08-11-2020 07:43 AM - edited 07-05-2021 12:23 PM
Hello,
I've a Cisco WLC 2054 with 3 of Aironet 3802 AP's.
I would like to publish 3 SSID's/WLANs(SSID1+2+3) and 1 of the 3 SSID's (SSID 3) should only published on one special AP together with the other SSIDs.
To do this, I create 2 AP Groups:
"AP Group 1" with all SSID's (SSID1+2+3) and only the special 1 AP Member.
And "AP Group 2" with SSID 1+2 (without the "special" SSID 3) and the other two AP's.
Especially with regard to voice wlan...:
Are there any disadvantages when roaming with 2 AP-Groups?
Voice SSID/WLAN is published on all 3 AP's on both AP Groups.
Data Rates are the same on both AP Groups.
08-11-2020 08:59 AM
08-13-2020 12:50 AM
I've now applied that config and have some issues... !
When I go from the first room to the other room with my Macbook or other devies and the client will change to the other AP, the connection drops out...
I've done a client debug for you...
How can I fix this.. ?
(Cisco Controller) >*apfOpenDtlSocket: Aug 13 09:33:43.613: 3c:22:xx:xx:xx:xx Received management frame REASSOCIATION REQUEST on BSSID 78:72:5d:1e:18:4f destination addr 78:72:5d:1e:18:4f
*spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 170 expected 170 action = 1
*spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Received ADD_MOBILE ack - Initiating 1x to STA 3c:22:xx:xx:xx:xx (idx 25)
*spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx APF Initiating 1x to STA 3c:22:xx:xx:xx:xx
*spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Sent dot1x auth initiate message for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx dot1xProcessInitiate1XtoMobile to mobile station 3c:22:xx:xx:xx:xx (mscb 4, msg 4)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx reauth_sm state transition 0 ---> 0 for mobile 3c:22:xx:xx:xx:xx at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Normal psk client, full auth
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Created PKC PMK Cache entry for station 3c:22:xx:xx:xx:xx (RSN 2)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Resetting MSCB PMK Cache Entry @index 0 for station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Removing BSSID 70:0f:6a:8d:f8:ce from PMKID cache of station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Created PMKID PMK Cache for BSSID 78:72:5d:1e:18:4f at index 0 for station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: New PMKID: (16)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0000] 10 57 96 88 6d e9 8c ac e2 6a 1a 79 de 9c eb 50
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Initiating RSN PSK to mobile 3c:22:xx:xx:xx:xxkeyMgmtType : 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx dot1x - moving mobile 3c:22:xx:xx:xx:xx into Force Auth state
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Skipping EAP-Success to mobile 3c:22:xx:xx:xx:xx (encryptBit:0)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 78:72:5d:1e:18:4f in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 78:72:5d:1e:18:4f in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0000] 10 57 96 88 6d e9 8c ac e2 6a 1a 79 de 9c eb 50
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: M1 - Key Data: (22)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0000] dd 14 00 0f ac 04 10 57 96 88 6d e9 8c ac e2 6a
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0016] 1a 79 de 9c eb 50
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Starting key exchange to mobile 3c:22:xx:xx:xx:xx, data packets will be dropped
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Allocating EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx
*spamApTask1: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 155 expected 155 action = 6
*spamApTask1: Aug 13 09:33:43.622: 3c:22:xx:xx:xx:xx apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*dot1xSocketTask: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTK_START state (message 2) from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx rsnieCapabilty = c00 rsnie_len =20
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Dumping RSNIE received in Association request(len = 22):
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000010: 00 0f ac 02 0c 00 ......
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Dumping RSNIE received in EAPOL M2 (len = 20):
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000010: ac 02 0c 00 ....
