDtlSocket: Feb 14 00:18:52.889: [PA] 74:e5:f9:ac:8c:bc Recevied management frame ACTION on BSSID 5c:a4:8a:1e:15:7c destination addr 5c:a4:8a:1e:15:7c
*apfMsConnTask_1: Feb 14 00:18:52.889: [PA] 74:e5:f9:ac:8c:bc Got action frame from the client (ActionCategory:7)
*apfMsConnTask_1: Feb 14 00:18:52.889: [PA] 74:e5:f9:ac:8c:bc Dropping action frame from the client (Unsupported ActionCategory:7)
*spamApTask2: Feb 14 00:18:52.890: [PA] 74:e5:f9:ac:8c:bc Successful transmission of LWAPP Add-Mobile to AP 5c:a4:8a:1e:15:70
*spamApTask2: Feb 14 00:18:52.891: [PA] 74:e5:f9:ac:8c:bc Received ADD_MOBILE ack - Initiating 1x to STA 74:e5:f9:ac:8c:bc (idx 50)
*spamApTask2: Feb 14 00:18:52.891: [PA] 74:e5:f9:ac:8c:bc Sent dot1x auth initiate message for mobile 74:e5:f9:ac:8c:bc
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.891: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 1 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.892: [PA] 74:e5:f9:ac:8c:bc EAP-PARAM Debug - eap-params for Wlan-Id :4 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.892: [PA] 74:e5:f9:ac:8c:bc Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.892: [PA] 74:e5:f9:ac:8c:bc Station 74:e5:f9:ac:8c:bc setting dot1x reauth timeout = 1800
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.892: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.892: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 1)
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.908: [PA] 74:e5:f9:ac:8c:bc Received EAPOL START, dot1x state = 2
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.908: [PA] 74:e5:f9:ac:8c:bc Reset the reauth counter since EAPOL START has been received!!!
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.909: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 1 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.909: [PA] 74:e5:f9:ac:8c:bc Received EAPOL START from mobile 74:e5:f9:ac:8c:bc
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.909: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.909: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 2)
*Dot1x_NW_MsgTask_4: Feb 14 00:18:52.909: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:71
*apfLbsTask: Feb 14 00:18:54.075: [PA] 74:e5:f9:ac:8c:bc Copy AP LOCP - mode:0 slotId:137, apMac 0x5c:a4:8a:1e:15:70
*apfLbsTask: Feb 14 00:18:54.075: [PA] 74:e5:f9:ac:8c:bc Copy WLAN LOCP EssIndex:4 aid:5 ssid: ns
*apfLbsTask: Feb 14 00:18:54.075: [PA] 74:e5:f9:ac:8c:bc Copy Security LOCP ecypher:0x0 ptype:0x2, p:0x1, eaptype:0x6 w:0x1 aalg:0x0, PMState: 8021X_REQD
*apfLbsTask: Feb 14 00:18:54.075: [PA] 74:e5:f9:ac:8c:bc Copy 802.11 LOCP a:0x0 b:0x0 c:0x0 d:0x0 e:0x0 protocol1:0x0 protocol2:0x7 statuscode 0, reasoncode 99, status 3
*apfLbsTask: Feb 14 00:18:54.075: [PA] 74:e5:f9:ac:8c:bc Copy Username LOCP : 74-E5-F9-AC-8C-BC
*apfLbsTask: Feb 14 00:18:54.076: [PA] 74:e5:f9:ac:8c:bc Copy CCX LOCP 4
*apfLbsTask: Feb 14 00:18:54.076: [PA] 74:e5:f9:ac:8c:bc Copy e2e LOCP 0x1
*apfLbsTask: Feb 14 00:18:54.076: [PA] 74:e5:f9:ac:8c:bc Copy MobilityData LOCP status:0, anchorip:0x0
*aaaQueueReader: Feb 14 00:18:58.147: [PA] Request Authenticator 0d:d7:c9:51:59:97:2e:6b:1c:1f:df:33:1c:47:f6:30
*radiusTransportThread: Feb 14 00:18:58.154: [PA] Vendor Specif Radius Attribute(code=26, avp_len=28, vId=9)
*radiusTransportThread: Feb 14 00:18:58.154: [PA] Vendor Specif Radius Attribute(code=26, avp_len=28, vId=9)
*radiusTransportThread: Feb 14 00:18:58.385: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*radiusTransportThread: Feb 14 00:18:58.385: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*radiusTransportThread: Feb 14 00:18:58.385: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*radiusTransportThread: Feb 14 00:18:58.385: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*aaaQueueReader: Feb 14 00:19:10.570: [PA] Request Authenticator 1f:0b:89:35:b8:ad:41:04:77:f6:53:f6:ac:ee:31:a2
*aaaQueueReader: Feb 14 00:19:20.483: [PA] Request Authenticator 83:5b:58:00:62:a6:e4:e4:85:7a:b8:3e:93:ec:01:f8
*radiusTransportThread: Feb 14 00:19:20.491: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:19:20.491: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*aaaQueueReader: Feb 14 00:19:22.619: [PA] Request Authenticator ff:7a:c9:9d:7c:46:ed:44:b4:96:15:0d:0b:1d:c8:a2
