cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1483
Views
0
Helpful
5
Replies

Client dropping WLC 5508

dazza007
Level 1
Level 1

I noticed our fleet of HP Laptops has dropped the Cisco compatibility shortly after purchasing them HP Probook 435 

I have noticed that the client drop. I have 802.11r and 802.11k with Radius authentication AES 

I am at a loss with what is happening

I have Radius auth - windows with WPA2 AES 802.1x FT802.1x

*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Received Identity Response (count=1) from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Resetting reauth count 1 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b EAP State update from Connecting to Authenticating for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticating state
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.750: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.755: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=2) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 2)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.756: 84:1b:77:86:ce:4b Allocating EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 2, EAP Type 3)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.758: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=3) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.759: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 3)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.760: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 3, EAP Type 13)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.763: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Processing Access-Challenge for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Entering Backend Auth Req state (id=4) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Sending EAP Request from AAA to mobile 84:1b:77:86:ce:4b (EAP Id 4)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.766: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAPOL EAPPKT from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Received EAP Response from mobile 84:1b:77:86:ce:4b (EAP Id 4, EAP Type 13)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Resetting reauth count 0 to 0 for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.774: 84:1b:77:86:ce:4b Entering Backend Auth Response state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Processing Access-Accept for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Previous Radius Overrides:(0)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_SEND_KEY: KeyLen: 32
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Received MPPE_RECV_KEY: KeyLen: 32
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting re-auth timeout to 1800 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Station 84:1b:77:86:ce:4b setting dot1x reauth timeout = 1800
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Created PKC PMK Cache entry for station 84:1b:77:86:ce:4b (RSN 2)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Resetting MSCB PMK Cache Entry @index 0 for station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.776: 84:1b:77:86:ce:4b Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMKID PMK Cache for BSSID e4:aa:5d:4f:c9:ae at index 0 for station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: New PMKID: (16)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Using PMK of length 32 as TGr MSK (in 802.1X case) AKM:3
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Created PMK Cache Entry for TGr AKM:802.1x 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b R0KH-ID:IPADDRESS R1KH-ID:6c:41:6a:5f:1e:60 MSK Len:48
pmkValidTime:1801
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b apfCreatePmkCacheEntry: added a new pmk cache entry for 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 1x: Updated the audit-session-id to PMK-Cache from client mscb: ac16440200002372625fe777
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Adding Audit session ID payload in Mobility handoff
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b PMK sent to mobility group
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Sending EAP-Success to mobile 84:1b:77:86:ce:4b (EAP Id 4)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b Freeing AAACB from Dot1xCB as AAA auth is done for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.777: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Found an cache entry for BSSID e4:aa:5d:4f:c9:ae in PMKID cache at index 0 of station 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] 8a ee d9 02 c6 6c 83 f6 1c 7c c0 45 8d b1 59 70
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: M1 - Key Data: (22)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0000] dd 14 00 0f ac 04 8a ee d9 02 c6 6c 83 f6 1c 7c
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: [0016] c0 45 8d b1 59 70
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Starting key exchange to mobile 84:1b:77:86:ce:4b, data packets will be dropped
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.02
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Entering Backend Auth Success state (id=4) for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b Received Auth Success while in Authenticating state for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.778: 84:1b:77:86:ce:4b dot1x - moving mobile 84:1b:77:86:ce:4b into Authenticated state
*dot1xSocketTask: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received EAPOL-key in PTK_START state (message 2) from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: R1KHID+S1KHID: (12)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: [0000] 6c 41 6a 5f 1e 60 84 1b 77 86 ce 4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b rsnieCapabilty = 3c00 rsnie_len =18
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b non-11w Capable mobile
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 84:1b:77:86:ce:4b Dumping RSNIE received in Association request(len = 24):
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.803: 00000000: 30 16 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: 00 0f ac 03 3c 00 00 00 ....<...
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Dumping RSNIE received in EAPOL M2 (len = 38):
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000010: ac 03 3c 00 01 00 78 d8 57 93 14 ea 9d d3 a5 bd ..<...x.W.......
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 00000020: 78 c6 5b 34 b6 95 x.[4..
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b 11r-FT: Validate MDIE info in M2 message from mobile
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Calculating PMKR0Name
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Encrypt EAPOL packets = TRUE
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Validate the 11r FTIE element received in the M2 against the assoc respnse FTIE
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Received EAPOL M2 with wepBit set in FTIE, validate R0KHID and R1KHID
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Successfully validated the FTIE in M2 with IE sent in association response
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Not Flex client. Do not distribute dot11r Key cache.
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Sending EAPOL-Key Message to mobile 84:1b:77:86:ce:4b
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.03
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.804: 84:1b:77:86:ce:4b Reusing allocated memory for EAP Pkt for retransmission to mobile 84:1b:77:86:ce:4b
*dot1xSocketTask: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b validating eapol pkt: key version = 3
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-Key from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b key Desc Version FT - 1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Stopping retransmission timer for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.807: 84:1b:77:86:ce:4b Freeing EAP Retransmit Bufer for mobile 84:1b:77:86:ce:4b
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b STA [84:1b:77:86:ce:4b, IPADDRESS] Deleting Fast Path Rule (8021X_AUTH)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b the value of url acl preserve flag is 0 for mobile 84:1b:77:86:ce:4b (caller pem_api.c:6008)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateDec
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateDec
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Change state to 8021X_REQD (3) last state RUN (20)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMs1xStateInc
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent when fabric is disabled:65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b flex webauth acl id to be sent :65535 name : client acl id : 65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Vlan while overriding the policy = -1
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP e4:aa:5d:4f:c9:a0 vapId 3 apVapId 2 flex-acl-name:
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b apfMsRunStateInc
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add SGT:0 to AP e4:aa:5d:4f:c9:a0
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Reached PLUMBFASTPATH: from line 7157, null
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Adding Fast Path rule
type = Airespace AP Client
on AP e4:aa:5d:4f:c9:a0, slot 1, interface = 13, QOS = 2
IPv4 ACL ID = 255, IPv6 ACL ID =
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Successful transmission of LWAPP Add-Mobile to AP e4:aa:5d:4f:c9:a0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) 802.1P = 0, DSCP = 46, TokenID = 15206, IntfId = 18 Local Bridging Vlan = 511, Local Bridging intf id = 18
*spamApTask2: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b Setting ADD_MOBILE (idx 96, action 0, last count 142) ack state for STA on AP e4:aa:5d:4f:c9:a0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_3: Apr 20 12:57:46.808: 84:1b:77:86:ce:4b IPADDRESS RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 4, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_