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Reusing allocated memory for EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx
*dot1xSocketTask: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Freeing EAP Retransmit Bufer for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent when fabric is disabled:65535
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent :65535 name : client acl id : 65535
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Vlan while overriding the policy = -1
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 1 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx apfMsRunStateInc
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Reached PLUMBFASTPATH: from line 7157, null
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Adding Fast Path rule
type = Airespace AP Client
on AP 78:72:5d:1e:18:40, slot 1, interface = 1, QOS = 1
IPv4 ACL ID = 255, IPv6 ACL ID = 255,
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) 802.1P = 4, DSCP = 34, TokenID = 15206, IntfId = 13 Local Bridging Vlan = 90, Local Bridging intf id = 13
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0)
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) No 11v BTM
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) NO release MSCB
*Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Successfully Plumbed PTK session Keysfor mobile 3c:22:xx:xx:xx:xx
*spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Add SGT:0 to AP 78:72:5d:1e:18:40
*spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40
*spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 27, action 0, last count 170) ack state for STA on AP 78:72:5d:1e:18:40
*pemReceiveTask: Aug 13 09:33:43.633: 3c:22:xx:xx:xx:xx 10.2.9.53 Added NPU entry of type 1, dtlFlags 0x0
*apfReceiveTask: Aug 13 09:33:43.637: 3c:22:xx:xx:xx:xx Recieved MS IPv4 Addr= 10.2.9.53
*apfReceiveTask: Aug 13 09:33:43.637: 3c:22:xx:xx:xx:xx Recieved IPv6 addresses count: 0
*DHCP Socket Task: Aug 13 09:33:43.637: 3c:22:xx:xx:xx:xx DHCP received op BOOTREQUEST (1) (len 312,vlan 99, port 1, encap 0xec03, xid 0xdb342843)
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP processing DHCP REQUEST (3)
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP requested ip: 10.2.9.53
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=90, datalen =18, optlen=68
*DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to DS
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342843)
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342843)
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342843)
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1
*DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342843)
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1
*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1and then i go back to the other room:
(Cisco Controller) >*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*apfOpenDtlSocket: Aug 13 09:34:24.327: 3c:22:xx:xx:xx:xx Received management frame REASSOCIATION REQUEST on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Updating 11r vendor IE
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Processing assoc-req station:3c:22:xx:xx:xx:xx AP:70:0f:6a:8d:f8:c0-01 ssid : COMPANY.WLAN thread:1b82ed98
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx trying to join WLAN with RSSI -44. Checking for XOR roam conditions on AP: 70:0F:6A:8D:F8:C0 Slot: 1
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx is associating to AP 70:0F:6A:8D:F8:C0 which is not XOR roam capable
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Client AVC Roaming context transfer needed? NO
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Setting RTTS enabled to 0
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Reassociation received from mobile on BSSID 70:0f:6a:8d:f8:cf AP SK-Kueche
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx trying to join WLAN with RSSI -44. Checking for XOR roam conditions on AP: 70:0F:6A:8D:F8:C0 Slot: 1
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx is associating to AP 70:0F:6A:8D:F8:C0 which is not XOR roam capable
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Max Client Trap Threshold: 0 cur: 3
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Applying Interface(we_data) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 90
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Re-applying interface policy for client
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:SUEKI-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Check before Setting the NAS Id to WLAN specific Id 'SUEKI-WLC'
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Setting the NAS Id to WLAN specific Id 'SUEKI-WLC'
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx In processSsidIE:6947 setting Central switched to TRUE
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying site-specific Local Bridging override for station 3c:22:xx:xx:xx:xx - vapId 1, site 'Kueche_ONLY', interface 'we_data'
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying Local Bridging Interface Policy for station 3c:22:xx:xx:xx:xx - vlan 90, interface id 13, interface 'we_data', nasId:'SUEKI-WLC'
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx override from ap group, removing intf group from mscb
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying site-specific override for station 3c:22:xx:xx:xx:xx - vapId 1, site 'Kueche_ONLY', interface 'we_data'
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Not applying Local Bridge Policy because Site Specific Interface(we_data) Policy is already applied.
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying Interface(we_data) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 90
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Re-applying interface policy for client
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140)
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160)
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181)
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:SUEKI-WLC, interface nasid:, APgrpset:0
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Setting the NAS Id to AP group specific Id 'SUEKI-WLC'
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx STA - rates (6): 152 36 48 72 96 108 0 0 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Aug 13 09:34:24.329: RSNIE in Assoc. Req.: (20)
*apfMsConnTask_0: Aug 13 09:34:24.329: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Aug 13 09:34:24.329: [0016] ac 02 0c 00
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Processing RSN IE type 48, length 20 for mobile 3c:22:xx:xx:xx:xx
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Received 802.11i PSK key management suite, enabling Authentication
*apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx RSN Capabilities: 12
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx non-11w Capable mobile
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Received RSN IE with 0 PMKIDs from mobile 3c:22:xx:xx:xx:xx
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx the value of url acl preserve flag is 1 for mobile 3c:22:xx:xx:xx:xx (caller pem_api.c:4931)
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40]
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Succesfully freed AID 5, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac: 78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 1
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Assigning flex webauth ACL ID :65535 for vlan : 2
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Allocate AID 6 slot 1 on AP SK-Kueche #clients on this slot 4
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfMsRunStateDec
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfMs1xStateDec
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Change state to START (0) last state RUN (20)
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx the value of url acl preserve flag is 0 for mobile 3c:22:xx:xx:xx:xx (caller pem_api.c:3504)
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 START (0) Initializing policy
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfVapSecurity=0x40004000 L2=16384 SkipWeb=0
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx AuthenticationRequired = 1
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Encryption policy is set to 0x80000001
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Not Using WMM Compliance code qosCap 00
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent when fabric is disabled:65535
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent :65535 name : client acl id : 65535
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Vlan while overriding the policy = -1
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 1 apVapId 2 flex-acl-name:
*apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfPemAddUser2 (apf_policy.c:438) Changing state for mobile 3c:22:xx:xx:xx:xx on AP 70:0f:6a:8d:f8:c0 from Associated to Associated
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx apfPemAddUser2:session timeout forstation 3c:22:xx:xx:xx:xx - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Sending assoc-resp with status 0 station:3c:22:xx:xx:xx:xx AP:70:0f:6a:8d:f8:c0-01 on apVapId 2
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 1
*apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile 3c:22:xx:xx:xx:xx on AP 70:0f:6a:8d:f8:c0 from Associated to Associated
*pemReceiveTask: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx 10.2.9.53 Removed NPU entry.
