12-21-2021 10:23 PM
Hi,
One of my Android 11(Samsung Tab A7) client is not able to connect our wifi, authentication is using 802.1x EAP-TLS.
Another Android 11 client (PDA) is able to connect to the wifi without any problem.
Not really sure what is happening, attached the debug client log (Samsung Tab A7) , could anyone shed some light on the problem ?
============================================
(Cisco Controller) >*apfOpenDtlSocket: Dec 22 12:06:40.648: [PA] 38:6a:77:00:0c:69 Recevied management frame ASSOCIATION REQUEST on BSSID 6c:b2:ae:49:e8:43 destination addr 6c:b2:ae:49:e8:43
*spamApTask6: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 Received ADD_MOBILE ack - Initiating 1x to STA 38:6a:77:00:0c:69 (idx 46)
*spamApTask6: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 Sent dot1x auth initiate message for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 reauth_sm state transition 0 ---> 1 for mobile 38:6a:77:00:0c:69 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 EAP-PARAM Debug - eap-params for Wlan-Id :9 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 Station 38:6a:77:00:0c:69 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 Stopping reauth timeout for 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Connecting state
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.651: [PA] 38:6a:77:00:0c:69 Sending EAP-Request/Identity to mobile 38:6a:77:00:0c:69 (EAP Id 1)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Received Identity Response (count=1) from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Resetting reauth count 1 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 EAP State update from Connecting to Authenticating for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Authenticating state
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=2) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69(EAP Id 2)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.689: [PA] 38:6a:77:00:0c:69 Allocating EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 2, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=3) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 3)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.813: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 3, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 4)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.821: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.844: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.844: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 4, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.844: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:06:40.844: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 Received EAPOL START, dot1x state = 3
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 reauth_sm state transition 1 ---> 1 for mobile 38:6a:77:00:0c:69 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 Received EAPOL START from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Aborting state
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 Client authentication has been aborted, clean up backend states.
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Connecting state
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.764: [PA] 38:6a:77:00:0c:69 Sending EAP-Request/Identity to mobile 38:6a:77:00:0c:69 (EAP Id 6)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.769: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.769: [PA] 38:6a:77:00:0c:69 Received Identity Response (count=1) from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.769: [PA] 38:6a:77:00:0c:69 Resetting reauth count 1 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.769: [PA] 38:6a:77:00:0c:69 EAP State update from Connecting to Authenticating for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.769: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Authenticating state
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.769: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.770: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.770: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 7)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.770: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 7, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=8) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.823: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 8, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=9) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 9)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.832: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.844: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.844: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:12.844: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 Received EAPOL START, dot1x state = 3
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 Reset the reauth counter since EAPOL START has been received!!!
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 reauth_sm state transition 1 ---> 1 for mobile 38:6a:77:00:0c:69 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 Received EAPOL START from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Aborting state
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 Client authentication has been aborted, clean up backend states.
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Connecting state
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.831: [PA] 38:6a:77:00:0c:69 Sending EAP-Request/Identity to mobile 38:6a:77:00:0c:69 (EAP Id 11)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.837: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 Received Identity Response (count=1) from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 Resetting reauth count 1 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 EAP State update from Connecting to Authenticating for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Authenticating state
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 12)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.838: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 12, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=13) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.899: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.907: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.907: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 13, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.907: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.907: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.907: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.907: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=14) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.908: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 14)
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.908: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.919: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.919: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:07:44.919: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*spamApTask6: Dec 22 12:08:06.485: [PA] 38:6a:77:00:0c:69 Received DELETE mobile, reason MN_INTRA_AP_ROAM, from AP 6c:b2:ae:49:e8:40, slot 0 ...cleaning up mscb
*spamApTask6: Dec 22 12:08:06.485: [PA] 38:6a:77:00:0c:69 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*spamApTask6: Dec 22 12:08:06.485: [PA] 38:6a:77:00:0c:69 Succesfully freed AID 2, slot 0 on AP 6c:b2:ae:49:e8:40, #client on this slot 1
*spamApTask6: Dec 22 12:08:06.485: [PA] 38:6a:77:00:0c:69 Scheduling deletion of Mobile Station: (callerId: 95) in 10 seconds
*spamApTask6: Dec 22 12:08:06.485: [PA] 38:6a:77:00:0c:69 Delete Mobile request on slot 0 sent to the AP 6c:b2:ae:49:e8:40 IP: 10.42.52.133:24424
*apfOpenDtlSocket: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Recevied management frame ASSOCIATION REQUEST on BSSID 6c:b2:ae:49:e8:4c destination addr 6c:b2:ae:49:e8:4c
*spamApTask6: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 apfUpdateDeleteAckInMscb (apf_api.c:51702) Expiring Mobile!
