cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1000
Views
0
Helpful
5
Replies

Client dropping WLC 5508

dazza007
Level 1
Level 1

I noticed our fleet of HP Laptops has dropped the Cisco compatibility shortly after purchasing them HP Probook 435 

I have noticed that the client drop. I have 802.11r and 802.11k with Radius authentication AES 

I am at a loss with what is happening

I have Radius auth - windows with WPA2 AES 802.1x FT802.1x

*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received Identity Response (count=1) from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Resetting reauth count 1 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b EAP State update from Connecting to Authenticating for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticating state
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.755: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=2) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 2)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Allocating EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=3) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 3)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.760: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 3, EAP Type 13)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=4) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 4)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 4, EAP Type 13)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Processing Access-Accept for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Previous Radius Overrides:(0)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_SEND_KEY: KeyLen: 32
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_RECV_KEY: KeyLen: 32
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting re-auth timeout to 1800 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Station 84:1b:77:86:ce:4b setting dot1x reauth timeout = 1800
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Created PKC PMK Cache entry for station 84:1b:77:86:ce:4b (RSN 2)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting MSCB PMK Cache Entry @index 0 for station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMKID PMK Cache for BSSID e4:aa:5d:4f:c9:ae at index 0 for station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: New PMKID: (16)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Using PMK of length 32 as TGr MSK (in 802.1X case) AKM:3
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMK Cache Entry for TGr AKM:802.1x 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b R0KH-ID:IPADDRESS R1KH-ID:6c:41:6a:5f:1e:60 MSK Len:48
pmkValidTime:1801
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b apfCreatePmkCacheEntry: added a new pmk cache entry for 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 1x: Updated the audit-session-id to PMK-Cache from client mscb: ac16440200002372625fe777
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Adding Audit session ID payload in Mobility handoff
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b PMK sent to mobility group
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Sending EAP-Success to mobile 84:1b:77:86:ce:4b (EAP Id 4)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Freeing AAACB from Dot1xCB as AAA auth is done for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: M1 - Key Data: (22)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] dd 14 00 0f ac 04 8a ee d9 02 c6 6c 83 f6 1c 7c
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0016] c0 45 8d b1 59 70
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Starting key exchange to mobile 84:1b:77:86:ce:4b, data packets will be dropped
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.02
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Entering Backend Auth Success state (id=4) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Received Auth Success while in Authenticating state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticated state
*dot1xSocketTask: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-key in PTK_START state (message 2) from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: R1KHID+S1KHID: (12)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: [0000] 6c 41 6a 5f 1e 60 84 1b 77 86 ce 4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b rsnieCapabilty = 3c00 rsnie_len =18
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b non-11w Capable mobile
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Dumping RSNIE received in Association request(len = 24):
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 00000000: 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: 00 0f ac 03 3c 00 00 00 ....<...
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Dumping RSNIE received in EAPOL M2 (len = 38):
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: ac 03 3c 00 01 00 78 d8 57 93 14 ea 9d d3 a5 bd ..<...x.W.......
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000020: 78 c6 5b 34 b6 95 x.[4..
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b 11r-FT: Validate MDIE info in M2 message from mobile
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Calculating PMKR0Name
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Encrypt EAPOL packets = TRUE
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Validate the 11r FTIE element received in the M2 against the assoc respnse FTIE
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Received EAPOL M2 with wepBit set in FTIE, validate R0KHID and R1KHID
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Successfully validated the FTIE in M2 with IE sent in association response
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Not Flex client. Do not distribute dot11r Key cache.
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.03
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*dot1xSocketTask: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Freeing EAP Retransmit Bufer for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b STA [84:1b:77:86:ce:4b, IPADDRESS] Deleting Fast Path Rule (8021X_AUTH)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b the value of url acl preserve flag is 0 for mobile 84:1b:77:86:ce:4b (caller pem_api.c:6008)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateDec
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateDec
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Change state to 8021X_REQD (3) last state RUN (20)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateInc
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent when fabric is disabled:65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent :65535 name : client acl id : 65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Vlan while overriding the policy = -1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP e4:aa:5d:4f:c9:a0 vapId 3 apVapId 2 flex-acl-name:
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateInc
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add SGT:0 to AP e4:aa:5d:4f:c9:a0
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Reached PLUMBFASTPATH: from line 7157, null
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Adding Fast Path rule
type = Airespace AP Client
on AP e4:aa:5d:4f:c9:a0, slot 1, interface = 13, QOS = 2
IPv4 ACL ID = 255, IPv6 ACL ID =
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Successful transmission of LWAPP Add-Mobile to AP e4:aa:5d:4f:c9:a0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 46, TokenID = 15206, IntfId = 18 Local Bridging Vlan = 511, Local Bridging intf id = 18
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Setting ADD_MOBILE (idx 96, action 0, last count 142) ack state for STA on AP e4:aa:5d:4f:c9:a0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_

5 Replies 5

"non-11w Capable mobile" How Management Frame Protection is configured on the WLC?

Thank you for your help

It is disabled on the WLAN

marce1000
VIP
VIP

 

 - Below you will find output from your debugging-trail when processed with : https://cway.cisco.com/wireless-debug-analyzer/  , Show All flag was checked (too) : 

Lines 1-12 of 12
  •  
  •  
  • 1
  •  
  •  


TimeTaskTranslated

Apr 20 12:57:46.750 *Dot1x_NW_MsgTask_3 Client sent EAP-Identity-Response to WLC/AP
Apr 20 12:57:46.750 *Dot1x_NW_MsgTask_3 Client sent EAP-Identity-Response to WLC/AP
Apr 20 12:57:46.776 *Dot1x_NW_MsgTask_3 RADIUS Server permitted access
Apr 20 12:57:46.776 *Dot1x_NW_MsgTask_3 Client will be required to Reauthenticate in 1800
seconds
Apr 20 12:57:46.777 *Dot1x_NW_MsgTask_3 WLC creates a PMK cache entry for this client, which is used for FT with AKM:802.1xin this case, so the PMKID is computed with the AP MAC address
Apr 20 12:57:46.778 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Sending M1
Apr 20 12:57:46.803 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Received M2
Apr 20 12:57:46.804 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Sending M3
Apr 20 12:57:46.807 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Received M4
Apr 20 12:57:46.808 *Dot1x_NW_MsgTask_3 Client is entering the 802.1x or PSK Authentication state
Apr 20 12:57:46.808 *Dot1x_NW_MsgTask_3 Client has completed PSK Dot1x or WEP authentication phase
Apr 20 12:57:46.808 *Dot1x_NW_MsgTask_3 Client has entered RUN state


-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Thank you that is very helpful to see the wood for the trees thank you!

I have a clients (60) with Intel Wifi-6 AX200 adapters which have random disconnects. 

The drivers (22.80.1.1) and board fw are the latests provided. 

The device only states an NEtwtw10 6062- Lso was triggered  when a disconnect happens. 

The WLC is the latest and the WAP AIR-CAP3702I-E-K9 are too. 

 

 

 - FYI : https://community.intel.com/t5/Wireless/6062-Lso-was-triggered-problem-on-Intel-R-Wireless-AC-9560/td-p/1274201

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
Review Cisco Networking for a $25 gift card