08-11-2020 07:43 AM - edited 07-05-2021 12:23 PM
Hello,
I've a Cisco WLC 2054 with 3 of Aironet 3802 AP's.
I would like to publish 3 SSID's/WLANs(SSID1+2+3) and 1 of the 3 SSID's (SSID 3) should only published on one special AP together with the other SSIDs.
To do this, I create 2 AP Groups:
"AP Group 1" with all SSID's (SSID1+2+3) and only the special 1 AP Member.
And "AP Group 2" with SSID 1+2 (without the "special" SSID 3) and the other two AP's.
Especially with regard to voice wlan...:
Are there any disadvantages when roaming with 2 AP-Groups?
Voice SSID/WLAN is published on all 3 AP's on both AP Groups.
Data Rates are the same on both AP Groups.
08-11-2020 08:59 AM
08-13-2020 12:50 AM
I've now applied that config and have some issues... !
When I go from the first room to the other room with my Macbook or other devies and the client will change to the other AP, the connection drops out...
I've done a client debug for you...
How can I fix this.. ?
(Cisco Controller) >*apfOpenDtlSocket: Aug 13 09:33:43.613: 3c:22:xx:xx:xx:xx Received management frame REASSOCIATION REQUEST on BSSID 78:72:5d:1e:18:4f destination addr 78:72:5d:1e:18:4f *spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 170 expected 170 action = 1 *spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Received ADD_MOBILE ack - Initiating 1x to STA 3c:22:xx:xx:xx:xx (idx 25) *spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx APF Initiating 1x to STA 3c:22:xx:xx:xx:xx *spamApTask0: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Sent dot1x auth initiate message for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx dot1xProcessInitiate1XtoMobile to mobile station 3c:22:xx:xx:xx:xx (mscb 4, msg 4) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx reauth_sm state transition 0 ---> 0 for mobile 3c:22:xx:xx:xx:xx at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Normal psk client, full auth *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Created PKC PMK Cache entry for station 3c:22:xx:xx:xx:xx (RSN 2) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Resetting MSCB PMK Cache Entry @index 0 for station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Removing BSSID 70:0f:6a:8d:f8:ce from PMKID cache of station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.620: 3c:22:xx:xx:xx:xx Setting active key cache index 0 ---> 8 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Setting active key cache index 8 ---> 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Created PMKID PMK Cache for BSSID 78:72:5d:1e:18:4f at index 0 for station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: New PMKID: (16) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0000] 10 57 96 88 6d e9 8c ac e2 6a 1a 79 de 9c eb 50 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Initiating RSN PSK to mobile 3c:22:xx:xx:xx:xxkeyMgmtType : 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx unsetting PmkIdValidatedByAp *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx dot1x - moving mobile 3c:22:xx:xx:xx:xx into Force Auth state *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Skipping EAP-Success to mobile 3c:22:xx:xx:xx:xx (encryptBit:0) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 78:72:5d:1e:18:4f in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 78:72:5d:1e:18:4f in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: Including PMKID in M1 (16) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0000] 10 57 96 88 6d e9 8c ac e2 6a 1a 79 de 9c eb 50 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: M1 - Key Data: (22) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0000] dd 14 00 0f ac 04 10 57 96 88 6d e9 8c ac e2 6a *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: [0016] 1a 79 de 9c eb 50 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Starting key exchange to mobile 3c:22:xx:xx:xx:xx, data packets will be dropped *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Allocating EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx *spamApTask1: Aug 13 09:33:43.621: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 155 expected 155 action = 6 *spamApTask1: Aug 13 09:33:43.622: 3c:22:xx:xx:xx:xx apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *dot1xSocketTask: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTK_START state (message 2) from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Encryption Policy: 4, PTK Key Length: 48 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Successfully computed PTK from PMK!!! *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Received valid MIC in EAPOL Key Message M2!!!!! *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx rsnieCapabilty = c00 rsnie_len =20 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.628: 3c:22:xx:xx:xx:xx Dumping RSNIE received in Association request(len = 22): *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0............... *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000010: 00 0f ac 02 0c 00 ...... *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Dumping RSNIE received in EAPOL M2 (len = 20): *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 00000010: ac 02 0c 00 .... *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.629: 3c:22:xx:xx:xx:xx Reusing allocated memory for EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx *dot1xSocketTask: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Freeing EAP Retransmit Bufer for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx apfMs1xStateInc *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent when fabric is disabled:65535 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent :65535 name : client acl id : 65535 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 78:72:5d:1e:18:40 vapId 1 apVapId 1 flex-acl-name: *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx apfMsRunStateInc *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.631: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Reached PLUMBFASTPATH: from line 7157, null *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Adding Fast Path rule type = Airespace AP Client on AP 78:72:5d:1e:18:40, slot 1, interface = 1, QOS = 1 IPv4 ACL ID = 255, IPv6 ACL ID = 255, *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) 802.1P = 4, DSCP = 34, TokenID = 15206, IntfId = 13 Local Bridging Vlan = 90, Local Bridging intf id = 13 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0) *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) NO release MSCB *Dot1x_NW_MsgTask_2: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Successfully Plumbed PTK session Keysfor mobile 3c:22:xx:xx:xx:xx *spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Add SGT:0 to AP 78:72:5d:1e:18:40 *spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Successful transmission of LWAPP Add-Mobile to AP 78:72:5d:1e:18:40 *spamApTask0: Aug 13 09:33:43.632: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 27, action 0, last count 170) ack state for STA on AP 78:72:5d:1e:18:40 *pemReceiveTask: Aug 13 09:33:43.633: 3c:22:xx:xx:xx:xx 10.2.9.53 Added NPU entry of type 1, dtlFlags 0x0 *apfReceiveTask: Aug 13 09:33:43.637: 3c:22:xx:xx:xx:xx Recieved MS IPv4 Addr= 10.2.9.53 *apfReceiveTask: Aug 13 09:33:43.637: 3c:22:xx:xx:xx:xx Recieved IPv6 addresses count: 0 *DHCP Socket Task: Aug 13 09:33:43.637: 3c:22:xx:xx:xx:xx DHCP received op BOOTREQUEST (1) (len 312,vlan 99, port 1, encap 0xec03, xid 0xdb342843) *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP processing DHCP REQUEST (3) *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP requested ip: 10.2.9.53 *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=90, datalen =18, optlen=68 *DHCP Socket Task: Aug 13 09:33:43.638: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to DS *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342843) *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:33:43.639: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342843) *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342843) *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1 *DHCP Socket Task: Aug 13 09:33:43.640: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342843) *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342843 (3677628483), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1 *DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1
and then i go back to the other room:
(Cisco Controller) >*DHCP Socket Task: Aug 13 09:33:43.641: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *apfOpenDtlSocket: Aug 13 09:34:24.327: 3c:22:xx:xx:xx:xx Received management frame REASSOCIATION REQUEST on BSSID 70:0f:6a:8d:f8:ce destination addr 70:0f:6a:8d:f8:ce *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Updating 11r vendor IE *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Processing assoc-req station:3c:22:xx:xx:xx:xx AP:70:0f:6a:8d:f8:c0-01 ssid : COMPANY.WLAN thread:1b82ed98 *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx trying to join WLAN with RSSI -44. Checking for XOR roam conditions on AP: 70:0F:6A:8D:F8:C0 Slot: 1 *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx is associating to AP 70:0F:6A:8D:F8:C0 which is not XOR roam capable *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Client AVC Roaming context transfer needed? NO *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Setting RTTS enabled to 0 *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Reassociation received from mobile on BSSID 70:0f:6a:8d:f8:cf AP SK-Kueche *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx trying to join WLAN with RSSI -44. Checking for XOR roam conditions on AP: 70:0F:6A:8D:F8:C0 Slot: 1 *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Station: 3c:22:xx:xx:xx:xx is associating to AP 70:0F:6A:8D:F8:C0 which is not XOR roam capable *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Global 200 Clients are allowed to AP radio *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Max Client Trap Threshold: 0 cur: 3 *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Rf profile 600 Clients are allowed to AP wlan *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx override for default ap group, marking intgrp NULL *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Applying Interface(we_data) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 90 *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Re-applying interface policy for client *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_0: Aug 13 09:34:24.328: 3c:22:xx:xx:xx:xx Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:SUEKI-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Check before Setting the NAS Id to WLAN specific Id 'SUEKI-WLC' *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Setting the NAS Id to WLAN specific Id 'SUEKI-WLC' *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx In processSsidIE:6947 setting Central switched to TRUE *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx In processSsidIE:6950 apVapId = 2 and Split Acl Id = 65535 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying site-specific Local Bridging override for station 3c:22:xx:xx:xx:xx - vapId 1, site 'Kueche_ONLY', interface 'we_data' *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying Local Bridging Interface Policy for station 3c:22:xx:xx:xx:xx - vlan 90, interface id 13, interface 'we_data', nasId:'SUEKI-WLC' *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx override from ap group, removing intf group from mscb *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying site-specific override for station 3c:22:xx:xx:xx:xx - vapId 1, site 'Kueche_ONLY', interface 'we_data' *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Not applying Local Bridge Policy because Site Specific Interface(we_data) Policy is already applied. *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Applying Interface(we_data) policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 90 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Re-applying interface policy for client *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3140) *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255),Default action is '0' --- (caller apf_policy.c:3160) *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:3181) *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Values before applying NASID - interfacetype:3, ovrd:0, mscb nasid:SUEKI-WLC, interface nasid:, APgrpset:0 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Setting the NAS Id to AP group specific Id 'SUEKI-WLC' *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx processSsidIE statusCode is 0 and status is 0 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx processSsidIE ssid_done_flag is 0 finish_flag is 0 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx STA - rates (6): 152 36 48 72 96 108 0 0 0 0 0 0 0 0 0 0 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx suppRates statusCode is 0 and gotSuppRatesElement is 1 *apfMsConnTask_0: Aug 13 09:34:24.329: RSNIE in Assoc. Req.: (20) *apfMsConnTask_0: Aug 13 09:34:24.329: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f *apfMsConnTask_0: Aug 13 09:34:24.329: [0016] ac 02 0c 00 *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Processing RSN IE type 48, length 20 for mobile 3c:22:xx:xx:xx:xx *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Selected Unicast cipher CCMP128 for client device *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx Received 802.11i PSK key management suite, enabling Authentication *apfMsConnTask_0: Aug 13 09:34:24.329: 3c:22:xx:xx:xx:xx RSN Capabilities: 12 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx non-11w Capable mobile *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Received RSN IE with 0 PMKIDs from mobile 3c:22:xx:xx:xx:xx *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx the value of url acl preserve flag is 1 for mobile 3c:22:xx:xx:xx:xx (caller pem_api.c:4931) *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Deleted mobile LWAPP rule on AP [78:72:5d:1e:18:40] *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Succesfully freed AID 5, slot 1 on AP 78:72:5d:1e:18:40, #client on this slot 2 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx New ctxOwnerMwarIp: 10.2.99.250 New ctxOwnerApMac: 70:0F:6A:8D:F8:C0 New ctxOwnerApEthMac: 78:72:5D:1D:51:D4 New ctxOwnerApSlotId: 1 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Updated location for station old AP 78:72:5d:1e:18:40 oldSlot 1, new AP 70:0f:6a:8d:f8:c0 newSlot 1, AID 0 MsType 0 MobilityRole 1 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Assigning flex webauth ACL ID :65535 for vlan : 2 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Allocate AID 6 slot 1 on AP SK-Kueche #clients on this slot 4 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfMsRunStateDec *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfMs1xStateDec *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Change state to START (0) last state RUN (20) *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0. *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx the value of url acl preserve flag is 0 for mobile 3c:22:xx:xx:xx:xx (caller pem_api.c:3504) *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 START (0) Initializing policy *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 START (0) Change state to AUTHCHECK (2) last state START (0) *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfVapSecurity=0x40004000 L2=16384 SkipWeb=0 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx AuthenticationRequired = 1 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2) *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Encryption policy is set to 0x80000001 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Not Using WMM Compliance code qosCap 00 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent when fabric is disabled:65535 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent :65535 name : client acl id : 65535 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx Vlan while overriding the policy = -1 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx 10.2.9.53 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 1 apVapId 2 flex-acl-name: *apfMsConnTask_0: Aug 13 09:34:24.330: 3c:22:xx:xx:xx:xx apfPemAddUser2 (apf_policy.c:438) Changing state for mobile 3c:22:xx:xx:xx:xx on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx apfPemAddUser2:session timeout forstation 3c:22:xx:xx:xx:xx - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0 *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Stopping deletion of Mobile Station: (callerId: 48) *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0 *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Sending assoc-resp with status 0 station:3c:22:xx:xx:xx:xx AP:70:0f:6a:8d:f8:c0-01 on apVapId 2 *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx VHT Operation IE: width 80/1 ch 52 freq0 58 freq1 0 msc0 0xff msc1 0xff *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx Sending Assoc Response (status: '0') to station on AP SK-Kueche on BSSID 70:0f:6a:8d:f8:ce ApVapId 2 Slot 1, mobility role 1 *apfMsConnTask_0: Aug 13 09:34:24.331: 3c:22:xx:xx:xx:xx apfProcessAssocReq (apf_80211.c:12012) Changing state for mobile 3c:22:xx:xx:xx:xx on AP 70:0f:6a:8d:f8:c0 from Associated to Associated *pemReceiveTask: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx 10.2.9.53 Removed NPU entry. *spamApTask0: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Setting DEL_MOBILE (seqno 0, action 6) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 27, seqno 172, action 6, count 172, last count 0) ack state for STA on AP 78:72:5d:1e:18:40 *spamApTask0: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Delete Mobile request on slot 1 sent to the AP 78:72:5d:1e:18:40 IP: 10.2.99.247:5272 *spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Add SGT:0 to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Aug 13 09:34:24.334: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 11, seqno 156, action 1, count 156, last count 170) ack state for STA on AP 70:0f:6a:8d:f8:c0 *spamApTask0: Aug 13 09:34:24.337: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 172 expected 172 action = 6 *spamApTask0: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx apfUpdateDeleteAckInMscb (apf_api.c:54425) Expiring Mobile! *spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Received add/del ack packet with sequence number: got 156 expected 156 action = 1 *spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Received ADD_MOBILE ack - Initiating 1x to STA 3c:22:xx:xx:xx:xx (idx 11) *spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx APF Initiating 1x to STA 3c:22:xx:xx:xx:xx *spamApTask1: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Sent dot1x auth initiate message for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx dot1xProcessInitiate1XtoMobile to mobile station 3c:22:xx:xx:xx:xx (mscb 5, msg 5) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx reauth_sm state transition 0 ---> 0 for mobile 3c:22:xx:xx:xx:xx at 1x_reauth_sm.c:53 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Normal psk client, full auth *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Created PKC PMK Cache entry for station 3c:22:xx:xx:xx:xx (RSN 2) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Resetting MSCB PMK Cache Entry @index 0 for station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Removing BSSID 78:72:5d:1e:18:4f from PMKID cache of station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Setting active key cache index 0 ---> 8 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Setting active key cache index 8 ---> 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Created PMKID PMK Cache for BSSID 70:0f:6a:8d:f8:ce at index 0 for station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: New PMKID: (16) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: [0000] b0 d4 88 f3 e4 40 1c 97 54 c4 7a d2 5e ae e0 08 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Initiating RSN PSK to mobile 3c:22:xx:xx:xx:xxkeyMgmtType : 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx unsetting PmkIdValidatedByAp *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx EAP-PARAM Debug - eap-params for Wlan-Id :1 is disabled - applying Global eap timers and retries *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Disable re-auth, use PMK lifetime. *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx dot1x - moving mobile 3c:22:xx:xx:xx:xx into Force Auth state *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx Skipping EAP-Success to mobile 3c:22:xx:xx:xx:xx (encryptBit:0) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.338: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 70:0f:6a:8d:f8:ce in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Found an cache entry for BSSID 70:0f:6a:8d:f8:ce in PMKID cache at index 0 of station 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: Including PMKID in M1 (16) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: [0000] b0 d4 88 f3 e4 40 1c 97 54 c4 7a d2 5e ae e0 08 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: M1 - Key Data: (22) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: [0000] dd 14 00 0f ac 04 b0 d4 88 f3 e4 40 1c 97 54 c4 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: [0016] 7a d2 5e ae e0 08 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Starting key exchange to mobile 3c:22:xx:xx:xx:xx, data packets will be dropped *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.339: 3c:22:xx:xx:xx:xx Allocating EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx *dot1xSocketTask: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTK_START state (message 2) from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Encryption Policy: 4, PTK Key Length: 48 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Successfully computed PTK from PMK!!! *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Received valid MIC in EAPOL Key Message M2!!!!! *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx rsnieCapabilty = c00 rsnie_len =20 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Dumping RSNIE received in Association request(len = 22): *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0............... *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000010: 00 0f ac 02 0c 00 ...... *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Dumping RSNIE received in EAPOL M2 (len = 20): *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................ *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 00000010: ac 02 0c 00 .... *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.343: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx Sending EAPOL-Key Message to mobile 3c:22:xx:xx:xx:xx state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.344: 3c:22:xx:xx:xx:xx Reusing allocated memory for EAP Pkt for retransmission to mobile 3c:22:xx:xx:xx:xx *dot1xSocketTask: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx validating eapol pkt: key version = 2 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Received EAPOL-Key from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx key Desc Version FT - 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Stopping retransmission timer for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Freeing EAP Retransmit Bufer for mobile 3c:22:xx:xx:xx:xx *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx apfMs1xStateInc *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Not Using WMM Compliance code qosCap 00 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent when fabric is disabled:65535 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx flex webauth acl id to be sent :65535 name : client acl id : 65535 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx Vlan while overriding the policy = -1 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 70:0f:6a:8d:f8:c0 vapId 1 apVapId 2 flex-acl-name: *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx apfMsRunStateInc *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Reached PLUMBFASTPATH: from line 7157, null *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Adding Fast Path rule type = Airespace AP Client on AP 70:0f:6a:8d:f8:c0, slot 1, interface = 1, QOS = 1 IPv4 ACL ID = 255, IPv6 ACL ID = 255, *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) 802.1P = 4, DSCP = 34, TokenID = 15206, IntfId = 13 Local Bridging Vlan = 90, Local Bridging intf id = 13 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.346: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255,URL ACL Action 0) *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) No 11v BTM *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx 10.2.9.53 RUN (20) NO release MSCB *Dot1x_NW_MsgTask_2: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Successfully Plumbed PTK session Keysfor mobile 3c:22:xx:xx:xx:xx *spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Add SGT:0 to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0 *spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Successful transmission of LWAPP Add-Mobile to AP 70:0f:6a:8d:f8:c0 *spamApTask1: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx Setting ADD_MOBILE (idx 13, action 0, last count 156) ack state for STA on AP 70:0f:6a:8d:f8:c0 *pemReceiveTask: Aug 13 09:34:24.347: 3c:22:xx:xx:xx:xx 10.2.9.53 Added NPU entry of type 1, dtlFlags 0x0 *apfReceiveTask: Aug 13 09:34:24.352: 3c:22:xx:xx:xx:xx Recieved MS IPv4 Addr= 10.2.9.53 *apfReceiveTask: Aug 13 09:34:24.352: 3c:22:xx:xx:xx:xx Recieved IPv6 addresses count: 0 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP received op BOOTREQUEST (1) (len 312,vlan 99, port 1, encap 0xec03, xid 0xdb342844) *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP (encap type 0xec03) mstype 0ff:ff:ff:ff:ff:ff *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP processing DHCP REQUEST (3) *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP requested ip: 10.2.9.53 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP Opt82 bridge mode insertion enabled, inserts opt82 if opt82 is enabled vlan=90, datalen =18, optlen=68 *DHCP Socket Task: Aug 13 09:34:24.354: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to DS *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342844) *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342844) *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.5 rcvd server id: 10.2.9.5 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 90, port 2, encap 0xec00, xid 0xdb342844) *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:34:24.356: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP received op BOOTREPLY (2) (len 310,vlan 99, port 1, encap 0xec03, xid 0xdb342844) *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP processing DHCP ACK (5) *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP xid: 0xdb342844 (3677628484), secs: 0, flags: 0 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP chaddr: 3c:22:xx:xx:xx:xx *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP ciaddr: 0.0.0.0, yiaddr: 10.2.9.53 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP siaddr: 0.0.0.0, giaddr: 10.2.9.1 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP server id: 10.2.9.1 rcvd server id: 10.2.9.1 *DHCP Socket Task: Aug 13 09:34:24.357: 3c:22:xx:xx:xx:xx DHCP successfully bridged packet to STA
08-13-2020 04:12 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide