cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1276
Views
0
Helpful
4
Replies

Add network adapter in the Wireless Lan Controller!

marcoscosac
Spotlight
Spotlight

Hello

 

I need help to add 2 more network adapters to the Wireless Lan Controller. The Wireless Lan Controller is configuring on a virtualized server, on a VMware platform. I needed to add 2 more network adapters, in the Wireless Lan Controller, to divide the 2 VLANs 50 and 55 into separate adapters, to distribute the IPs via DHCP.

 

Below is a basic drawing illustrating the structure for understanding the scenario:

 

Equipment version:

 

Controller: AIR CTVM LARGE-K9 8.10.130.0
APs: AIR AP1815I-Z-K9 8.5.140.0

Networks:

192.2.0.1/16 - Service IP 192.2.1.60 (WLC network)
192.3.0.1/22 - VLAN 60 IP for management 192.3.0.60 (manages the APs)
192.50.0.1/16 - VLAN 50 (visitors)
192.55.0.1/16 - VLAN 55 (employees)

 

Diagrama WLC.jpg

 

I added 2 network adapters on the WLC server through VMware, but on the controller, the adapters do not enable, how do I enable the 2 network adapters on the controller?

 

Ports WLC.JPG

 

 

Thank you for your help

2 Accepted Solutions

Accepted Solutions

joyaljp
Level 1
Level 1

Hi,

 

The interface configuration will be done on the Vmware. I think you have already done it. The configurations will also be done on the VM side as per the guide below. I don't think you can make separate interfaces in vWLC.

https://www.cisco.com/c/en/us/td/docs/wireless/technology/mesh/8-2/b_Virtual_Wireless_LAN_Controller_Deployment_Guide_8-2.html

View solution in original post

marcoscosac
Spotlight
Spotlight

Problem solved, thank you all for your help. Problem was found in the routes created in the firewall.

View solution in original post

4 Replies 4

balaji.bandi
Hall of Fame
Hall of Fame

here is the procedure to add VLAN and adapter : ( you can use a single interface as a trunk with more vlan allow in the trunk)

 

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-vlan/68100-wlan-controllers-vlans.html

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

joyaljp
Level 1
Level 1

Hi,

 

The interface configuration will be done on the Vmware. I think you have already done it. The configurations will also be done on the VM side as per the guide below. I don't think you can make separate interfaces in vWLC.

https://www.cisco.com/c/en/us/td/docs/wireless/technology/mesh/8-2/b_Virtual_Wireless_LAN_Controller_Deployment_Guide_8-2.html

Hi

I was able to perform VLAN communication, as you suggested. I configured VMware with the port group VLAN ID 4095 to convert the port to trunk, passing all the VLANs of the controller. At the moment everything went perfectly, but something unexpected happened, asking for the IP distribution of DHCP to VLAN 55, and VLAN 50 is perfect. Nothing has been changed on the switch, vmware and the router. I can't find the problem, were you able to help me? I will post the debug, when the client connects from the ID 55 wireless network, to help in the analysis.

 

(Cisco Controller) >*emWeb: Feb 18 17:04:49.462:
Debugging session started on Feb 18 17:04:49.462 for WLC AIR-CTVM-K9 Version :8.10.130.0 SN :98GCXX5CCUV Hostname SRJVWC
*apfOpenDtlSocket: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 Received management frame ASSOCIATION REQUEST on BSSID 5c:e1:76:e1:f7:8f destination addr 5c:e1:76:e1:f7:8f slotid 1
*apfMsConnTask_5: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 Updating the client capabiility as 4
*apfMsConnTask_5: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 Processing assoc-req station:34:f3:9a:8f:60:51 AP:5c:e1:76:e1:f7:80-01 ssid : IPEA-COLABORADORES thread:27b5d4f3e0
*apfMsConnTask_5: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 apfCreateMobileStationEntryWrapper (apf_ms.c:4510) Changing state for mobile 34:f3:9a:8f:60:51 on AP 5c:e1:76:e1:f7:80 from Idle to Idle

*apfMsConnTask_5: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 Adding mobile on LWAPP AP 5c:e1:76:e1:f7:80(1)
*apfMsConnTask_5: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 Created Acct-Session-ID (602ec86a/34:f3:9a:8f:60:51/408) for the mobile
*apfMsConnTask_5: Feb 18 17:04:58.464: 34:f3:9a:8f:60:51 Setting hasApChnaged Flag as true. It is a fresh assoc request.

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Setting RTTS enabled to 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Association received from mobile on BSSID 5c:e1:76:e1:f7:8f AP AP71
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Station: 34:F3:9A:8F:60:51 trying to join WLAN with RSSI -30. Checking for XOR roam conditions on AP: 5C:E1:76:E1:F7:80 Slot: 1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Station: 34:F3:9A:8F:60:51 is associating to AP 5C:E1:76:E1:F7:80 which is not XOR roam capable
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Global 200 Clients are allowed to AP radio

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Max Client Trap Threshold: 0 cur: 0

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Updated local bridging VLAN to 55 while applying WLAN policy
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 override for default ap group, marking intgrp NULL
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Applying Interface(vlan 55) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Re-applying interface (vlan 55) policy for client
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 After applying Interface(vlan 55) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 55

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3486)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3506)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3527)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apf_policy.c:2771 Assigning the SGT 0 to mobile (earlier sgt 0)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Increment the SGT 0 policy count reference by the clients 1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Check the client SGT 0 policy and push it to AP 5c:e1:76:e1:f7:80
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 In processSsidIE:7589 setting Central switched to TRUE
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 In processSsidIE:7592 apVapId = 1 and Split Acl Id = 65535
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Applying site-specific Local Bridging override for station 34:f3:9a:8f:60:51 - vapId 1, site 'IPEA', interface 'vlan 55'
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Applying Local Bridging Interface Policy for station 34:f3:9a:8f:60:51 - vlan 55, interface id 6, interface 'vlan 55', nasId:''
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 override from ap group, removing intf group from mscb
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Applying site-specific override for station 34:f3:9a:8f:60:51 - vapId 1, site 'IPEA', interface 'vlan 55'
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Not applying Local Bridge Policy because Site Specific Interface(vlan 55) Policy is already applied.

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Applying Interface(vlan 55) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 55

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Re-applying interface (vlan 55) policy for client
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 After applying Interface(vlan 55) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 55

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3486)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3506)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3527)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:, interface nasid:, APgrpset:0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 STA - rates (7): 12 24 36 176 72 96 108 0 0 0 0 0 0 0 0 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_5: Feb 18 17:04:58.465: RSNIE in Assoc. Req.: (22)

*apfMsConnTask_5: Feb 18 17:04:58.465: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_5: Feb 18 17:04:58.465: [0016] ac 01 3c 00 00 00

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Processing RSN IE type 48, length 22 for mobile 34:f3:9a:8f:60:51
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 RSN Capabilities: 60
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 non-11w Capable mobile
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Received RSN IE(AKM:1) with 0 PMKIDs
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Received RSN IE with 0 PMKIDs from mobile 34:f3:9a:8f:60:51
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Setting active key cache index 8 ---> 8
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 unsetting PmkIdValidatedByAp
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Updating AID for REAP AP Client 5c:e1:76:e1:f7:80 - AID ===> 1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Assoc Req BSSID 5c:e1:76:e1:f7:8f AP(AP71) slot 1 ssid (IPEA-COLABORADORES) Tmstmp 477574 AID 1 stCode 0/0 apChngd 0 oldAp 00:00:00:00:00:00
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 AuthenticationRequired = 1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Encryption policy is set to 0x80000001
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Flex Central Auth Client
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001]
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Not Using WMM Compliance code qosCap 00
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 flex webauth ipv4 & ipv6 acl ids to be sent when fabric is disabled:65535/65535
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Vlan while overriding the policy = -1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 5c:e1:76:e1:f7:80 vapId 1 apVapId 1 flex acl-name: v6acl-name
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apfMsAssoStateInc
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 34:f3:9a:8f:60:51 on AP 5c:e1:76:e1:f7:80 from Idle to Associated

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apfPemAddUser2:session timeout forstation 34:f3:9a:8f:60:51 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Sending assoc-resp with status 0 station:34:f3:9a:8f:60:51 AP:5c:e1:76:e1:f7:80-01 on apVapId 1
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 VHT Operation IE: width 20/0 ch 36 freq0 0 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Sending Assoc Response (status: '0') to station on AP AP71 on BSSID 5c:e1:76:e1:f7:8f ApVapId 1 Slot 1, mobility role 0
*apfMsConnTask_5: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 apfProcessAssocReq (apf_80211.c:12920) Changing state for mobile 34:f3:9a:8f:60:51 on AP 5c:e1:76:e1:f7:80 from Associated to Associated

*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Add SGT:0 to AP 5c:e1:76:e1:f7:80
*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 MS IP NULL during AddMobile, not sending IP Distribution
*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Successful transmission of LWAPP Add-Mobile to AP 5c:e1:76:e1:f7:80 slotId 1 idx@71
*spamApTask3: Feb 18 17:04:58.465: 34:f3:9a:8f:60:51 Setting ADD_MOBILE (idx 71, seqno 12, action 1, count 12, last count 12) ack state for STA on AP 5c:e1:76:e1:f7:80
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.475: 34:f3:9a:8f:60:51 reauth_sm state transition 0 ---> 1 for mobile 34:f3:9a:8f:60:51 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.475: 34:f3:9a:8f:60:51 EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.475: 34:f3:9a:8f:60:51 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.475: 34:f3:9a:8f:60:51 Station 34:f3:9a:8f:60:51 setting dot1x reauth timeout = 1800
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.475: 34:f3:9a:8f:60:51 Received EAPOL START from mobile in dot1x state = 2
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.475: 34:f3:9a:8f:60:51 Ignoring EAPOL-Start as client still ongoing AddMnAckPend:1 or EAPOL-Key HS state:0)
*spamApTask3: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 Received add/del ack packet with sequence number: got 12 expected 12 action = 1
*spamApTask3: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 Received ADD_MOBILE ack - Initiating 1x to STA 34:f3:9a:8f:60:51 (idx 71)
*spamApTask3: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 APF Initiating 1x to STA 34:f3:9a:8f:60:51
*spamApTask3: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 Sent dot1x auth initiate message for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 dot1xProcessInitiate1XtoMobile to mobile station 34:f3:9a:8f:60:51 (mscb 1, msg 1)
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 reauth_sm state transition 1 ---> 0 for mobile 34:f3:9a:8f:60:51 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 dot1x - moving mobile 34:f3:9a:8f:60:51 into Connecting state
*Dot1x_NW_MsgTask_1: Feb 18 17:04:58.483: 34:f3:9a:8f:60:51 Sending EAP-Request/Identity to mobile 34:f3:9a:8f:60:51 (EAP Id 1)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 Received EAPOL EAPPKT from mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 Received Identity Response (count=1) from mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 Resetting reauth count 1 to 0 for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 EAP State update from Connecting to Authenticating for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 dot1x - moving mobile 34:f3:9a:8f:60:51 into Authenticating state
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 Entering Backend Auth Response state for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.818: 34:f3:9a:8f:60:51 Created Cisco-Audit-Session-ID for the mobile: 3c01030a0000019478c82e60 type: local
*aaaQueueReader: Feb 18 17:05:12.819: 34:f3:9a:8f:60:51 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 10.2.1.19 port 1812 index 0 active 1
*aaaQueueReader: Feb 18 17:05:12.819: 34:f3:9a:8f:60:51 Found a server : 10.2.1.19 from the WLAN server list of radius server index 1
*aaaQueueReader: Feb 18 17:05:12.819: 34:f3:9a:8f:60:51 Send Radius Auth Request with pktId:149 into qid:1 of server at index:0
*aaaQueueReader: Feb 18 17:05:12.819: 34:f3:9a:8f:60:51 Sending the packet to v4 host 10.2.1.19:1812 of length 284
*aaaQueueReader: Feb 18 17:05:12.819: 34:f3:9a:8f:60:51 Successful transmission of Authentication Packet (pktId 149) to 10.2.1.19:1812 from server queue 1, proxy state 34:f3:9a:8f:60:51-01:00
*radiusTransportThread: Feb 18 17:05:12.825: 34:f3:9a:8f:60:51 Access-Challenge received from RADIUS server 10.2.1.19 (qid:1) with port:1812, pktId:149
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.825: 34:f3:9a:8f:60:51 Processing Access-Challenge for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.825: 34:f3:9a:8f:60:51 Sending EAP Request from AAA to mobile 34:f3:9a:8f:60:51 (EAP Id 2)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.825: 34:f3:9a:8f:60:51 Allocating EAP Pkt for retransmission to mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Received EAPOL EAPPKT from mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Received EAP Response from mobile 34:f3:9a:8f:60:51 (EAP Id 2, EAP Type PEAP)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Resetting reauth count 0 to 0 for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Entering Backend Auth Response state for mobile 34:f3:9a:8f:60:51
*aaaQueueReader: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 10.2.1.19 port 1812 index 0 active 1
*aaaQueueReader: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Found a server : 10.2.1.19 from the WLAN server list of radius server index 1
*aaaQueueReader: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Send Radius Auth Request with pktId:150 into qid:1 of server at index:0
*aaaQueueReader: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Sending the packet to v4 host 10.2.1.19:1812 of length 515
*aaaQueueReader: Feb 18 17:05:12.827: 34:f3:9a:8f:60:51 Successful transmission of Authentication Packet (pktId 150) to 10.2.1.19:1812 from server queue 1, proxy state 34:f3:9a:8f:60:51-01:01
*radiusTransportThread: Feb 18 17:05:12.828: 34:f3:9a:8f:60:51 Access-Challenge received from RADIUS server 10.2.1.19 (qid:1) with port:1812, pktId:150
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.828: 34:f3:9a:8f:60:51 Processing Access-Challenge for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.828: 34:f3:9a:8f:60:51 Entering Backend Auth Req state (id=3) for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.828: 34:f3:9a:8f:60:51 Sending EAP Request from AAA to mobile 34:f3:9a:8f:60:51 (EAP Id 3)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:12.828: 34:f3:9a:8f:60:51 Reusing allocated memory for EAP Pkt for retransmission to mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Received EAPOL EAPPKT from mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Received EAP Response from mobile 34:f3:9a:8f:60:51 (EAP Id 3, EAP Type PEAP)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Resetting reauth count 0 to 0 for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Entering Backend Auth Response state for mobile 34:f3:9a:8f:60:51
*aaaQueueReader: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 10.2.1.19 port 1812 index 0 active 1
*aaaQueueReader: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Found a server : 10.2.1.19 from the WLAN server list of radius server index 1
*aaaQueueReader: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Send Radius Auth Request with pktId:151 into qid:1 of server at index:0
*aaaQueueReader: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Sending the packet to v4 host 10.2.1.19:1812 of length 374
*aaaQueueReader: Feb 18 17:05:14.442: 34:f3:9a:8f:60:51 Successful transmission of Authentication Packet (pktId 151) to 10.2.1.19:1812 from server queue 1, proxy state 34:f3:9a:8f:60:51-01:02
*radiusTransportThread: Feb 18 17:05:14.443: 34:f3:9a:8f:60:51 Access-Challenge received from RADIUS server 10.2.1.19 (qid:1) with port:1812, pktId:151
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.443: 34:f3:9a:8f:60:51 Processing Access-Challenge for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.443: 34:f3:9a:8f:60:51 Entering Backend Auth Req state (id=6) for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.443: 34:f3:9a:8f:60:51 WARNING: updated EAP-Identifier 3 ===> 6 for STA 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.443: 34:f3:9a:8f:60:51 Sending EAP Request from AAA to mobile 34:f3:9a:8f:60:51 (EAP Id 6)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.443: 34:f3:9a:8f:60:51 Reusing allocated memory for EAP Pkt for retransmission to mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Received EAPOL EAPPKT from mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Received EAP Response from mobile 34:f3:9a:8f:60:51 (EAP Id 6, EAP Type PEAP)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Resetting reauth count 0 to 0 for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Entering Backend Auth Response state for mobile 34:f3:9a:8f:60:51
*aaaQueueReader: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 10.2.1.19 port 1812 index 0 active 1
*aaaQueueReader: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Found a server : 10.2.1.19 from the WLAN server list of radius server index 1
*aaaQueueReader: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Send Radius Auth Request with pktId:152 into qid:1 of server at index:0
*aaaQueueReader: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Sending the packet to v4 host 10.2.1.19:1812 of length 348
*aaaQueueReader: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Successful transmission of Authentication Packet (pktId 152) to 10.2.1.19:1812 from server queue 1, proxy state 34:f3:9a:8f:60:51-01:03
*radiusTransportThread: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Access-Challenge received from RADIUS server 10.2.1.19 (qid:1) with port:1812, pktId:152
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Processing Access-Challenge for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Entering Backend Auth Req state (id=7) for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Sending EAP Request from AAA to mobile 34:f3:9a:8f:60:51 (EAP Id 7)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.448: 34:f3:9a:8f:60:51 Reusing allocated memory for EAP Pkt for retransmission to mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Received EAPOL EAPPKT from mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Received EAP Response from mobile 34:f3:9a:8f:60:51 (EAP Id 7, EAP Type PEAP)
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Resetting reauth count 0 to 0 for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Entering Backend Auth Response state for mobile 34:f3:9a:8f:60:51
*aaaQueueReader: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 radiusServerFallbackPassiveStateUpdate: RADIUS server is ready 10.2.1.19 port 1812 index 0 active 1
*aaaQueueReader: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Found a server : 10.2.1.19 from the WLAN server list of radius server index 1
*aaaQueueReader: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Send Radius Auth Request with pktId:153 into qid:1 of server at index:0
*aaaQueueReader: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Sending the packet to v4 host 10.2.1.19:1812 of length 364
*aaaQueueReader: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Successful transmission of Authentication Packet (pktId 153) to 10.2.1.19:1812 from server queue 1, proxy state 34:f3:9a:8f:60:51-01:04
*radiusTransportThread: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Access-Challenge received from RADIUS server 10.2.1.19 (qid:1) with port:1812, pktId:153
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Processing Access-Challenge for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Entering Backend Auth Req state (id=8) for mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Sending EAP Request from AAA to mobile 34:f3:9a:8f:60:51 (EAP Id
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.451: 34:f3:9a:8f:60:51 Reusing allocated memory for EAP Pkt for retransmission to mobile 34:f3:9a:8f:60:51
*Dot1x_NW_MsgTask_1: Feb 18 17:05:14.453: 34:f3:9a:8f:60:51 Received EAP*DHCP Socket Task: Feb 18 17:05:21.537: 34:f3:9a:8f:60:51 DHCP received op BOOTREQUEST (1) (len 308,vlan 60, port 1, encap 0xec03, xid 0xd12ad28d)
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP processing DHCP DISCOVER (1)
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP xid: 0x8dd22ad1 (2379360977), secs: 3, flags: 80
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP chaddr: 34:f3:9a:8f:60:51
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=55, datalen =18, optlen=64
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP successfully bridged packet to DS
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 Interface Group was NULL.Number of DHCP Discovery 3 from client
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP received op BOOTREQUEST (1) (len 308,vlan 60, port 1, encap 0xec03, xid 0xd12ad28d)
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP processing DHCP DISCOVER (1)
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP xid: 0x8dd22ad1 (2379360977), secs: 3, flags: 80
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP chaddr: 34:f3:9a:8f:60:51
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=55, datalen =18, optlen=64
*DHCP Socket Task: Feb 18 17:05:21.538: 34:f3:9a:8f:60:51 DHCP successfully bridged packet to DS
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP received op BOOTREQUEST (1) (len 308,vlan 60, port 1, encap 0xec03, xid 0xd12ad28d)
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP processing DHCP DISCOVER (1)
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP xid: 0x8dd22ad1 (2379360977), secs: 11, flags: 80
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP chaddr: 34:f3:9a:8f:60:51
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=55, datalen =18, optlen=64
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP successfully bridged packet to DS
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP received op BOOTREQUEST (1) (len 308,vlan 60, port 1, encap 0xec03, xid 0xd12ad28d)
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP processing DHCP DISCOVER (1)
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP xid: 0x8dd22ad1 (2379360977), secs: 11, flags: 80
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP chaddr: 34:f3:9a:8f:60:51
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=55, datalen =18, optlen=64
*DHCP Socket Task: Feb 18 17:05:30.042: 34:f3:9a:8f:60:51 DHCP successfully bridged packet to DS
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP received op BOOTREQUEST (1) (len 308,vlan 60, port 1, encap 0xec03, xid 0xd12ad28d)
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP processing DHCP DISCOVER (1)
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP xid: 0x8dd22ad1 (2379360977), secs: 28, flags: 80
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP chaddr: 34:f3:9a:8f:60:51
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=55, datalen =18, optlen=64
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP successfully bridged packet to DS
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP received op BOOTREQUEST (1) (len 308,vlan 60, port 1, encap 0xec03, xid 0xd12ad28d)
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP processing DHCP DISCOVER (1)
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP xid: 0x8dd22ad1 (2379360977), secs: 28, flags: 80
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP chaddr: 34:f3:9a:8f:60:51
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=55, datalen =18, optlen=64
*DHCP Socket Task: Feb 18 17:05:46.249: 34:f3:9a:8f:60:51 DHCP successfully bridged packet to DS

 

marcoscosac
Spotlight
Spotlight

Problem solved, thank you all for your help. Problem was found in the routes created in the firewall.

Review Cisco Networking for a $25 gift card