*radiusTransportThread: Feb 14 00:19:22.626: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:19:22.626: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*osapiBsnTimer: Feb 14 00:19:22.879: [PA] 74:e5:f9:ac:8c:bc 802.1x 'txWhen' Timer expired for station 74:e5:f9:ac:8c:bc and for message = M0
*Dot1x_NW_MsgTask_4: Feb 14 00:19:22.879: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:19:22.879: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 3)
*Dot1x_NW_MsgTask_4: Feb 14 00:19:22.879: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:71
*aaaQueueReader: Feb 14 00:19:46.792: [PA] Request Authenticator e2:fb:d9:5d:9b:8e:5e:5d:d8:d0:18:51:f6:29:3b:ce
*radiusTransportThread: Feb 14 00:19:46.799: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:19:46.799: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*osapiBsnTimer: Feb 14 00:19:52.879: [PA] 74:e5:f9:ac:8c:bc 802.1x 'txWhen' Timer expired for station 74:e5:f9:ac:8c:bc and for message = M0
*Dot1x_NW_MsgTask_4: Feb 14 00:19:52.879: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:19:52.879: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 4)
*Dot1x_NW_MsgTask_4: Feb 14 00:19:52.879: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:71
*aaaQueueReader: Feb 14 00:19:55.881: [PA] Request Authenticator 79:a3:88:f7:81:72:0d:b3:60:7e:36:3d:8a:e4:79:43
*radiusTransportThread: Feb 14 00:19:55.888: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:19:55.888: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*aaaQueueReader: Feb 14 00:20:05.135: [PA] Request Authenticator f8:f7:a9:f3:44:dc:89:f5:6e:b6:b5:fd:c1:03:b8:54
*radiusTransportThread: Feb 14 00:20:05.141: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:20:05.141: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*aaaQueueReader: Feb 14 00:20:14.618: [PA] Request Authenticator 82:83:c1:f8:58:e9:5c:2e:04:d9:96:39:c8:9e:6c:05
*osapiBsnTimer: Feb 14 00:20:22.879: [PA] 74:e5:f9:ac:8c:bc 802.1x 'txWhen' Timer expired for station 74:e5:f9:ac:8c:bc and for message = M0
*Dot1x_NW_MsgTask_4: Feb 14 00:20:22.879: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:20:22.879: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 5)
*Dot1x_NW_MsgTask_4: Feb 14 00:20:22.879: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:71
*aaaQueueReader: Feb 14 00:20:27.087: [PA] Request Authenticator 95:80:1f:7f:3b:74:5e:2c:f5:a7:92:9b:a8:66:1c:ce
*aaaQueueReader: Feb 14 00:20:27.234: [PA] Request Authenticator a1:29:89:3c:93:9b:a1:7f:13:6b:bc:d6:50:70:7f:c8
*radiusTransportThread: Feb 14 00:20:27.240: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:20:27.240: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*aaaQueueReader: Feb 14 00:20:30.622: [PA] Request Authenticator 76:1f:0c:1b:66:61:47:33:14:c7:02:4c:44:eb:f9:6a
*aaaQueueReader: Feb 14 00:20:38.628: [PA] Request Authenticator 54:b1:3c:ca:bd:3f:21:2d:f6:b8:5b:f6:31:25:0a:b7
*aaaQueueReader: Feb 14 00:20:45.987: [PA] Request Authenticator 79:5f:52:fe:7e:61:81:d3:3b:3d:f7:8c:1c:a9:6f:37
*radiusTransportThread: Feb 14 00:20:45.994: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:20:45.994: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*osapiBsnTimer: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc 802.1x 'txWhen' Timer expired for station 74:e5:f9:ac:8c:bc and for message = M0
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Reached Max EAP-Identity Request retries (3) for STA 74:e5:f9:ac:8c:bc
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Deleting the PMK cache when de-authenticating the client.
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Global PMK Cache deletion failed.
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Succesfully freed AID 5, slot 1 on AP 5c:a4:8a:1e:15:70, #client on this slot 2
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Sent Deauthenticate to mobile on BSSID 5c:a4:8a:1e:15:7c slot 1(caller 1x_auth_pae.c:5751)
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Scheduling deletion of Mobile Station: (callerId: 6) in 10 seconds
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc Not sending EAP-Failure for STA 74:e5:f9:ac:8c:bc
*Dot1x_NW_MsgTask_4: Feb 14 00:20:52.883: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:71
*osapiBsnTimer: Feb 14 00:21:02.883: [PA] 74:e5:f9:ac:8c:bc apfMsExpireCallback (apf_ms.c:639) Expiring Mobile!
*apfReceiveTask: Feb 14 00:21:02.883: [PA] 74:e5:f9:ac:8c:bc apfMsExpireMobileStation (apf_ms.c:7688) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:15:70 from Associated to Disassociated

*apfReceiveTask: Feb 14 00:21:02.883: [PA] 74:e5:f9:ac:8c:bc Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
*osapiBsnTimer: Feb 14 00:21:12.883: [PA] 74:e5:f9:ac:8c:bc apfMsExpireCallback (apf_ms.c:639) Expiring Mobile!
*apfReceiveTask: Feb 14 00:21:12.883: [PA] 74:e5:f9:ac:8c:bc Sending Accounting request (2) for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:21:12.883: [PA] 74:e5:f9:ac:8c:bc apfMsAssoStateDec
*apfReceiveTask: Feb 14 00:21:12.883: [PA] 74:e5:f9:ac:8c:bc apfMsExpireMobileStation (apf_ms.c:7821) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:15:70 from Disassociated to Idle

*apfReceiveTask: Feb 14 00:21:12.883: [PA] 74:e5:f9:ac:8c:bc pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Feb 14 00:21:12.883: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [5c:a4:8a:1e:15:70]
*apfReceiveTask: Feb 14 00:21:12.884: [PA] 74:e5:f9:ac:8c:bc Username entry '74-E5-F9-AC-8C-BC' is deleted for mobile from the UserName table
*apfReceiveTask: Feb 14 00:21:12.884: [PA] 74:e5:f9:ac:8c:bc Username entry 74-E5-F9-AC-8C-BC deleted for mobile
*spamApTask2: Feb 14 00:21:12.884: [PA] 74:e5:f9:ac:8c:bc Delete Mobile request on slot 1 sent to the AP 5c:a4:8a:1e:15:70 IP: 172.17.206.8:57465

*apfReceiveTask: Feb 14 00:21:12.884: [PA] 74:e5:f9:ac:8c:bc Deleting mobile on AP 5c:a4:8a:1e:15:70(1)
*spamApTask2: Feb 14 00:21:12.885: [PA] 74:e5:f9:ac:8c:bc apfUpdateDeleteAckInMscb (apf_api.c:51702) Expiring Mobile!
*aaaQueueReader: Feb 14 00:21:20.889: [PA] Request Authenticator 7a:71:08:47:16:d2:28:2e:53:29:de:6a:f6:6f:1c:f7
*radiusTransportThread: Feb 14 00:21:20.897: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:21:20.897: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*aaaQueueReader: Feb 14 00:21:22.608: [PA] Request Authenticator 6c:ca:45:ca:9d:5c:26:88:0a:1a:a8:c7:b7:53:28:70
*radiusTransportThread: Feb 14 00:21:22.615: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:21:22.615: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*aaaQueueReader: Feb 14 00:21:23.852: [PA] Request Authenticator 56:81:63:f5:6a:ef:65:ab:d5:0b:f1:39:a1:b8:b4:cb
*radiusTransportThread: Feb 14 00:21:23.859: [PA] Vendor Specif Radius Attribute(code=26, avp_len=28, vId=9)
*radiusTransportThread: Feb 14 00:21:23.859: [PA] Vendor Specif Radius Attribute(code=26, avp_len=28, vId=9)
*radiusTransportThread: Feb 14 00:21:24.148: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*radiusTransportThread: Feb 14 00:21:24.148: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*radiusTransportThread: Feb 14 00:21:24.148: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*radiusTransportThread: Feb 14 00:21:24.148: [PA] Vendor Specif Radius Attribute(code=26, avp_len=58, vId=311)
*aaaQueueReader: Feb 14 00:21:26.084: [PA] Request Authenticator 5d:10:ae:e7:28:94:84:46:50:2f:a8:aa:f8:31:89:4b
*radiusTransportThread: Feb 14 00:21:26.092: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:21:26.092: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*apfOpenDtlSocket: Feb 14 00:21:34.321: [PA] 74:e5:f9:ac:8c:bc Recevied management frame REASSOCIATION REQUEST on BSSID 5c:a4:8a:1e:17:2c destination addr 5c:a4:8a:1e:17:2c
*apfMsConnTask_3: Feb 14 00:21:34.321: [PA] 74:e5:f9:ac:8c:bc Processing assoc-req station:74:e5:f9:ac:8c:bc AP:5c:a4:8a:1e:17:20-01 ssid : ns thread:1a94dc00
*apfMsConnTask_3: Feb 14 00:21:34.321: [PA] 74:e5:f9:ac:8c:bc Created Acct-Session-ID (5e45697e/74:e5:f9:ac:8c:bc/690375) for the mobile
*apfMsConnTask_3: Feb 14 00:21:34.321: [PA] 74:e5:f9:ac:8c:bc Adding mobile on LWAPP AP 5c:a4:8a:1e:17:20(1)
*apfMsConnTask_3: Feb 14 00:21:34.321: [PA] 74:e5:f9:ac:8c:bc Reassociation received from mobile on BSSID 5c:a4:8a:1e:17:2c AP NS_AP_5F_C
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Station: 74:E5:F9:AC:8C:BC 11v BSS Transition not enabled on the AP 5C:A4:8A:1E:17:20
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Global 200 Clients are allowed to AP radio

*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Max Client Trap Threshold: 0 cur: 3

*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc override for default ap group, marking intgrp NULL
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Applying Interface(144) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Re-applying interface policy for client

*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'deny_server' (ACL ID 1) --- (caller apf_policy.c:2920)
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942)
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963)
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Applying site-specific Local Bridging override for station 74:e5:f9:ac:8c:bc - vapId 4, site 'default-group', interface '144'
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc Applying Local Bridging Interface Policy for station 74:e5:f9:ac:8c:bc - vlan 144, interface id 14, interface '144'
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc STA - rates (7): 12 18 24 36 176 72 96 0 0 0 0 0 0 0 0 0
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] 74:e5:f9:ac:8c:bc suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_3: Feb 14 00:21:34.322: [PA] RSNIE in Assoc. Req.: (22)

*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] [0016] ac 01 3c 00 00 00

*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Processing RSN IE type 48, length 22 for mobile 74:e5:f9:ac:8c:bc
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc RSN Capabilities: 60
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Marking Mobile as non-11w Capable
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Received RSN IE with 0 PMKIDs from mobile 74:e5:f9:ac:8c:bc
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Setting active key cache index 8 ---> 8
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc unsetting PmkIdValidatedByAp
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Created Cisco-Audit-Session-ID for the mobile: ac14c9090009f70f5e45697e
*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc apfProcessAssocReq (apf_80211.c:10886) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:17:20 from Idle to AAA Pending

*apfMsConnTask_3: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Scheduling deletion of Mobile Station: (callerId: 20) in 10 seconds
*aaaQueueReader: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.30.1.55 port 1812 index 2 active 1
*aaaQueueReader: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 172.30.1.45 port 1812 index 0 active 1
*aaaQueueReader: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Send Radius Auth Request with pktId:227 into qid:4 of server at index:2
*aaaQueueReader: Feb 14 00:21:34.323: [PA] Request Authenticator 14:11:86:a3:07:0f:7f:a8:e5:cc:9f:31:6c:ca:8a:53
*aaaQueueReader: Feb 14 00:21:34.323: [PA] 74:e5:f9:ac:8c:bc Sending the packet to v4 host 172.30.1.55:1812
*aaaQueueReader: Feb 14 00:21:34.324: [PA] 74:e5:f9:ac:8c:bc Successful transmission of Authentication Packet (pktId 227) to 172.30.1.55:1812 from server queue 4, proxy state 74:e5:f9:ac:8c:bc-00:00
*radiusTransportThread: Feb 14 00:21:34.329: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:21:34.329: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Access-Accept received from RADIUS server 172.30.1.55 (qid:4) with port:1812, pktId:227 for mobile 74:e5:f9:ac:8c:bc receiveId = 0
*radiusTransportThread: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc processing avps[0]: attribute 1
*radiusTransportThread: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc username = 74-E5-F9-AC-8C-BC
*radiusTransportThread: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc processing avps[1]: attribute 25
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Received SGT for this Client.
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc SGT received is '' with length 0 for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Resetting web IPv4 acl from 255 to 255

*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Resetting web IPv4 Flex acl from 65535 to 65535

*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Username entry (74-E5-F9-AC-8C-BC) created for mobile, length = 253
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Username entry (74-E5-F9-AC-8C-BC) created in mscb for mobile, length = 253
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Allocate AID 5 slot 1 on AP NS_AP_5F_C #clients on this slot 4
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Applying new AAA override for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Override values (cont..) dataAvgC: -1, rTAvgC: -1, dataBurstC: -1, rTimeBurstC: -1
vlanIfName: '', vlanId:0, aclName: ', ipv6AclName: , avcProfileName: '

*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc override for default ap group, marking intgrp NULL
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Applying Interface(144) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 144

*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc Re-applying interface policy for client

*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942)
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963)
*apfReceiveTask: Feb 14 00:21:34.330: [PA] 74:e5:f9:ac:8c:bc apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Inserting AAA Override struct for mobile
MAC: 74:e5:f9:ac:8c:bc, source 2

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Inserting new RADIUS override into chain for station 74:e5:f9:ac:8c:bc
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Override values for station 74:e5:f9:ac:8c:bc
source: 2, valid bits: 0x0
qosLevel: -1, dscp: 0xffffffff, dot1pTag: 0xffffffff, sessionTimeout: -1

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Override values (cont..) dataAvgC: -1, rTAvgC: -1, dataBurstC: -1, rTimeBurstC: -1
vlanIfName: '', vlanId:0, aclName: ', ipv6AclName: , avcProfileName: '

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Initializing policy
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc AuthenticationRequired = 1
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Encryption policy is set to 0x80000001
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Not Using WMM Compliance code qosCap 00
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Vlan while overriding the policy = -1
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 5c:a4:8a:1e:17:20 vapId 4 apVapId 4 flex-acl-name:
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc apfMsAssoStateInc
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc apfPemAddUser2 (apf_policy.c:416) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:17:20 from AAA Pending to Associated

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc apfPemAddUser2:session timeout forstation 74:e5:f9:ac:8c:bc - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Stopping deletion of Mobile Station: (callerId: 48)
*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfReceiveTask: Feb 14 00:21:34.331: [PA] 74:e5:f9:ac:8c:bc Sending assoc-resp with status 0 station:74:e5:f9:ac:8c:bc AP:5c:a4:8a:1e:17:20-01 on apVapId 4
*apfReceiveTask: Feb 14 00:21:34.332: [PA] 74:e5:f9:ac:8c:bc Sending Assoc Response (status: '0') to station on AP NS_AP_5F_C on BSSID 5c:a4:8a:1e:17:2c ApVapId 4 Slot 1, mobility role 0
*apfReceiveTask: Feb 14 00:21:34.332: [PA] 74:e5:f9:ac:8c:bc apfProcessRadiusAssocResp (apf_80211.c:4677) Changing state for mobile 74:e5:f9:ac:8c:bc on AP 5c:a4:8a:1e:17:20 from Associated to Associated

*spamApTask5: Feb 14 00:21:34.332: [PA] 74:e5:f9:ac:8c:bc Successful transmission of LWAPP Add-Mobile to AP 5c:a4:8a:1e:17:20
*apfOpenDtlSocket: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Recevied management frame ACTION on BSSID 5c:a4:8a:1e:17:2c destination addr 5c:a4:8a:1e:17:2c
*spamApTask5: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Received ADD_MOBILE ack - Initiating 1x to STA 74:e5:f9:ac:8c:bc (idx 21)
*spamApTask5: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Sent dot1x auth initiate message for mobile 74:e5:f9:ac:8c:bc
*apfMsConnTask_3: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Got action frame from the client (ActionCategory:7)
*apfMsConnTask_3: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Dropping action frame from the client (Unsupported ActionCategory:7)
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 1 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc EAP-PARAM Debug - eap-params for Wlan-Id :4 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Station 74:e5:f9:ac:8c:bc setting dot1x reauth timeout = 1800
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.334: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 1)
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc Received EAPOL START, dot1x state = 2
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc Reset the reauth counter since EAPOL START has been received!!!
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 1 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc Received EAPOL START from mobile 74:e5:f9:ac:8c:bc
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc dot1x - moving mobile 74:e5:f9:ac:8c:bc into Connecting state
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc Sending EAP-Request/Identity to mobile 74:e5:f9:ac:8c:bc (EAP Id 2)
*Dot1x_NW_MsgTask_4: Feb 14 00:21:34.357: [PA] 74:e5:f9:ac:8c:bc reauth_sm state transition 0 ---> 0 for mobile 74:e5:f9:ac:8c:bc at 1x_reauth_sm.c:71
*aaaQueueReader: Feb 14 00:21:35.549: [PA] Request Authenticator 82:48:c0:df:48:76:86:02:59:03:b4:d1:86:3d:a9:90
*radiusTransportThread: Feb 14 00:21:35.560: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*radiusTransportThread: Feb 14 00:21:35.560: [PA] Vendor Specif Radius Attribute(code=26, avp_len=33, vId=9)
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy AP LOCP - mode:0 slotId:137, apMac 0x5c:a4:8a:1e:17:20
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy WLAN LOCP EssIndex:4 aid:5 ssid: ns
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy Security LOCP ecypher:0x0 ptype:0x2, p:0x1, eaptype:0x6 w:0x1 aalg:0x0, PMState: 8021X_REQD
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy 802.11 LOCP a:0x0 b:0x0 c:0x0 d:0x0 e:0x0 protocol1:0x0 protocol2:0x7 statuscode 0, reasoncode 99, status 3
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy Username LOCP : 74-E5-F9-AC-8C-BC
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy CCX LOCP 4
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy e2e LOCP 0x1
*apfLbsTask: Feb 14 00:21:42.084: [PA] 74:e5:f9:ac:8c:bc Copy MobilityData LOCP status:0, anchorip:0x0

2 Replies 2

Hi

 You are facing authentication problem "Reached Max EAP-Identity Request retries". You radius is asking your device to confirm its password or certificate or whatever method you are using and your device is either not replying or replying wrongly.  Either way you have authentication issue.

 

-If I helped you somehow, please, rate it as useful.-

patoberli
VIP Alumni
VIP Alumni
Those are devices that have either a wrong or old password configured. Unless the users of those devices complain about problems, ignore it in a larger BYOD environment. I often have users who changed their password, but forgot to adjust it on their mobiles. So the mobile can't anymore successfully connect, while the laptop (where they changed it) can.
Review Cisco Networking for a $25 gift card