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Station: 38:6A:77:00:0C:69 trying to join WLAN with RSSI -76. Checking for XOR roam conditions on AP: 6C:B2:AE:49:E8:40 Slot: 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Station: 38:6A:77:00:0C:69 is associating to AP 6C:B2:AE:49:E8:40 which is not XOR roam capable
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Association received from mobile on BSSID 6c:b2:ae:49:e8:47 AP tswissd-ap02
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Station: 38:6A:77:00:0C:69 trying to join WLAN with RSSI -76. Checking for XOR roam conditions on AP: 6C:B2:AE:49:E8:40 Slot: 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Global 200 Clients are allowed to AP radio
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Max Client Trap Threshold: 0 cur: 2
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 override for default ap group, marking intgrp NULL
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 In processSsidIE:6609 setting Central switched to FALSE
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Applying site-specific Local Bridging override for station 38:6a:77:00:0c:69 - vapId 9, site 'TSW_PSK_MAC', interface 'management'
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Applying Local Bridging Interface Policy for station 38:6a:77:00:0c:69 - vlan 1, interface id 0, interface 'management'
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 override from ap group, removing intf group from mscb
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Applying site-specific override for station 38:6a:77:00:0c:69 - vapId 9, site 'TSW_PSK_MAC', interface 'management'
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Applying Interface(management) policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Not re-applying interface policy for local switching Client
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2922)
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2942)
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2963)
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Set Clinet AP specific apfMsAccessVlan = 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Cleared localSwitchingVlan, may be assigned later based on AAA override
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 STA - rates (6): 24 164 176 72 96 108 108 0 0 0 0 0 0 0 0 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Marking this mobile as TGr capable.
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] [0016] ac 03 00 00
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Processing RSN IE type 48, length 20 for mobile 38:6a:77:00:0c:69
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 RSN Capabilities: 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Marking Mobile as non-11w Capable
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 New ctxOwnerMwarIp: 10.42.13.241 New ctxOwnerApMac: 6C:B2:AE:49:E8:40 New ctxOwnerApEthMac: 38:0E:4D:65:F6:60 New ctxOwnerApSlotId: 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Updated location for station old AP 6c:b2:ae:49:e8:40 oldSlot 0, new AP 6c:b2:ae:49:e8:40 newSlot 1, AID 0 MsType 0 MobilityRole 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Updating AID for REAP AP Client 6c:b2:ae:49:e8:40 - AID ===> 2
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Initializing policy
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Change state to AUTHCHECK (2) last state 8021X_REQD (3)
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 apfVapSecurity=0x4000 L2=16384 SkipWeb=0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 AuthenticationRequired = 1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Encryption policy is set to 0x80000001
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) DHCP required on AP 6c:b2:ae:49:e8:40 vapId 9 apVapId 4for this client
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Not Using WMM Compliance code qosCap 00
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Vlan while overriding the policy = -1
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 sending to spamAddMobile vlanId -1 flex aclName = , flexAclId 65535
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 6c:b2:ae:49:e8:40 vapId 9 apVapId 4 flex-acl-name:
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 apfPemAddUser2 (apf_policy.c:416) Changing state for mobile 38:6a:77:00:0c:69 on AP 6c:b2:ae:49:e8:40 from Associated to Associated
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 apfPemAddUser2:session timeout forstation 38:6a:77:00:0c:69 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Sending assoc-resp with status 0 station:38:6a:77:00:0c:69 AP:6c:b2:ae:49:e8:40-01 on apVapId 4
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 VHT Operation IE: width 20/0 ch 44 freq0 0 freq1 0 msc0 0x3f msc1 0x3f
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Sending R1KH-ID as 38:90:a5:6e:a6:19
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Sending R0KH-ID as:10.42.13.-15
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Including FT IE (length 98) in Initial Assoc Resp to mobile
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Clearing the existing FT session data for mobile as we received a fresh Association.
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Sending Assoc Response (status: '0') to station on AP tswissd-ap02 on BSSID 6c:b2:ae:49:e8:4c ApVapId 4 Slot 1, mobility role 0
*apfMsConnTask_1: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 apfProcessAssocReq (apf_80211.c:11039) Changing state for mobile 38:6a:77:00:0c:69 on AP 6c:b2:ae:49:e8:40 from Associated to Associated
*spamApTask6: Dec 22 12:08:06.488: [PA] 38:6a:77:00:0c:69 Successful transmission of LWAPP Add-Mobile to AP 6c:b2:ae:49:e8:40
*spamApTask6: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 Received ADD_MOBILE ack - Initiating 1x to STA 38:6a:77:00:0c:69 (idx 48)
*spamApTask6: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 Sent dot1x auth initiate message for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 reauth_sm state transition 1 ---> 0 for mobile 38:6a:77:00:0c:69 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 EAP-PARAM Debug - eap-params for Wlan-Id :9 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Connecting state
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.490: [PA] 38:6a:77:00:0c:69 Sending EAP-Request/Identity to mobile 38:6a:77:00:0c:69 (EAP Id 1)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.515: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.515: [PA] 38:6a:77:00:0c:69 Received Identity Response (count=1) from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.515: [PA] 38:6a:77:00:0c:69 Resetting reauth count 1 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.515: [PA] 38:6a:77:00:0c:69 EAP State update from Connecting to Authenticating for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.515: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Authenticating state
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.515: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.516: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.516: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=2) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.516: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 2)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.516: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.547: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.547: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 2, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.547: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.547: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.548: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.548: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=3) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.548: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 3)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.548: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 3, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=4) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 4)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.551: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.559: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.559: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 4, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.559: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:06.559: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 Received EAPOL START, dot1x state = 3
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 Reset the reauth counter since EAPOL START has been received!!!
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 reauth_sm state transition 0 ---> 1 for mobile 38:6a:77:00:0c:69 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 Received EAPOL START from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Aborting state
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 Client authentication has been aborted, clean up backend states.
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Connecting state
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.948: [PA] 38:6a:77:00:0c:69 Sending EAP-Request/Identity to mobile 38:6a:77:00:0c:69 (EAP Id 6)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.953: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.953: [PA] 38:6a:77:00:0c:69 Received Identity Response (count=1) from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.953: [PA] 38:6a:77:00:0c:69 Resetting reauth count 1 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.953: [PA] 38:6a:77:00:0c:69 EAP State update from Connecting to Authenticating for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.953: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Authenticating state
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.953: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.954: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.954: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 7)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:37.954: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.001: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.001: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 7, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.001: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.001: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.002: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.002: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=8) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.002: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.002: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 8, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=9) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.007: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 9)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.020: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.020: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 9, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.020: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:08:38.020: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 Received EAPOL START, dot1x state = 3
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 reauth_sm state transition 1 ---> 1 for mobile 38:6a:77:00:0c:69 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 Received EAPOL START from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Aborting state
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 Client authentication has been aborted, clean up backend states.
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Connecting state
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.016: [PA] 38:6a:77:00:0c:69 Sending EAP-Request/Identity to mobile 38:6a:77:00:0c:69 (EAP Id 11)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Received Identity Response (count=1) from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Resetting reauth count 1 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 dot1x - moving mobile 38:6a:77:00:0c:69 into Authenticating state
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 12)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.022: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.083: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.083: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 12, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.083: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.083: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.084: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.084: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=13) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.084: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.091: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 13, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Processing Access-Challenge for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Req state (id=14) for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Sending EAP Request from AAA to mobile 38:6a:77:00:0c:69 (EAP Id 14)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.092: [PA] 38:6a:77:00:0c:69 Reusing allocated memory for EAP Pkt for retransmission to mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.105: [PA] 38:6a:77:00:0c:69 Received EAPOL EAPPKT from mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.105: [PA] 38:6a:77:00:0c:69 Received EAP Response from mobile 38:6a:77:00:0c:69 (EAP Id 14, EAP Type 13)
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.105: [PA] 38:6a:77:00:0c:69 Resetting reauth count 0 to 0 for mobile 38:6a:77:00:0c:69
*Dot1x_NW_MsgTask_1: Dec 22 12:09:10.105: [PA] 38:6a:77:00:0c:69 Entering Backend Auth Response state for mobile 38:6a:77:00:0c:69
*emWeb: Dec 22 12:09:29.453: [PA] Configuring IPv6 ACL for WLAN:4, aclName passed is NULL
*emWeb: Dec 22 12:09:29.454: [PA] WLAN security policy configuration update received. Policy map: 4000
*emWeb: Dec 22 12:09:29.454: [PA] WLAN security policy configuration update received. Policy map: 4000
*emWeb: Dec 22 12:09:29.454: [PA] 11i elem adaptive akm 3 set at 19
*emWeb: Dec 22 12:09:29.454: [PA] RSNIE Data: (64)
*emWeb: Dec 22 12:09:29.454: [PA] [0000] 30 18 01 00 00 0f ac 04 01 00 00 0f ac 04 02 00
*emWeb: Dec 22 12:09:29.454: [PA] [0016] 00 0f ac 01 00 0f ac 03 28 00 00 00 00 00 00 00
*emWeb: Dec 22 12:09:29.454: [PA] [0032] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
*emWeb: Dec 22 12:09:29.454: [PA] [0048] 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
*emWeb: Dec 22 12:09:29.454: [PA] Created WARP Capabilities IE (length 12) for WLAN TSW-test
*spamApTask6: Dec 22 12:09:31.553: [PA] 38:6a:77:00:0c:69 Cleaning up state for STA 38:6a:77:00:0c:69 due to event for AP 6c:b2:ae:49:e8:40(1)
*spamApTask6: Dec 22 12:09:31.553: [PA] 38:6a:77:00:0c:69 Succesfully freed AID 2, slot 1 on AP 6c:b2:ae:49:e8:40, #client on this slot 1
*apfReceiveTask: Dec 22 12:09:31.553: [PA] 38:6a:77:00:0c:69 apfMsExpireMobileStation (apf_ms.c:7688) Changing state for mobile 38:6a:77:00:0c:69 on AP 6c:b2:ae:49:e8:40 from Associated to Disassociated
*apfReceiveTask: Dec 22 12:09:31.553: [PA] 38:6a:77:00:0c:69 Freeing EAP Retransmit Bufer for mobile 38:6a:77:00:0c:69
*apfReceiveTask: Dec 22 12:09:31.553: [PA] 38:6a:77:00:0c:69 Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
*osapiBsnTimer: Dec 22 12:09:41.803: [PA] 38:6a:77:00:0c:69 apfMsExpireCallback (apf_ms.c:639) Expiring Mobile!
*apfReceiveTask: Dec 22 12:09:41.803: [PA] 38:6a:77:00:0c:69 apfMsAssoStateDec
*apfReceiveTask: Dec 22 12:09:41.803: [PA] 38:6a:77:00:0c:69 apfMsExpireMobileStation (apf_ms.c:7821) Changing state for mobile 38:6a:77:00:0c:69 on AP 6c:b2:ae:49:e8:40 from Disassociated to Idle
*apfReceiveTask: Dec 22 12:09:41.803: [PA] 38:6a:77:00:0c:69 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Dec 22 12:09:41.803: [PA] 38:6a:77:00:0c:69 0.0.0.0 8021X_REQD (3) Deleted mobile LWAPP rule on AP [6c:b2:ae:49:e8:40]
*apfReceiveTask: Dec 22 12:09:41.803: [PA] 38:6a:77:00:0c:69 Deleting mobile on AP 6c:b2:ae:49:e8:40(1)
12-21-2021 10:59 PM
What firmware is the controller running on?
12-22-2021 12:04 AM
it is a cisco WLC 5520, running software version 8.3.143.0
12-22-2021 12:10 AM
and the PDA is not required to enter the domain, but Samsung Tab A7 required to enter the domain before connecting, and I tired hkp, hkpo, hksarg (please see attachment), but all failed.....not sure if the problem is caused because of entering domain incorrectly....don't really know how to read debug log....
12-22-2021 01:39 AM
Do you have ISE?
Is 802.11r enabled?
12-22-2021 07:23 PM
No ISE, the certificate is installed on the WLC and authentication is handling on the WLC.
Under WLANS --> Edit "SSID" --> Security tag--> Layer 2 tag, Fast Transition is enabled, Reassociation Timeout is 20 secs
tried to disable Fast transition, but the problem still
12-22-2021 01:21 AM
The problem is that for athentication issues which is your case, a debug in the controller or the AP is not going to give you any clue about what is happening there.
For that, you need to check your RADIUS server logs for clarification.
HTH
-Jesus
*** Please rate helpful responses ***
12-22-2021 07:25 PM
No ISE/RADIUS, the certificate is installed on the WLC and authentication is handling on the WLC.
We are using the same certificate on both Samsung Tab A7 and PDA, the authentication method is 802.1x EAP-TLS.
12-22-2021 10:52 PM
Sorry, i just found out the PDA is running on Android 9 and no need to enter the domain of the certificate.
But Android 11 required to enter the domain of the certificate, but somehow , we don't exactly know what is the domain of the certificate......I have the certificate on hands, is there anyway I can check what the domain is ?
I googled a bit , is Android 11 devices require a public certificate to do 802.1x authentication?
12-23-2021 01:41 PM
Disable 802.11 k, v and r.
If that still does not work, try PSK.
12-23-2021 06:17 PM
cannot use PSK, 802.1x authentication is the security standard for my company.
12-23-2021 08:16 PM
@jacky.cheuk wrote:
cannot use PSK, 802.1x authentication is the security standard for my company.
Try using PSK to test and determine if the issue occurs with this setting or not.
Is this problem happening to ALL Android 11? Only a handful of Android 11? One Android 11?
12-30-2021 12:00 AM
For PSK, the Android 11 is okay to connect as it doesn't require to enter the domain.
I only got one Android 11 on hands, and it got a problem. Android 7 and 9 using the same set of cert. don't have the problem. My guessing is because Android 7 and 9 don't require to enter the domain.
12-30-2021 07:43 AM
Keep in mind that using the WLC as the AAA is not a good idea. You should use a radius server to handle that. EAP-TLS only uses certificates which needs to be implemented properly and trusted on both ends. I’d devices prompt for a username and password, that is not EAP-TLS but EAP-PEAP. If you have other Android devices that work properly, then you need to look again at how you are uploading the certificate to the device itself and or any bugs with that specific firmware.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide