cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2437
Views
11
Helpful
48
Replies

Windows laptop not able to join 802.1x SSID on C9800-CL

Simon Z
Level 1
Level 1

I am in the middle of migrating WLC 5520 (8.10.190.0) to C9800-CL (17.12.05) while APs remain the same (3802i). AAA servers are ISE 3.4 patch 2. We use centralized switching (no Flex mode). I have an 802.1X SSID allowing both EAP-TLS and PEAP+MSCHAPv2. The SSID on WLC 5520 works for pretty much all devices we have. The same SSID on C9800-CL works for most devices I tested so far but one particular Windows laptop.

  1. The same laptop connects to the SSID on 5520 without any issues using EAP-TLS. Tried different Windows builds (10 and 11) and updated Wi-Fi NIC driver to the latest. Machine certificate is fine. Tried manually adding network with EAP-TLS, and PEAP + MSCHAPv2. None worked with the new C9800-CL.
  2. There is no logs for this particular laptop/MAC on ISE meaning the Authenticator (C9800-CL) is not sending Radius request to Authentication Server (ISE) when the Supplicant client tries to join the SSID.
  3. I did some packet captures on the C9800-CL by providing “Inner Filter MAC” and did a comparison between a successful connection and a failed one.

It’s interesting to notice the captured packets are between the C9800-CL and the AP, but 802.1X authentication is between the supplicant (laptop) and the AP (BSSID MAC). On a successful connection, after the supplicant sends Response with Identity (host/xxxxxx), the AP sends a EAP-TLS Request, and after quite a few EAP packets exchange authentication succeeds.

SimonZ_0-1756240489592.png

On a failed connection, after the supplicant sends Response with Identity (host/xxxxxx), the AP just sends a Failure EAP packet and never sends a 802.1X proposal:

SimonZ_1-1756240489596.png

This explains why ISE never sees a Radius request for this particular laptop. I’ve tested 5 Windows laptops and a few iOS/Android devices so far, and found only one problematic laptop, but I don’t know how many more out of about 1000 laptops may experience the same issue.

A TAC ticket is going nowhere, and the engineer insists something is wrong with the laptop but doesn’t know what exactly is wrong. I’ve seen some similar issues online and it seems nobody was able to explain why there is no logs on Radius servers. Has anyone seen this?

48 Replies 48

OK, I still assume that the behave of Win of build identity 

this answer I get from AI 

Difference between Win10 and Win11

Windows 10

  • By default, sent the same username for both Outer and Inner identity.

    • Example:

      • Outer: user1@corp.local

      • Inner: user1@corp.local

  • Some admins enabled "Identity Privacy" manually in the Wireless Network properties (advanced EAP settings).

  • Cisco ISE/ACS logs usually showed the real username in the first RADIUS Access-Request.

Windows 11

  • Microsoft changed the default:

    • Outer Identity defaults to anonymous@domain (or just anonymous).

    • Inner Identity (inside the tunnel) contains the real username.

  • Example:

    • Outer: anonymous@corp.local

    • Inner: user1@corp.local

  • So in Cisco ISE/ACS/RADIUS logs:

    • You will first see anonymous@corp.local in the Access-Request.

    • After TLS tunnel negotiation, ISE extracts the real username (user1@corp.local) from the inner EAP exchange.

JPavonM
VIP
VIP

I agree to TAC that something going on with the "bad" Win11 clients. If they were migrated from Win10, maybe the supplicat is with somekind of error, or outadated version.

Simon Z
Level 1
Level 1

I was able to turn a spare AP into Sniffer mode and captured the packets when the "bad" laptop join the same SSID on WLC 5520 by using EAP-TLS authentication:

Screenshot 2025-09-02 115924.pngScreenshot 2025-09-02 122145.pngScreenshot 2025-09-02 122233.png

Good point!

C9800 always advertises 802.1x version 3 (802.1X-2010) while 5520 does version 2 (802.1X-2004).

On C9800, the good laptop always responds with version1 (802.1X-2001) and it works.

On C9800, the bad laptop also responds with version 1 but it fails.

On 5520, the bad laptop responds with version 1 and it works.

I changed the version on C9800 from 3 to 2 (not able to change to version 1), the bad one still doesn't connect while the good one does. Packet capture confirms C9800 is now advertising version 2. 

How it adverise ver2 if it send failed for user identity response?

Check capture between wlc abd ise' see if WLC still not send any packet to ISE for bad laptop 

MHM

Simon Z
Level 1
Level 1

When it requests for identity:

SimonZ_0-1756834449697.png

 

Simon Z
Level 1
Level 1

All logs related to MAC of the "bad" laptop on ISE come from 5520. No logs are from C9800 at all.

Can I see RadioTrace of bad in wlc

MHM

Simon Z
Level 1
Level 1

Logging display requested on 2025/09/02 13:46:32 (EST) for Hostname: [S-vWLC1], Model: [C9800-CL-K9], Version: [17.12.05], SN: [9IM8GZLZQXT], MD_SN: [9IM8GZLZQXT]
2025/09/02 13:46:14.016090441 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Association received. BSSID 00a3.8eb5.8bcf, WLAN SHINE, Slot 1 AP 00a3.8eb5.8bc0, t-AP-3802, Site tag site-tag-main, Policy tag policy-tag-main, Policy profile policy-profile-shine, Switching Central, Socket delay 0ms
2025/09/02 13:46:14.016139303 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Received Dot11 association request. Processing started,SSID: t-SHINE, Policy profile: policy-profile-shine, AP Name: t-AP-3802, Ap Mac Address: 00a3.8eb5.8bc0BSSID MAC0000.0000.0000wlan ID: 1RSSI: -39, SNR: 58
2025/09/02 13:46:14.016262102 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_INIT -> S_CO_ASSOCIATING
2025/09/02 13:46:14.016500172 {wncd_x_R0-0}{1}: [dot11-validate] [15455]: (info): MAC: 04d3.b006.f734 Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2
2025/09/02 13:46:14.016502487 {wncd_x_R0-0}{1}: [dot11-validate] [15455]: (info): MAC: 04d3.b006.f734 WiFi direct: Dot11 validate P2P IE. P2P IE not present.
2025/09/02 13:46:14.016628829 {wncd_x_R0-0}{1}: [dot11] [15455]: (debug): MAC: 04d3.b006.f734 dot11 send association response. Framing association response with resp_status_code: 0
2025/09/02 13:46:14.016629301 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Dot11 capability privacy bit set TRUE
2025/09/02 13:46:14.016633100 {wncd_x_R0-0}{1}: [dot11] [15455]: (debug): MAC: 04d3.b006.f734 Dot11 Capability info byte1 11, byte2: 11
2025/09/02 13:46:14.016666141 {wncd_x_R0-0}{1}: [dot11-frame] [15455]: (info): MAC: 04d3.b006.f734 WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled
2025/09/02 13:46:14.016809736 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 dot11 send association response. Sending assoc response of length: 245 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS
2025/09/02 13:46:14.016814519 {wncd_x_R0-0}{1}: [dot11] [15455]: (note): MAC: 04d3.b006.f734 Association success. AID 3, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False
2025/09/02 13:46:14.016825262 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 DOT11 state transition: S_DOT11_INIT -> S_DOT11_ASSOCIATED
2025/09/02 13:46:14.016879016 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Station Dot11 association is successful.
2025/09/02 13:46:14.016924619 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Starting L2 authentication. Bssid in state machine:00a3.8eb5.8bcf Bssid in request is:00a3.8eb5.8bcf
2025/09/02 13:46:14.016939250 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_ASSOCIATING -> S_CO_L2_AUTH_IN_PROGRESS
2025/09/02 13:46:14.016998320 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 Client QoS add mobile cb
2025/09/02 13:46:14.017137995 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 Failed to install QoS client policy in process add mobile callback: AP Mac: 00:A3:8E:B5:8B:C0 slotId=1, wlan_id=1
2025/09/02 13:46:14.017173253 {wncd_x_R0-0}{1}: [client-auth] [15455]: (note): MAC: 04d3.b006.f734 ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 00a3.8eb5.8bcf capwap IFID: 0x90000005, Add mobiles sent: 1
2025/09/02 13:46:14.017188147 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_INIT -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_DOT1X
2025/09/02 13:46:14.027062805 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Session Start event called from SANET-SHIM, vlan: 0
2025/09/02 13:46:14.027078945 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Wireless session sequence, create context with method Dot1X
2025/09/02 13:46:14.027082734 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): Wireless dot1x configs:
EAPID req max retries = 2 EAP req max retries = 2 EAPID req timeout = 30 Supp Timeout = 30
2025/09/02 13:46:14.027097687 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): [04d3.b006.f734:capwap_90000005] - authc_list: AuthC-ISE
2025/09/02 13:46:14.027098678 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): [04d3.b006.f734:capwap_90000005] - authz_list: Not present under wlan configuration
2025/09/02 13:46:14.027109959 {wncd_x_R0-0}{1}: [client-auth] [15455]: (note): MAC: 04d3.b006.f734 L2 Authentication initiated. method DOT1X, Policy VLAN 0, AAA override = 1 , NAC = 0
2025/09/02 13:46:14.027112259 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_DOT1X -> S_AUTHIF_AWAIT_DOT1XAUTH_START_RESP
2025/09/02 13:46:14.027219940 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:unknown] auth mgr attr add/change notification is received for attr iif-id(952)
2025/09/02 13:46:14.027250635 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr swbidb(1263)
2025/09/02 13:46:14.027307862 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr aaa-unique-id(220)
2025/09/02 13:46:14.027323383 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr iif-id(952)
2025/09/02 13:46:14.027328929 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Retrieved Client IIF ID 0x200084d
2025/09/02 13:46:14.027354668 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr audit-session-id(819)
2025/09/02 13:46:14.027359549 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Allocated audit session id B73016AC0000001D0B895467
2025/09/02 13:46:14.027557925 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Device type found in cache Intel-Device
2025/09/02 13:46:14.027562678 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Device type for the session is detected as Intel-Device and old device-type not classified earlier & Device name for the session is detected as INTEL CORPORATE and old device-name not classified earlier & Old protocol map 0 and new is 1
2025/09/02 13:46:14.027632277 {wncd_x_R0-0}{1}: [mm-client] [15455]: (debug): MAC: 0000.0000.0000 Sending device_cache_update of XID (0) to (MobilityD[0])
2025/09/02 13:46:14.027710245 {mobilityd_R0-0}{1}: [mm-client] [16716]: (debug): MAC: 0000.0000.0000 Received device_cache_update, sub type: 0 of XID (0) from (WNCD[0])
2025/09/02 13:46:14.027987747 {wncd_x_R0-0}{1}: [svm] [15455]: (info): SVM_INFO: Applying Svc Templ wlan_svc_policy-profile-shine_local (ML:NONE)
2025/09/02 13:46:14.028143460 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr vlan-id(965)
2025/09/02 13:46:14.028155934 {wncd_x_R0-0}{1}: [epm] [15455]: (info): [04d3.b006.f734:capwap_90000005] Vlan tag name is shine, pref is 1048575 vlan num is 240
2025/09/02 13:46:14.028186370 {wncd_x_R0-0}{1}: [epm] [15455]: (info): [04d3.b006.f734:capwap_90000005] Feature (EPM Vlan PLUG-IN) has been started (status Success)
2025/09/02 13:46:14.028194698 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] SM Reauth Plugin: Received valid timeout = 86400, effective timeout = 86400
2025/09/02 13:46:14.028212947 {wncd_x_R0-0}{1}: [epm] [15455]: (info): [04d3.b006.f734:capwap_90000005] Feature (SM Reauth PLUG-IN) has been started (status Success)
2025/09/02 13:46:14.028238633 {wncd_x_R0-0}{1}: [svm] [15455]: (info): SVM_INFO: Response of epm is SYNC with return code Success
2025/09/02 13:46:14.028275206 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raising ext evt Template Activated (9) on this session, client (unknown) (0)
2025/09/02 13:46:14.028349977 {wncd_x_R0-0}{1}: [llbridge-main] [15455]: (debug): MAC: 04d3.b006.f734 Link-local bridging not enabled for this client, not checking VLAN validity
2025/09/02 13:46:14.028391147 {wncd_x_R0-0}{1}: [svm] [15455]: (info): SVM_INFO: SVM Apply user profile
2025/09/02 13:46:14.028463084 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Initialising auth state
2025/09/02 13:46:14.028469319 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Setting Auth state to disconnected
2025/09/02 13:46:14.028471979 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering restart state
2025/09/02 13:46:14.028474592 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - MAC 04d3.b006.f734 - profile (none)
2025/09/02 13:46:14.028475884 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - SuppTimeout 30s, ReAuthMax 2, MaxReq 2, TxPeriod 30s
2025/09/02 13:46:14.028477895 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sending create new context event to EAP for 0xFB000013 (04d3.b006.f734)
2025/09/02 13:46:14.028494643 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering init state
2025/09/02 13:46:14.028497682 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:14.028502995 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Dot1x authentication started for (04d3.b006.f734)
2025/09/02 13:46:14.028507037 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Context changing state from 'Idle' to 'Running'
2025/09/02 13:46:14.028509374 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Method dot1x changing state from 'Not run' to 'Running'
2025/09/02 13:46:14.028764625 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] SM will not send event Template Activated to PRE for 0xA3000013
2025/09/02 13:46:14.028791302 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_AWAIT_DOT1XAUTH_START_RESP -> S_AUTHIF_DOT1XAUTH_PENDING
2025/09/02 13:46:14.028793699 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [15455]: (note): Authentication Success. Resolved Policy bitmap:11 for client 04d3.b006.f734
2025/09/02 13:46:14.028800119 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_DOT1XAUTH_PENDING -> S_AUTHIF_DOT1XAUTH_PENDING
2025/09/02 13:46:14.028823476 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !EAP_RESTART on Client
2025/09/02 13:46:14.028826198 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Enter connecting state
2025/09/02 13:46:14.028828471 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Restart connecting
2025/09/02 13:46:14.028835781 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Device type for the session is detected as Intel-Device and old Intel-Device & Device name for the session is detected as INTEL CORPORATE and old INTEL CORPORATE & Old protocol map 1 and new is 1
2025/09/02 13:46:14.028844150 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr dc-profile-name(1130)
2025/09/02 13:46:14.028856868 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting RX_REQ on Client
2025/09/02 13:46:14.028862981 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authenticating state entered
2025/09/02 13:46:14.028865751 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Connecting authenticating action
2025/09/02 13:46:14.028871512 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering request state
2025/09/02 13:46:14.028880571 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:14.028881524 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:14.028948046 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 5, EAP-Type = Identity
2025/09/02 13:46:14.028951852 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - REQUEST, ID : 0x1
2025/09/02 13:46:14.028953354 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 01 01 00 05 01
2025/09/02 13:46:14.028955222 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:14.046051197 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received EAPOL packet - Version : 1,EAPOL Type : START, Payload Length : 0
2025/09/02 13:46:14.046060184 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Dequeued pkt: CODE = 0,TYPE = 0,LEN = 0
2025/09/02 13:46:14.046063232 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Received pkt saddr = 04d3.b006.f734 , daddr = 00a3.8eb5.8bc0, pae-ether-type = 0x888E
2025/09/02 13:46:14.046077353 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting EAPOL_START on Client
2025/09/02 13:46:14.046122276 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering init state
2025/09/02 13:46:14.046125609 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:14.046128403 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !AUTH_ABORT on Client
2025/09/02 13:46:14.046131957 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering restart state
2025/09/02 13:46:14.046135567 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Resetting the client 0xFB000013
2025/09/02 13:46:14.046141418 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - MAC 04d3.b006.f734 - profile (none)
2025/09/02 13:46:14.046142746 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - SuppTimeout 30s, ReAuthMax 2, MaxReq 2, TxPeriod 30s
2025/09/02 13:46:14.046144797 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sending create new context event to EAP for 0xFB000013 (04d3.b006.f734)
2025/09/02 13:46:14.046187956 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !EAP_RESTART on Client
2025/09/02 13:46:14.046190953 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Enter connecting state
2025/09/02 13:46:14.046193754 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Restart connecting
2025/09/02 13:46:14.046197189 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting RX_REQ on Client
2025/09/02 13:46:14.046202816 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authenticating state entered
2025/09/02 13:46:14.046205411 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Connecting authenticating action
2025/09/02 13:46:14.046210613 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering request state
2025/09/02 13:46:14.046215628 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:14.046216264 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:14.046274561 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 5, EAP-Type = Identity
2025/09/02 13:46:14.046276051 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - REQUEST, ID : 0x1
2025/09/02 13:46:14.046277385 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 01 01 00 05 01
2025/09/02 13:46:14.046281235 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:14.054066332 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received EAPOL packet - Version : 1,EAPOL Type : EAP, Payload Length : 48, EAP-Type = Identity
2025/09/02 13:46:14.054068459 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - RESPONSE, ID : 0x1
2025/09/02 13:46:14.054077964 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 02 01 00 30 01 68 6f 73 74 2f 53 52 48 43 30 30 36 39 39 38 2e 53 6f 75 74 68 6c 61 6b 65 72 65 67 69 6f 6e 61 6c 2e 6f 72 67 2e 6c 6f 63 61 6c
2025/09/02 13:46:14.054081479 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Queuing an EAPOL pkt on Authenticator Q
2025/09/02 13:46:14.054089809 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Dequeued pkt: CODE = 2,TYPE = 1,LEN = 48
2025/09/02 13:46:14.054093682 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Received pkt saddr = 04d3.b006.f734 , daddr = 00a3.8eb5.8bc0, pae-ether-type = 0x888E
2025/09/02 13:46:14.054343788 {wncd_x_R0-0}{1}: [caaa-authen] [15455]: (info): [CAAA:AUTHEN:a3000013] NULL ATTR LIST
2025/09/02 13:46:14.054464130 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised identity update event for eap method Identity
2025/09/02 13:46:14.054484013 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:14.054487708 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting AUTH_FAIL on Client
2025/09/02 13:46:14.056595512 {wncd_x_R0-0}{1}: [errmsg] [15455]: (note): %DOT1X-5-FAIL: R0/0: wncd: Authentication failed for client (04d3.b006.f734) with reason (Cred Fail) on Interface capwap_90000005 AuditSessionID B73016AC0000001D0B895467 Username: host/hostname.domain.org.local
2025/09/02 13:46:14.056610576 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authc failure from Dot1X, Auth event fail
2025/09/02 13:46:14.056616848 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Method dot1x changing state from 'Running' to 'Authc Failed'
2025/09/02 13:46:14.056638270 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event RX_METHOD_AUTHC_FAIL (6)
2025/09/02 13:46:14.056640584 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event REMOVE_USER_PROFILE (15)
2025/09/02 13:46:14.056655751 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Context changing state from 'Running' to 'Authc Failed'
2025/09/02 13:46:14.056711960 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr username(450)
2025/09/02 13:46:14.056731884 {wncd_x_R0-0}{1}: [auth-mgr-feat_acct] [15455]: (info): [04d3.b006.f734:capwap_90000005] SM Notified attribute Add/Update username host/hostname.domain.org.local
2025/09/02 13:46:14.056737493 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received User-Name host/hostname.domain.org.local for client 04d3.b006.f734
2025/09/02 13:46:14.056752019 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] AUTHC_FAIL - unauthorize by default
2025/09/02 13:46:14.056757926 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Signalling Authc fail for client 04d3.b006.f734
2025/09/02 13:46:14.056784669 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [15455]: (ERR): SANET_AUTHC_FAILURE - Cred Fail, username host/hostname.domain.org.local, audit session id B73016AC0000001D0B895467
2025/09/02 13:46:14.056804640 {wncd_x_R0-0}{1}: [errmsg] [15455]: (note): %SESSION_MGR-5-FAIL: R0/0: wncd: Authorization failed or unapplied for client (04d3.b006.f734) on Interface capwap_90000005 AuditSessionID B73016AC0000001D0B895467. Failure reason: Authc fail. Authc failure reason: Cred Fail.
2025/09/02 13:46:14.056807050 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authz failed/unapplied), method: dot1x. Signal switch PI.
2025/09/02 13:46:14.056821528 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr method(757)
2025/09/02 13:46:14.056831548 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Context changing state from 'Authc Failed' to 'Authz Failed'
2025/09/02 13:46:14.056871515 {wncd_x_R0-0}{1}: [sanet-shim-miscellaneous] [15455]: (ERR): authc policy update from SANet vlan 0
2025/09/02 13:46:14.056885749 {wncd_x_R0-0}{1}: [llbridge-main] [15455]: (debug): MAC: 04d3.b006.f734 Link-local bridging not enabled for this client, not checking VLAN validity
2025/09/02 13:46:14.056901786 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : username 0 "host/hostname.domain.org.local"
2025/09/02 13:46:14.056903893 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : service-type 0 2 [Framed]
2025/09/02 13:46:14.056905024 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : Framed-MTU 0 1485 (0x5cd)
2025/09/02 13:46:14.056905903 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : EAP-Message 0 <hidden>
2025/09/02 13:46:14.056906723 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : Message-Authenticator 0 <hidden>
2025/09/02 13:46:14.056907521 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : EAP-session-id 0 ""
2025/09/02 13:46:14.056908429 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : audit-session-id 0 "B73016AC0000001D0B895467"
2025/09/02 13:46:14.056909440 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : hwidb 0 2415919109 (0x90000005)
2025/09/02 13:46:14.056910547 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : method 0 0 [dot1x]
2025/09/02 13:46:14.056911452 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : aaa-authen-type 0 8 (0x8)
2025/09/02 13:46:14.056912534 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : aaa-authen-service 0 19 (0x13)
2025/09/02 13:46:14.056914351 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : clid-mac-addr 0 04 d3 b0 06 f7 34
2025/09/02 13:46:14.056915738 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : target-scope 0 0 [client]
2025/09/02 13:46:14.056916629 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : aaa-unique-id 0 29 (0x1d)
2025/09/02 13:46:14.056917619 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : client-iif-id 0 33556557 (0x200084d)
2025/09/02 13:46:14.056918562 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : vlan-id 0 240 (0xf0)
2025/09/02 13:46:14.056919363 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : session-linksec-secured 0 False
2025/09/02 13:46:14.056920367 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-ip-address 0 0x0
2025/09/02 13:46:14.056921199 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-ipv6-Address 0 ""
2025/09/02 13:46:14.056924155 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : interface 0 "capwap_90000005"
2025/09/02 13:46:14.056925486 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : port-type 0 19 [802.11 wireless]
2025/09/02 13:46:14.056926604 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-port 0 4813 (0x12cd)
2025/09/02 13:46:14.056927582 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : cisco-wlan-ssid 0 "t-SHINE"
2025/09/02 13:46:14.056928553 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-profile-name 0 "SHINE"
2025/09/02 13:46:14.056929560 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : dnis 0 "00-a3-8e-b5-8b-c0:t-SHINE"
2025/09/02 13:46:14.056930489 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : formatted-clid 0 "04-d3-b0-06-f7-34"
2025/09/02 13:46:14.056931414 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : bsn-wlan-id 0 1 (0x1)
2025/09/02 13:46:14.056932309 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-identifier-wireless 0 "S-vWLC1"
2025/09/02 13:46:14.056933215 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-group-cipher 0 ""
2025/09/02 13:46:14.056933924 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-pairwise-cipher 0 ""
2025/09/02 13:46:14.056934660 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-akm-suite 0 ""
2025/09/02 13:46:14.056935436 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : dnis 0 "00-A3-8E-B5-8B-C0"
2025/09/02 13:46:14.056936166 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : formatted-clid 0 "04-D3-B0-06-F7-34"
2025/09/02 13:46:14.056936919 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : audit-session-id 0 "B73016AC0000001D0B895467"
2025/09/02 13:46:14.056938458 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : clid-mac-addr 0 04 d3 b0 06 f7 34
2025/09/02 13:46:14.056939378 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : intf-id 0 2415919109 (0x90000005)
2025/09/02 13:46:14.056947659 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting_AUTHZ_FAIL on Client
2025/09/02 13:46:14.056961241 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:14.056961979 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:14.057018451 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 4, EAP-Type = 0
2025/09/02 13:46:14.057019939 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - FAILURE, ID : 0x1
2025/09/02 13:46:14.057021137 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 04 01 00 04
2025/09/02 13:46:14.057022862 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:14.057092384 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_DOT1XAUTH_PENDING -> S_WAIT_FOR_CO_DELETE
2025/09/02 13:46:14.057115445 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (info): MAC: 04d3.b006.f734 Deleting the client, reason: 93, CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE, Client state S_CO_L2_AUTH_IN_PROGRESS
2025/09/02 13:46:14.057132621 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Client delete initiated. Reason: CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE, details: , fsm-state transition 00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|01|07|15|1e|27|
2025/09/02 13:46:14.057203620 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Delete mobile payload sent for BSSID: 00a3.8eb5.8bcf WTP mac: 00a3.8eb5.8bc0 slot id: 1
2025/09/02 13:46:14.057228249 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_DELETE_IN_PROGRESS
2025/09/02 13:46:14.057330510 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (ERR): MAC: 04d3.b006.f734 CLT populate Record: failed to populate anchor ip
2025/09/02 13:46:14.057377061 {wncd_x_R0-0}{1}: [ewlc-qos-voice] [15455]: (info): MAC: 04d3.b006.f734 Successfully freed the bw for sip client
2025/09/02 13:46:14.057437164 {wncd_x_R0-0}{1}: [multicast-main] [15455]: (info): MAC: 04d3.b006.f734 No Flex/Fabric main record exists for client
2025/09/02 13:46:14.057467990 {wncd_x_R0-0}{1}: [client-iplearn] [15455]: (info): MAC: 04d3.b006.f734 IP-learn state transition: S_IPLEARN_INIT -> S_IPLEARN_DELETE_IN_PROGRESS
2025/09/02 13:46:14.057485789 {wncd_x_R0-0}{1}: [mm-transition] [15455]: (info): MAC: 04d3.b006.f734 MMIF FSM transition: S_MA_INIT -> S_MA_LOCAL_DELETE_PROCESSED_TR on E_MA_CO_DELETE_RCVD
2025/09/02 13:46:14.057515408 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event DELETE (19)
2025/09/02 13:46:14.057518344 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Disconnect request from SANET-SHIM (15) for 04d3.b006.f734 / 0xa3000013 - term: none, abort: Unknown, disc: (default)
2025/09/02 13:46:14.057518633 {wncd_x_R0-0}{1}: [sanet-shim-translate] [15455]: (note): MAC: 04d3.b006.f734 Session manager disconnect event called, session label: 0xa3000013
2025/09/02 13:46:14.057526859 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): [ Applied attribute :bsn-vlan-interface-name 0 "shine" ]
2025/09/02 13:46:14.057528085 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): [ Applied attribute : timeout 0 86400 (0x15180) ]
2025/09/02 13:46:14.057533968 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_WAIT_FOR_CO_DELETE -> S_SANET_DELETE_IN_PROGRESS
2025/09/02 13:46:14.057553545 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Total length of Deauth/Disassoc: 2
2025/09/02 13:46:14.057604898 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Sent disassoc to client, disassoc reason: 23, CLIENT_DEAUTH_REASON_8021X_AUTH_FAILED delete reason: 93, CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE.
2025/09/02 13:46:14.057606550 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Total length of Deauth/Disassoc: 2
2025/09/02 13:46:14.057640681 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Sent deauth to client, deauth reason: 23, CLIENT_DEAUTH_REASON_8021X_AUTH_FAILED delete reason: 93, CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE.
2025/09/02 13:46:14.057698876 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_DELETED
2025/09/02 13:46:14.057931037 {wncd_x_R0-0}{1}: [caaa-acct] [15455]: (info): [CAAA:ACCT] Not a webauth call
2025/09/02 13:46:14.058145418 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_SANET_DELETE_IN_PROGRESS -> S_AUTHIF_DELETED
2025/09/02 13:46:14.058184702 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_DELETE_IN_PROGRESS -> S_CO_DELETED
2025/09/02 13:46:14.058259740 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received EAPOL packet - Version : 1,EAPOL Type : EAP, Payload Length : 48, EAP-Type = Identity
2025/09/02 13:46:14.058261198 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - RESPONSE, ID : 0x1
2025/09/02 13:46:14.058267994 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 02 01 00 30 01 68 6f 73 74 2f 53 52 48 43 30 30 36 39 39 38 2e 53 6f 75 74 68 6c 61 6b 65 72 65 67 69 6f 6e 61 6c 2e 6f 72 67 2e 6c 6f 63 61 6c
2025/09/02 13:46:14.058269826 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Queuing an EAPOL pkt on Authenticator Q
2025/09/02 13:46:14.058273421 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Dequeued pkt: CODE = 2,TYPE = 1,LEN = 48
2025/09/02 13:46:14.058275942 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Received pkt saddr = 04d3.b006.f734 , daddr = 00a3.8eb5.8bc0, pae-ether-type = 0x888E
2025/09/02 13:46:14.058277567 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Couldn't find the supplicant in the list
2025/09/02 13:46:14.330409685 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Association received. BSSID 00a3.8eb5.8bcf, WLAN SHINE, Slot 1 AP 00a3.8eb5.8bc0, t-AP-3802, Site tag site-tag-main, Policy tag policy-tag-main, Policy profile policy-profile-shine, Switching Central, Socket delay 0ms
2025/09/02 13:46:14.330444095 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Received Dot11 association request. Processing started,SSID: t-SHINE, Policy profile: policy-profile-shine, AP Name: t-AP-3802, Ap Mac Address: 00a3.8eb5.8bc0BSSID MAC0000.0000.0000wlan ID: 1RSSI: -40, SNR: 56
2025/09/02 13:46:14.330526098 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_INIT -> S_CO_ASSOCIATING
2025/09/02 13:46:14.330652709 {wncd_x_R0-0}{1}: [dot11-validate] [15455]: (info): MAC: 04d3.b006.f734 Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2
2025/09/02 13:46:14.330654520 {wncd_x_R0-0}{1}: [dot11-validate] [15455]: (info): MAC: 04d3.b006.f734 WiFi direct: Dot11 validate P2P IE. P2P IE not present.
2025/09/02 13:46:14.330733993 {wncd_x_R0-0}{1}: [dot11] [15455]: (debug): MAC: 04d3.b006.f734 dot11 send association response. Framing association response with resp_status_code: 0
2025/09/02 13:46:14.330734305 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Dot11 capability privacy bit set TRUE
2025/09/02 13:46:14.330736532 {wncd_x_R0-0}{1}: [dot11] [15455]: (debug): MAC: 04d3.b006.f734 Dot11 Capability info byte1 11, byte2: 11
2025/09/02 13:46:14.330749994 {wncd_x_R0-0}{1}: [dot11-frame] [15455]: (info): MAC: 04d3.b006.f734 WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled
2025/09/02 13:46:14.330835983 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 dot11 send association response. Sending assoc response of length: 245 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS
2025/09/02 13:46:14.330839331 {wncd_x_R0-0}{1}: [dot11] [15455]: (note): MAC: 04d3.b006.f734 Association success. AID 3, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False
2025/09/02 13:46:14.330844858 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 DOT11 state transition: S_DOT11_INIT -> S_DOT11_ASSOCIATED
2025/09/02 13:46:14.330890150 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Station Dot11 association is successful.
2025/09/02 13:46:14.330913951 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Starting L2 authentication. Bssid in state machine:00a3.8eb5.8bcf Bssid in request is:00a3.8eb5.8bcf
2025/09/02 13:46:14.330921922 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_ASSOCIATING -> S_CO_L2_AUTH_IN_PROGRESS
2025/09/02 13:46:14.330961773 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 Client QoS add mobile cb
2025/09/02 13:46:14.331043050 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 Failed to install QoS client policy in process add mobile callback: AP Mac: 00:A3:8E:B5:8B:C0 slotId=1, wlan_id=1
2025/09/02 13:46:14.331061542 {wncd_x_R0-0}{1}: [client-auth] [15455]: (note): MAC: 04d3.b006.f734 ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 00a3.8eb5.8bcf capwap IFID: 0x90000005, Add mobiles sent: 1
2025/09/02 13:46:14.331071519 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_INIT -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_DOT1X
2025/09/02 13:46:14.360509238 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Session Start event called from SANET-SHIM, vlan: 0
2025/09/02 13:46:14.360519926 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Wireless session sequence, create context with method Dot1X
2025/09/02 13:46:14.360523046 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): Wireless dot1x configs:
EAPID req max retries = 2 EAP req max retries = 2 EAPID req timeout = 30 Supp Timeout = 30
2025/09/02 13:46:14.360540253 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): [04d3.b006.f734:capwap_90000005] - authc_list: AuthC-ISE
2025/09/02 13:46:14.360541277 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): [04d3.b006.f734:capwap_90000005] - authz_list: Not present under wlan configuration
2025/09/02 13:46:14.360552835 {wncd_x_R0-0}{1}: [client-auth] [15455]: (note): MAC: 04d3.b006.f734 L2 Authentication initiated. method DOT1X, Policy VLAN 0, AAA override = 1 , NAC = 0
2025/09/02 13:46:14.360556325 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_DOT1X -> S_AUTHIF_AWAIT_DOT1XAUTH_START_RESP
2025/09/02 13:46:14.360639508 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:unknown] auth mgr attr add/change notification is received for attr iif-id(952)
2025/09/02 13:46:14.360663118 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr swbidb(1263)
2025/09/02 13:46:14.360679196 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr aaa-unique-id(220)
2025/09/02 13:46:14.360693114 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr iif-id(952)
2025/09/02 13:46:14.360698569 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Retrieved Client IIF ID 0xee000864
2025/09/02 13:46:14.360715342 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr audit-session-id(819)
2025/09/02 13:46:14.360719308 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Allocated audit session id B73016AC0000001E0B8955B4
2025/09/02 13:46:14.360891833 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Device type found in cache Intel-Device
2025/09/02 13:46:14.360894786 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Device type for the session is detected as Intel-Device and old device-type not classified earlier & Device name for the session is detected as INTEL CORPORATE and old device-name not classified earlier & Old protocol map 0 and new is 1
2025/09/02 13:46:14.360951052 {wncd_x_R0-0}{1}: [mm-client] [15455]: (debug): MAC: 0000.0000.0000 Sending device_cache_update of XID (0) to (MobilityD[0])
2025/09/02 13:46:14.360999774 {wncd_x_R0-0}{1}: [svm] [15455]: (info): SVM_INFO: Applying Svc Templ wlan_svc_policy-profile-shine_local (ML:NONE)
2025/09/02 13:46:14.361057400 {mobilityd_R0-0}{1}: [mm-client] [16716]: (debug): MAC: 0000.0000.0000 Received device_cache_update, sub type: 0 of XID (0) from (WNCD[0])
2025/09/02 13:46:14.361123004 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr vlan-id(965)
2025/09/02 13:46:14.361132785 {wncd_x_R0-0}{1}: [epm] [15455]: (info): [04d3.b006.f734:capwap_90000005] Vlan tag name is shine, pref is 1048575 vlan num is 240
2025/09/02 13:46:14.361158172 {wncd_x_R0-0}{1}: [epm] [15455]: (info): [04d3.b006.f734:capwap_90000005] Feature (EPM Vlan PLUG-IN) has been started (status Success)
2025/09/02 13:46:14.361164657 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] SM Reauth Plugin: Received valid timeout = 86400, effective timeout = 86400
2025/09/02 13:46:14.361177582 {wncd_x_R0-0}{1}: [epm] [15455]: (info): [04d3.b006.f734:capwap_90000005] Feature (SM Reauth PLUG-IN) has been started (status Success)
2025/09/02 13:46:14.361205297 {wncd_x_R0-0}{1}: [svm] [15455]: (info): SVM_INFO: Response of epm is SYNC with return code Success
2025/09/02 13:46:14.361230987 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raising ext evt Template Activated (9) on this session, client (unknown) (0)
2025/09/02 13:46:14.361289667 {wncd_x_R0-0}{1}: [llbridge-main] [15455]: (debug): MAC: 04d3.b006.f734 Link-local bridging not enabled for this client, not checking VLAN validity
2025/09/02 13:46:14.361330864 {wncd_x_R0-0}{1}: [svm] [15455]: (info): SVM_INFO: SVM Apply user profile
2025/09/02 13:46:14.361383750 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Initialising auth state
2025/09/02 13:46:14.361386989 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Setting Auth state to disconnected
2025/09/02 13:46:14.361392186 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering restart state
2025/09/02 13:46:14.361394693 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - MAC 04d3.b006.f734 - profile (none)
2025/09/02 13:46:14.361396029 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - SuppTimeout 30s, ReAuthMax 2, MaxReq 2, TxPeriod 30s
2025/09/02 13:46:14.361398001 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sending create new context event to EAP for 0x02000014 (04d3.b006.f734)
2025/09/02 13:46:14.361413194 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering init state
2025/09/02 13:46:14.361416308 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:14.361419437 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Dot1x authentication started for (04d3.b006.f734)
2025/09/02 13:46:14.361423013 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Context changing state from 'Idle' to 'Running'
2025/09/02 13:46:14.361427410 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Method dot1x changing state from 'Not run' to 'Running'
2025/09/02 13:46:14.361664719 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] SM will not send event Template Activated to PRE for 0xF2000014
2025/09/02 13:46:14.361688733 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_AWAIT_DOT1XAUTH_START_RESP -> S_AUTHIF_DOT1XAUTH_PENDING
2025/09/02 13:46:14.361692991 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [15455]: (note): Authentication Success. Resolved Policy bitmap:11 for client 04d3.b006.f734
2025/09/02 13:46:14.361696439 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_DOT1XAUTH_PENDING -> S_AUTHIF_DOT1XAUTH_PENDING
2025/09/02 13:46:14.361718617 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !EAP_RESTART on Client
2025/09/02 13:46:14.361721175 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Enter connecting state
2025/09/02 13:46:14.361723092 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Restart connecting
2025/09/02 13:46:14.361729807 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Device type for the session is detected as Intel-Device and old Intel-Device & Device name for the session is detected as INTEL CORPORATE and old INTEL CORPORATE & Old protocol map 1 and new is 1
2025/09/02 13:46:14.361734633 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr dc-profile-name(1130)
2025/09/02 13:46:14.361753278 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting RX_REQ on Client
2025/09/02 13:46:14.361755741 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authenticating state entered
2025/09/02 13:46:14.361760746 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Connecting authenticating action
2025/09/02 13:46:14.361766445 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering request state
2025/09/02 13:46:14.361774819 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:14.361775953 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:14.361919389 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 5, EAP-Type = Identity
2025/09/02 13:46:14.361921073 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - REQUEST, ID : 0x1
2025/09/02 13:46:14.361922626 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 01 01 00 05 01
2025/09/02 13:46:14.361924603 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:15.912829056 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Association received. BSSID 00a3.8eb5.8bcf, WLAN SHINE, Slot 1 AP 00a3.8eb5.8bc0, t-AP-3802, Site tag site-tag-main, Policy tag policy-tag-main, Policy profile policy-profile-shine, Switching Central, old BSSID 00a3.8eb5.8bcf, Socket delay 0ms
2025/09/02 13:46:15.912921585 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Received Dot11 association request. Processing started,SSID: t-SHINE, Policy profile: policy-profile-shine, AP Name: t-AP-3802, Ap Mac Address: 00a3.8eb5.8bc0BSSID MAC00a3.8eb5.8bcfwlan ID: 1RSSI: -40, SNR: 56
2025/09/02 13:46:15.912978892 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_L2_AUTH_IN_PROGRESS
2025/09/02 13:46:15.913071231 {wncd_x_R0-0}{1}: [dot11-validate] [15455]: (info): MAC: 04d3.b006.f734 Dot11 ie validate ext/supp rates. Validation Passed for Supported rates radio_type 2
2025/09/02 13:46:15.913073654 {wncd_x_R0-0}{1}: [dot11-validate] [15455]: (info): MAC: 04d3.b006.f734 WiFi direct: Dot11 validate P2P IE. P2P IE not present.
2025/09/02 13:46:15.913119830 {wncd_x_R0-0}{1}: [dot11] [15455]: (debug): MAC: 04d3.b006.f734 dot11 send association response. Framing association response with resp_status_code: 0
2025/09/02 13:46:15.913120132 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Dot11 capability privacy bit set TRUE
2025/09/02 13:46:15.913123346 {wncd_x_R0-0}{1}: [dot11] [15455]: (debug): MAC: 04d3.b006.f734 Dot11 Capability info byte1 11, byte2: 11
2025/09/02 13:46:15.913139723 {wncd_x_R0-0}{1}: [dot11-frame] [15455]: (info): MAC: 04d3.b006.f734 WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy disabled
2025/09/02 13:46:15.913254069 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 dot11 send association response. Sending assoc response of length: 245 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS
2025/09/02 13:46:15.913257158 {wncd_x_R0-0}{1}: [dot11] [15455]: (note): MAC: 04d3.b006.f734 Association success. AID 3, Roaming = False, WGB = False, 11r = True, 11w = False Fast roam = False
2025/09/02 13:46:15.913263955 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_ASSOCIATED
2025/09/02 13:46:15.913308914 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Station Dot11 association is successful.
2025/09/02 13:46:15.913331916 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (debug): MAC: 04d3.b006.f734 Starting L2 authentication. Bssid in state machine:00a3.8eb5.8bcf Bssid in request is:00a3.8eb5.8bcf
2025/09/02 13:46:15.913339723 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_L2_AUTH_IN_PROGRESS
2025/09/02 13:46:15.913405843 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 Client QoS add mobile cb
2025/09/02 13:46:15.913436522 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 No QoS PM Name or QoS Level received from SANet for pm_dir:0. Check client is fastlane, otherwise set pm name to none
2025/09/02 13:46:15.913445825 {wncd_x_R0-0}{1}: [ewlc-qos-client] [15455]: (info): MAC: 04d3.b006.f734 No QoS PM Name or QoS Level received from SANet for pm_dir:1. Check client is fastlane, otherwise set pm name to none
2025/09/02 13:46:15.913467303 {wncd_x_R0-0}{1}: [client-auth] [15455]: (note): MAC: 04d3.b006.f734 ADD MOBILE sent. Client state flags: 0x71 BSSID: MAC: 00a3.8eb5.8bcf capwap IFID: 0x90000005, Add mobiles sent: 1
2025/09/02 13:46:15.913476795 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_DOT1XAUTH_PENDING -> S_AUTHIF_ADD_MOBILE_ACK_WAIT_DOT1X
2025/09/02 13:46:15.916685997 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Session Start event called from SANET-SHIM, vlan: 0
2025/09/02 13:46:15.916696561 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Wireless session sequence, create context with method Dot1X
2025/09/02 13:46:15.916699401 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): Wireless dot1x configs:
EAPID req max retries = 2 EAP req max retries = 2 EAPID req timeout = 30 Supp Timeout = 30
2025/09/02 13:46:15.916712739 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): [04d3.b006.f734:capwap_90000005] - authc_list: AuthC-ISE
2025/09/02 13:46:15.916713738 {wncd_x_R0-0}{1}: [auth-mgr-feat_wireless] [15455]: (info): [04d3.b006.f734:capwap_90000005] - authz_list: Not present under wlan configuration
2025/09/02 13:46:15.916726573 {wncd_x_R0-0}{1}: [client-auth] [15455]: (note): MAC: 04d3.b006.f734 L2 Authentication initiated. method DOT1X, Policy VLAN 0, AAA override = 1 , NAC = 0
2025/09/02 13:46:15.916728216 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_ADD_MOBILE_ACK_WAIT_DOT1X -> S_AUTHIF_DOT1XAUTH_PENDING
2025/09/02 13:46:15.916754098 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event RX_IDENTITY_UPDATE (18)
2025/09/02 13:46:15.916755943 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] SESSION_START from WCM (exp -301987740, got -301987740) overriding with latest
2025/09/02 13:46:15.916761818 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Retrieved Client IIF ID 0x3992979556x in clientrx event
2025/09/02 13:46:15.916768213 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] DC Profile-name has been changed to Intel-Device
2025/09/02 13:46:15.916771806 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] DC Device-name has been changed to INTEL CORPORATE
2025/09/02 13:46:15.916797112 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Session start (restart) for 04d3.b006.f734
2025/09/02 13:46:15.916843321 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting RESTART on Client
2025/09/02 13:46:15.916862348 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering init state
2025/09/02 13:46:15.916866587 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:15.916869883 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !AUTH_ABORT on Client
2025/09/02 13:46:15.916876792 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering restart state
2025/09/02 13:46:15.916878047 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Resetting the client 0x02000014
2025/09/02 13:46:15.916884467 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - MAC 04d3.b006.f734 - profile (none)
2025/09/02 13:46:15.916885987 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - SuppTimeout 30s, ReAuthMax 2, MaxReq 2, TxPeriod 30s
2025/09/02 13:46:15.916887938 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sending create new context event to EAP for 0x02000014 (04d3.b006.f734)
2025/09/02 13:46:15.916928373 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !EAP_RESTART on Client
2025/09/02 13:46:15.916930671 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Enter connecting state
2025/09/02 13:46:15.916933140 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Restart connecting
2025/09/02 13:46:15.916935694 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting RX_REQ on Client
2025/09/02 13:46:15.916939869 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authenticating state entered
2025/09/02 13:46:15.916941865 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Connecting authenticating action
2025/09/02 13:46:15.916946701 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering request state
2025/09/02 13:46:15.916955858 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:15.916956975 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:15.917027006 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 5, EAP-Type = Identity
2025/09/02 13:46:15.917029080 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - REQUEST, ID : 0x1
2025/09/02 13:46:15.917033815 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 01 01 00 05 01
2025/09/02 13:46:15.917036125 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:15.957701908 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received EAPOL packet - Version : 1,EAPOL Type : START, Payload Length : 0
2025/09/02 13:46:15.957713862 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Dequeued pkt: CODE = 0,TYPE = 0,LEN = 0
2025/09/02 13:46:15.957717526 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Received pkt saddr = 04d3.b006.f734 , daddr = 00a3.8eb5.8bc0, pae-ether-type = 0x888E
2025/09/02 13:46:15.957736471 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting EAPOL_START on Client
2025/09/02 13:46:15.957792292 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering init state
2025/09/02 13:46:15.957795774 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:15.957798722 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !AUTH_ABORT on Client
2025/09/02 13:46:15.957802367 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering restart state
2025/09/02 13:46:15.957803533 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Resetting the client 0x02000014
2025/09/02 13:46:15.957812286 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - MAC 04d3.b006.f734 - profile (none)
2025/09/02 13:46:15.957813548 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Override cfg - SuppTimeout 30s, ReAuthMax 2, MaxReq 2, TxPeriod 30s
2025/09/02 13:46:15.957815645 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sending create new context event to EAP for 0x02000014 (04d3.b006.f734)
2025/09/02 13:46:15.957855360 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting !EAP_RESTART on Client
2025/09/02 13:46:15.957857644 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Enter connecting state
2025/09/02 13:46:15.957861015 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Restart connecting
2025/09/02 13:46:15.957863515 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting RX_REQ on Client
2025/09/02 13:46:15.957865854 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authenticating state entered
2025/09/02 13:46:15.957869952 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Connecting authenticating action
2025/09/02 13:46:15.957874949 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering request state
2025/09/02 13:46:15.957880961 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:15.957881648 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:15.957940709 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 5, EAP-Type = Identity
2025/09/02 13:46:15.957942334 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - REQUEST, ID : 0x1
2025/09/02 13:46:15.957943809 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 01 01 00 05 01
2025/09/02 13:46:15.957945456 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:15.961602227 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received EAPOL packet - Version : 1,EAPOL Type : EAP, Payload Length : 48, EAP-Type = Identity
2025/09/02 13:46:15.961603977 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - RESPONSE, ID : 0x1
2025/09/02 13:46:15.961613263 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 02 01 00 30 01 68 6f 73 74 2f 53 52 48 43 30 30 36 39 39 38 2e 53 6f 75 74 68 6c 61 6b 65 72 65 67 69 6f 6e 61 6c 2e 6f 72 67 2e 6c 6f 63 61 6c
2025/09/02 13:46:15.961616294 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Queuing an EAPOL pkt on Authenticator Q
2025/09/02 13:46:15.961621870 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Dequeued pkt: CODE = 2,TYPE = 1,LEN = 48
2025/09/02 13:46:15.961625452 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Received pkt saddr = 04d3.b006.f734 , daddr = 00a3.8eb5.8bc0, pae-ether-type = 0x888E
2025/09/02 13:46:15.961788742 {wncd_x_R0-0}{1}: [caaa-authen] [15455]: (info): [CAAA:AUTHEN:f2000014] NULL ATTR LIST
2025/09/02 13:46:15.961868299 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised identity update event for eap method Identity
2025/09/02 13:46:15.961883310 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Entering idle state
2025/09/02 13:46:15.961886204 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting AUTH_FAIL on Client
2025/09/02 13:46:15.961916738 {wncd_x_R0-0}{1}: [errmsg] [15455]: (note): %DOT1X-5-FAIL: R0/0: wncd: Authentication failed for client (04d3.b006.f734) with reason (Cred Fail) on Interface capwap_90000005 AuditSessionID B73016AC0000001E0B8955B4 Username: host/hostname.domain.org.local
2025/09/02 13:46:15.961921948 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authc failure from Dot1X, Auth event fail
2025/09/02 13:46:15.961926112 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Method dot1x changing state from 'Running' to 'Authc Failed'
2025/09/02 13:46:15.961934707 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event RX_METHOD_AUTHC_FAIL (6)
2025/09/02 13:46:15.961936862 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event REMOVE_USER_PROFILE (15)
2025/09/02 13:46:15.961945841 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Context changing state from 'Running' to 'Authc Failed'
2025/09/02 13:46:15.961990224 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr username(450)
2025/09/02 13:46:15.962008577 {wncd_x_R0-0}{1}: [auth-mgr-feat_acct] [15455]: (info): [04d3.b006.f734:capwap_90000005] SM Notified attribute Add/Update username host/hostname.domain.org.local
2025/09/02 13:46:15.962012875 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received User-Name host/hostname.domain.org.local for client 04d3.b006.f734
2025/09/02 13:46:15.962025253 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] AUTHC_FAIL - unauthorize by default
2025/09/02 13:46:15.962028049 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Signalling Authc fail for client 04d3.b006.f734
2025/09/02 13:46:15.962048709 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [15455]: (ERR): SANET_AUTHC_FAILURE - Cred Fail, username host/hostname.domain.org.local, audit session id B73016AC0000001E0B8955B4
2025/09/02 13:46:15.962055712 {wncd_x_R0-0}{1}: [errmsg] [15455]: (note): %SESSION_MGR-5-FAIL: R0/0: wncd: Authorization failed or unapplied for client (04d3.b006.f734) on Interface capwap_90000005 AuditSessionID B73016AC0000001E0B8955B4. Failure reason: Authc fail. Authc failure reason: Cred Fail.
2025/09/02 13:46:15.962057424 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Authz failed/unapplied), method: dot1x. Signal switch PI.
2025/09/02 13:46:15.962069638 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] auth mgr attr add/change notification is received for attr method(757)
2025/09/02 13:46:15.962078639 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Context changing state from 'Authc Failed' to 'Authz Failed'
2025/09/02 13:46:15.962116658 {wncd_x_R0-0}{1}: [sanet-shim-miscellaneous] [15455]: (ERR): authc policy update from SANet vlan 0
2025/09/02 13:46:15.962130275 {wncd_x_R0-0}{1}: [llbridge-main] [15455]: (debug): MAC: 04d3.b006.f734 Link-local bridging not enabled for this client, not checking VLAN validity
2025/09/02 13:46:15.962147837 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : username 0 "host/hostname.domain.org.local"
2025/09/02 13:46:15.962149508 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : service-type 0 2 [Framed]
2025/09/02 13:46:15.962150629 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : Framed-MTU 0 1485 (0x5cd)
2025/09/02 13:46:15.962151396 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : EAP-Message 0 <hidden>
2025/09/02 13:46:15.962152099 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : Message-Authenticator 0 <hidden>
2025/09/02 13:46:15.962152900 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : EAP-session-id 0 ""
2025/09/02 13:46:15.962153833 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : audit-session-id 0 "B73016AC0000001E0B8955B4"
2025/09/02 13:46:15.962154952 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : hwidb 0 2415919109 (0x90000005)
2025/09/02 13:46:15.962156041 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : method 0 0 [dot1x]
2025/09/02 13:46:15.962156951 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : aaa-authen-type 0 8 (0x8)
2025/09/02 13:46:15.962157914 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : aaa-authen-service 0 19 (0x13)
2025/09/02 13:46:15.962159825 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : clid-mac-addr 0 04 d3 b0 06 f7 34
2025/09/02 13:46:15.962161232 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : target-scope 0 0 [client]
2025/09/02 13:46:15.962162188 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : aaa-unique-id 0 30 (0x1e)
2025/09/02 13:46:15.962163109 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : client-iif-id 0 3992979556 (0xee000864)
2025/09/02 13:46:15.962164077 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : vlan-id 0 240 (0xf0)
2025/09/02 13:46:15.962164853 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : session-linksec-secured 0 False
2025/09/02 13:46:15.962165942 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-ip-address 0 0x0
2025/09/02 13:46:15.962166796 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-ipv6-Address 0 ""
2025/09/02 13:46:15.962167615 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : interface 0 "capwap_90000005"
2025/09/02 13:46:15.962170985 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : port-type 0 19 [802.11 wireless]
2025/09/02 13:46:15.962172145 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-port 0 4813 (0x12cd)
2025/09/02 13:46:15.962173026 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : cisco-wlan-ssid 0 "t-SHINE"
2025/09/02 13:46:15.962173911 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-profile-name 0 "SHINE"
2025/09/02 13:46:15.962174929 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : dnis 0 "00-a3-8e-b5-8b-c0:t-SHINE"
2025/09/02 13:46:15.962175872 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : formatted-clid 0 "04-d3-b0-06-f7-34"
2025/09/02 13:46:15.962176840 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : bsn-wlan-id 0 1 (0x1)
2025/09/02 13:46:15.962177651 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : nas-identifier-wireless 0 "S-vWLC1"
2025/09/02 13:46:15.962178376 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-group-cipher 0 ""
2025/09/02 13:46:15.962179115 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-pairwise-cipher 0 ""
2025/09/02 13:46:15.962179858 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : wlan-akm-suite 0 ""
2025/09/02 13:46:15.962180623 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : dnis 0 "00-A3-8E-B5-8B-C0"
2025/09/02 13:46:15.962181346 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : formatted-clid 0 "04-D3-B0-06-F7-34"
2025/09/02 13:46:15.962182074 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : audit-session-id 0 "B73016AC0000001E0B8955B4"
2025/09/02 13:46:15.962183610 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : clid-mac-addr 0 04 d3 b0 06 f7 34
2025/09/02 13:46:15.962184469 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): Applying Attribute : intf-id 0 2415919109 (0x90000005)
2025/09/02 13:46:15.962191807 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Posting_AUTHZ_FAIL on Client
2025/09/02 13:46:15.962203673 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Setting EAPOL eth-type to 0x888e, destination mac to 04d3.b006.f734
2025/09/02 13:46:15.962204395 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Sending out EAPOL packet
2025/09/02 13:46:15.962256136 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Sent EAPOL packet - Version : 2,EAPOL Type : EAP, Payload Length : 4, EAP-Type = 0
2025/09/02 13:46:15.962257460 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - FAILURE, ID : 0x1
2025/09/02 13:46:15.962258517 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 04 01 00 04
2025/09/02 13:46:15.962260170 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAPOL packet sent to client
2025/09/02 13:46:15.962328790 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_AUTHIF_DOT1XAUTH_PENDING -> S_WAIT_FOR_CO_DELETE
2025/09/02 13:46:15.962353969 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (info): MAC: 04d3.b006.f734 Deleting the client, reason: 93, CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE, Client state S_CO_L2_AUTH_IN_PROGRESS
2025/09/02 13:46:15.962367523 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Client delete initiated. Reason: CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE, details: , fsm-state transition 00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|00|01|07|15|16|17|15|1e|27|
2025/09/02 13:46:15.962439672 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (note): MAC: 04d3.b006.f734 Delete mobile payload sent for BSSID: 00a3.8eb5.8bcf WTP mac: 00a3.8eb5.8bc0 slot id: 1
2025/09/02 13:46:15.962449057 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_L2_AUTH_IN_PROGRESS -> S_CO_DELETE_IN_PROGRESS
2025/09/02 13:46:15.962506950 {wncd_x_R0-0}{1}: [client-orch-sm] [15455]: (ERR): MAC: 04d3.b006.f734 CLT populate Record: failed to populate anchor ip
2025/09/02 13:46:15.962553141 {wncd_x_R0-0}{1}: [ewlc-qos-voice] [15455]: (info): MAC: 04d3.b006.f734 Successfully freed the bw for sip client
2025/09/02 13:46:15.962591556 {wncd_x_R0-0}{1}: [multicast-main] [15455]: (info): MAC: 04d3.b006.f734 No Flex/Fabric main record exists for client
2025/09/02 13:46:15.962614791 {wncd_x_R0-0}{1}: [client-iplearn] [15455]: (info): MAC: 04d3.b006.f734 IP-learn state transition: S_IPLEARN_INIT -> S_IPLEARN_DELETE_IN_PROGRESS
2025/09/02 13:46:15.962635433 {wncd_x_R0-0}{1}: [mm-transition] [15455]: (info): MAC: 04d3.b006.f734 MMIF FSM transition: S_MA_INIT -> S_MA_LOCAL_DELETE_PROCESSED_TR on E_MA_CO_DELETE_RCVD
2025/09/02 13:46:15.962665068 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Raised event DELETE (19)
2025/09/02 13:46:15.962668296 {wncd_x_R0-0}{1}: [auth-mgr] [15455]: (info): [04d3.b006.f734:capwap_90000005] Disconnect request from SANET-SHIM (15) for 04d3.b006.f734 / 0xf2000014 - term: none, abort: Unknown, disc: (default)
2025/09/02 13:46:15.962668805 {wncd_x_R0-0}{1}: [sanet-shim-translate] [15455]: (note): MAC: 04d3.b006.f734 Session manager disconnect event called, session label: 0xf2000014
2025/09/02 13:46:15.962679404 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): [ Applied attribute :bsn-vlan-interface-name 0 "shine" ]
2025/09/02 13:46:15.962680831 {wncd_x_R0-0}{1}: [aaa-attr-inf] [15455]: (info): [ Applied attribute : timeout 0 86400 (0x15180) ]
2025/09/02 13:46:15.962683757 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_WAIT_FOR_CO_DELETE -> S_SANET_DELETE_IN_PROGRESS
2025/09/02 13:46:15.962698083 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Total length of Deauth/Disassoc: 2
2025/09/02 13:46:15.962737891 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Sent disassoc to client, disassoc reason: 23, CLIENT_DEAUTH_REASON_8021X_AUTH_FAILED delete reason: 93, CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE.
2025/09/02 13:46:15.962739560 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Total length of Deauth/Disassoc: 2
2025/09/02 13:46:15.962767677 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 Sent deauth to client, deauth reason: 23, CLIENT_DEAUTH_REASON_8021X_AUTH_FAILED delete reason: 93, CO_CLIENT_DELETE_REASON_CLIENT_CREDENTIAL_FAILURE.
2025/09/02 13:46:15.962830547 {wncd_x_R0-0}{1}: [dot11] [15455]: (info): MAC: 04d3.b006.f734 DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_DELETED
2025/09/02 13:46:15.963043836 {wncd_x_R0-0}{1}: [caaa-acct] [15455]: (info): [CAAA:ACCT] Not a webauth call
2025/09/02 13:46:15.963257195 {wncd_x_R0-0}{1}: [client-auth] [15455]: (info): MAC: 04d3.b006.f734 Client auth-interface state transition: S_SANET_DELETE_IN_PROGRESS -> S_AUTHIF_DELETED
2025/09/02 13:46:15.963310621 {wncd_x_R0-0}{1}: [client-orch-state] [15455]: (note): MAC: 04d3.b006.f734 Client state transition: S_CO_DELETE_IN_PROGRESS -> S_CO_DELETED
2025/09/02 13:46:15.963387372 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] Received EAPOL packet - Version : 1,EAPOL Type : EAP, Payload Length : 48, EAP-Type = Identity
2025/09/02 13:46:15.963388710 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [04d3.b006.f734:capwap_90000005] EAP Packet - RESPONSE, ID : 0x1
2025/09/02 13:46:15.963395881 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:unknown] Pkt body: 02 01 00 30 01 68 6f 73 74 2f 53 52 48 43 30 30 36 39 39 38 2e 53 6f 75 74 68 6c 61 6b 65 72 65 67 69 6f 6e 61 6c 2e 6f 72 67 2e 6c 6f 63 61 6c
2025/09/02 13:46:15.963397805 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Queuing an EAPOL pkt on Authenticator Q
2025/09/02 13:46:15.963401717 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Dequeued pkt: CODE = 2,TYPE = 1,LEN = 48
2025/09/02 13:46:15.963404388 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Received pkt saddr = 04d3.b006.f734 , daddr = 00a3.8eb5.8bc0, pae-ether-type = 0x888E
2025/09/02 13:46:15.963406117 {wncd_x_R0-0}{1}: [dot1x] [15455]: (info): [0000.0000.0000:capwap_90000005] Couldn't find the supplicant in the list

Rich R
VIP
VIP

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwo58100 affects 17.12.5 and is fixed in APSP6 so if you haven't already then please install APSP6 to see whether that makes any difference.

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq83098 also affects 17.12.5 and is quite new so no fix for that but might be worth asking TAC about it.

Summary 

-Client from RT is authc failed after identity response

- wlc failed authc not ISE 

""have an 802.1X SSID allowing both EAP-TLS and PEAP+MSCHAPv2."'

How yoh config this SSID support these two different authc method?

Follow this guide config ssid using only eap-tls and check bad laptop 

https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/222721-configure-eap-tls-on-9800-wlc-with-ise-i.html

MHM

 

On the WLC, you only configure the SSID to use 802.1X. What exactly EAP type or method to use is configured on ISE. On my ISE both EAP-TLS and PEAP + MSCHAPv2 are allowed (also tried PEAP + EAP-TLS). I've configured the bad laptop to use both methods and both failed. The C9800 simply doesn't forward the requests to ISE.

 

 @Simon Z   You just said it : the bad laptop. 

 The 9800 based wireless infrasructure works perfectly.

 M.



-- Let everything happen to you  
       Beauty and terror
      Just keep going    
       No feeling is final
Reiner Maria Rilke (1899)

Well, that's the only logical explanation so far. However, the "bad" laptop joins the 802.1X SSID on 5520 without any issues. As I said, I tested 5 laptops so far and found one "bad". I am about to migrate from 5520 to C9800-CL shortly and we have about 1000 laptops. How many "bad" ones are there?

Review Cisco Networking for a $25 gift card