5 Replies 5

"non-11w Capable mobile" How Management Frame Protection is configured on the WLC?

Thank you for your help

It is disabled on the WLAN

Mark Elsen
Hall of Fame
Hall of Fame

 

 - Below you will find output from your debugging-trail when processed with : https://cway.cisco.com/wireless-debug-analyzer/  , Show All flag was checked (too) : 

Lines 1-12 of 12
  •  
  •  
  • 1
  •  
  •  


TimeTaskTranslated

Apr 20 12:57:46.750 *Dot1x_NW_MsgTask_3 Client sent EAP-Identity-Response to WLC/AP
Apr 20 12:57:46.750 *Dot1x_NW_MsgTask_3 Client sent EAP-Identity-Response to WLC/AP
Apr 20 12:57:46.776 *Dot1x_NW_MsgTask_3 RADIUS Server permitted access
Apr 20 12:57:46.776 *Dot1x_NW_MsgTask_3 Client will be required to Reauthenticate in 1800
seconds
Apr 20 12:57:46.777 *Dot1x_NW_MsgTask_3 WLC creates a PMK cache entry for this client, which is used for FT with AKM:802.1xin this case, so the PMKID is computed with the AP MAC address
Apr 20 12:57:46.778 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Sending M1
Apr 20 12:57:46.803 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Received M2
Apr 20 12:57:46.804 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Sending M3
Apr 20 12:57:46.807 *Dot1x_NW_MsgTask_3 4-Way PTK Handshake, Received M4
Apr 20 12:57:46.808 *Dot1x_NW_MsgTask_3 Client is entering the 802.1x or PSK Authentication state
Apr 20 12:57:46.808 *Dot1x_NW_MsgTask_3 Client has completed PSK Dot1x or WEP authentication phase
Apr 20 12:57:46.808 *Dot1x_NW_MsgTask_3 Client has entered RUN state


-- Let everything happen to you  
       Beauty and terror
      Just keep going    
       No feeling is final
Reiner Maria Rilke (1899)

Thank you that is very helpful to see the wood for the trees thank you!

I have a clients (60) with Intel Wifi-6 AX200 adapters which have random disconnects. 

The drivers (22.80.1.1) and board fw are the latests provided. 

The device only states an NEtwtw10 6062- Lso was triggered  when a disconnect happens. 

The WLC is the latest and the WAP AIR-CAP3702I-E-K9 are too. 

 

 

 - FYI : https://community.intel.com/t5/Wireless/6062-Lso-was-triggered-problem-on-Intel-R-Wireless-AC-9560/td-p/1274201

 M.



-- Let everything happen to you  
       Beauty and terror
      Just keep going    
       No feeling is final
Reiner Maria Rilke (1899)
Review Cisco Networking for a $25 gift card