*spamApTask0: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 27, seqno 172, action 6, count 172, last count 0) ack state for STA on AP 78:72:5d:1e:18:40
*spamApTask0: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5272
*spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Add SGT:0 to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 11, seqno 156, action 1, count 156, last count 170) ack state for STA on AP 70:0f:6a:8d:f8:c0
*spamApTask0: Aug 13 09:34:24.337: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 172 expected 172 action = 6
*spamApTask0: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile!
*spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 156 expected 156 action = 1
*spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Received ADD_MOBILE ack - Initiating 1x to STA 3c:22:xx:xx:xx:xx (idx 11)
*spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx APF Initiating 1x to STA 3c:22:xx:xx:xx:xx
*spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Sent dot1x auth initiate message for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx dot1xProcessInitiate1XtoMobile to mobile station 3c:22:xx:xx:xx:xx (mscb 5, msg 5)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx reauth_sm state transition 0 ---> 0 for mobile 3c:22:xx:xx:xx:xx at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Normal psk client, full auth
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Created PKC PMK Cache entry for station 3c:22:xx:xx:xx:xx (RSN 2)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Resetting MSCB PMK Cache Entry @index 0 for station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Removing BSSID 78:72:5d:1e:18:4f from PMKID cache of station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Created PMKID PMK Cache for BSSID 70:0f:6a:8d:f8:ce at index 0 for station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: New PMKID: (16)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: [0000] b0 d4 88 f3 e4 40 1c 97 54 c4 7a d2 5e ae e0 08
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Initiating RSN PSK to mobile 3c:22:xx:xx:xx:xxkeyMgmtType : 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx dot1x - moving mobile 3c:22:xx:xx:xx:xx into Force Auth state
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Skipping EAP-Success to mobile 3c:22:xx:xx:xx:xx (encryptBit:0)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 70:0f:6a:8d:f8:ce in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 70:0f:6a:8d:f8:ce in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: [0000] b0 d4 88 f3 e4 40 1c 97 54 c4 7a d2 5e ae e0 08
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: M1 - Key Data: (22)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: [0000] dd 14 00 0f ac 04 b0 d4 88 f3 e4 40 1c 97 54 c4
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: [0016] 7a d2 5e ae e0 08
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Starting key exchange to mobile 3c:22:xx:xx:xx:xx, data packets will be dropped
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Allocating EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx
*dot1xSocketTask: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTK_START state (message 2) from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx rsnieCapabilty = c00 rsnie_len =20
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Dumping RSNIE received in Association request(len = 22):
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000010: 00 0f ac 02 0c 00 ......
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Dumping RSNIE received in EAPOL M2 (len = 20):
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000010: ac 02 0c 00 ....
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx Reusing allocated memory for EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx
*dot1xSocketTask: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx key Desc Version FT - 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Freeing EAP Retransmit Bufer for mobile 3c:22:xx:xx:xx:xx
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent when fabric is disabled:65535
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent :65535 name : client acl id : 65535
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Vlan while overriding the policy = -1
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 1 apVapId 2 flex-acl-name:
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx apfMsRunStateInc
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Reached PLUMBFASTPATH: from line 7157, null
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Adding Fast Path rule
type = Airespace AP Client
on AP 70:0f:6a:8d:f8:c0, slot 1, interface = 1, QOS = 1
IPv4 ACL ID = 255, IPv6 ACL ID = 255,
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) 802.1P = 4, DSCP = 34, TokenID = 15206, IntfId = 13 Local Bridging Vlan = 90, Local Bridging intf id = 13
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0)
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) No 11v BTM
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) NO release MSCB
*Dot1x_NW_MsgTask_2: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Successfully Plumbed PTK session Keysfor mobile 3c:22:xx:xx:xx:xx
*spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Add SGT:0 to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0
*spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 13, action 0, last count 156) ack state for STA on AP 70:0f:6a:8d:f8:c0
*pemReceiveTask: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx 10.2.9.53 Added NPU entry of type 1, dtlFlags 0x0
*apfReceiveTask: Aug 13 09:34:24.352: 3c:22:xx:xx:xx:xx Recieved MS IPv4 Addr= 10.2.9.53
*apfReceiveTask: Aug 13 09:34:24.352: 3c:22:xx:xx:xx:xx Recieved IPv6 addresses count: 0
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP received op BOOTREQUEST (1) (len 312,vlan 99, port 1, encap 0xec03, xid 0xdb342844)
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP processing DHCP REQUEST (3)
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP requested ip: 10.2.9.53
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=90, datalen =18, optlen=68
*DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to DS
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342844)
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342844)
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342844)
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342844)
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5)
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1
*DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
08-13-2020 04:12 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide