01-25-2017 08:36 AM - edited 07-05-2021 06:26 AM
Hello,
We have a client that keeps getting dropped right after association is completed. I have run a debug on the client but I am not 100% sure of the issue and wanted to see if anyone has run into this before:
(Cisco Controller) >debug client 00:10:40:a1:65:12
(Cisco Controller) >*spamApTask6: Jan 24 12:33:59.246: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0 cur: 3
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] RSNIE in Assoc. Req.: (22)
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] [0016] ac 01 28 00 00 00
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 RSN Capabilities: 40
*apfMsConnTask_0: Jan 24 12:34:32.289: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:34:32.290: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated
*spamApTask6: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.291: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.306: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879e38/00:10:40:a1:65:12/105795) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=196) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 196 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 196)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.307: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 196, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.311: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=197) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 197)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.313: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 197, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.322: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=198) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 198)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.325: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 198, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.335: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=199) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 199)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.336: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 199, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.346: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=200) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 200)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.347: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 200, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.359: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=201) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 201)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.372: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 201, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.377: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
MAC: 00:10:40:a1:65:12, source 4
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] New PMKID: (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] [0000] f0 51 60 9d 2b 2b cb 50 28 e9 5d 9a 2e 1e 99 a7
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 201)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] [0000] f0 51 60 9d 2b 2b cb 50 28 e9 5d 9a 2e 1e 99 a7
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=201) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.379: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.388: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.388: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000000: 30 16 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000010: 00 0f ac 01 28 00 00 00 ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00000010: ac 01 28 00 00 00 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.389: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Building Mobile Announce :
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Building Client Payload:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Client Ip: 0.0.0.0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Client Vap Security: 16448
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Virtual Ip: 1.1.1.1
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 ssid: usftwctrHH
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Building VlanIpPayload.
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:34:32.395: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:34:35.284: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*Apf Guest: Jan 24 12:34:39.888: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0
*DHCP Socket Task: Jan 24 12:34:41.006: [PA] 00:10:40:a1:65:12 DHCP received op BOOTREPLY (2) (len 343,vlan 401, port 4, encap 0xec03)
*DHCP Socket Task: Jan 24 12:34:41.006: [PA] 00:10:40:a1:65:12 DHCP setting server from OFFER (server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:34:41.033: [PA] 00:10:40:a1:65:12 DHCP received op BOOTREPLY (2) (len 343,vlan 401, port 4, encap 0xec03)
*DHCP Socket Task: Jan 24 12:34:41.033: [PA] 00:10:40:a1:65:12 DHCP setting server from ACK (mscb=0x2eca9a20 ip=0xa004bdb)(server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 apfMsRunStateInc
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 10.0.75.219 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*pemReceiveTask: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 10.0.75.219 Removed NPU entry.
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 Assigning Address 10.0.75.219 to mobile
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*DHCP Socket Task: Jan 24 12:34:41.034: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*spamApTask6: Jan 24 12:34:56.949: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:34:56.949: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
*spamApTask6: Jan 24 12:34:56.949: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:34:56.950: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:34:56.950: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1
*spamApTask6: Jan 24 12:34:56.950: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:34:57.889: [PA] 00:10:40:a1:65:12 10.0.75.219 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:34:57.891: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
(Cisco Controller) >*spamApTask6: Jan 24 12:35:17.255: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0 cur: 3
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:35:34.208: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] RSNIE in Assoc. Req.: (22)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] [0016] ac 01 28 00 00 00
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 RSN Capabilities: 40
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:35:34.209: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated
*spamApTask6: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.210: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.243: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879e76/00:10:40:a1:65:12/105796) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=146) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 146 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 146)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.244: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 146, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.251: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=147) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 147)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.252: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 147, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.264: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=148) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 148)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.265: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 148, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.279: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=149) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 149)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.280: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 149, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.292: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=150) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 150)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.293: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 150, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.303: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=151) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 151)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.316: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 151, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.334: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
MAC: 00:10:40:a1:65:12, source 4
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] New PMKID: (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] [0000] 08 85 cf 67 f4 21 19 35 00 b8 1f 05 89 aa ba 62
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 151)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] [0000] 08 85 cf 67 f4 21 19 35 00 b8 1f 05 89 aa ba 62
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=151) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.336: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000000: 30 16 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000010: 00 0f ac 01 28 00 00 00 ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00000010: ac 01 28 00 00 00 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.359: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Building Mobile Announce :
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Building Client Payload:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Client Ip: 0.0.0.0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Client Vap Security: 16448
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Virtual Ip: 1.1.1.1
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 ssid: usftwctrHH
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Building VlanIpPayload.
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:35:34.375: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:35:37.279: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 DHCP received op BOOTREPLY (2) (len 343,vlan 401, port 4, encap 0xec03)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 DHCP setting server from ACK (mscb=0x2eca6160 ip=0xa004bdb)(server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 DHCP setting server from ACK (server 10.6.14.13, yiaddr 10.0.75.219)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 apfMsRunStateInc
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 10.0.75.219 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*pemReceiveTask: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 10.0.75.219 Removed NPU entry.
*DHCP Socket Task: Jan 24 12:35:41.110: [PA] 00:10:40:a1:65:12 Assigning Address 10.0.75.219 to mobile
*DHCP Socket Task: Jan 24 12:35:41.111: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*DHCP Socket Task: Jan 24 12:35:41.111: [PA] 00:10:40:a1:65:12 DHCP success event for client. Clearing dhcp failure count for interface management.
*Apf Guest: Jan 24 12:36:10.948: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 4, reasonCode 4
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*spamApTask6: Jan 24 12:36:25.273: [PA] 00:10:40:a1:65:12 0 PMK-remove groupcast messages sent
*osapiBsnTimer: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Global PMK Cache deletion failed.
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 Accounting NAI-Realm: us0v1290, from Mscb username : us0v1290
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:36:26.248: [PA] 00:10:40:a1:65:12 10.0.75.219 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:36:26.249: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0 cur: 3
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] RSNIE in Assoc. Req.: (22)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] [0016] ac 01 28 00 00 00
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 RSN Capabilities: 40
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:36:46.323: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated
*spamApTask6: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.325: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.338: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879ebe/00:10:40:a1:65:12/105798) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=27) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 27 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 27)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.339: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 27, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.344: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=28) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 28)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.345: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 28, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.351: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=29) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 29)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.352: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 29, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.360: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=30) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 30)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.361: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 30, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.368: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=31) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 31)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.369: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 31, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.375: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=32) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 32)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.388: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 32, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.394: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
MAC: 00:10:40:a1:65:12, source 4
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] New PMKID: (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] [0000] 71 60 be c6 79 58 04 1a d0 47 3b 98 34 24 3a 85
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 32)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] [0000] 71 60 be c6 79 58 04 1a d0 47 3b 98 34 24 3a 85
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=32) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.395: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000000: 30 16 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000010: 00 0f ac 01 28 00 00 00 ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00000010: ac 01 28 00 00 00 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.404: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Building Mobile Announce :
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Building Client Payload:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Client Ip: 0.0.0.0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Client Vap Security: 16448
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Virtual Ip: 1.1.1.1
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 ssid: usftwctrHH
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Building VlanIpPayload.
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:36:46.410: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:36:49.301: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:36:49.302: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1
*spamApTask6: Jan 24 12:36:56.317: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:36:57.257: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:36:57.257: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*pemReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 0.0.0.0 Removed NPU entry.
*apfReceiveTask: Jan 24 12:36:57.258: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*spamApTask6: Jan 24 12:37:16.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0 cur: 3
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] RSNIE in Assoc. Req.: (22)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] [0016] ac 01 28 00 00 00
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 RSN Capabilities: 40
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 4
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:37:32.229: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated
*spamApTask6: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.231: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.260: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879eec/00:10:40:a1:65:12/105800) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=227) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 227 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 227)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.261: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 227, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.269: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=228) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 228)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.270: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 228, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.282: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=229) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 229)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.283: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 229, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.298: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.299: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.299: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=230) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.299: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 230)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.300: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 230, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.311: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=231) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 231)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.312: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 231, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.322: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=232) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 232)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.338: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 232, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.348: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
MAC: 00:10:40:a1:65:12, source 4
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] New PMKID: (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] [0000] 27 de bd 94 b4 d9 f9 ea f4 7c 2b b4 ad f3 c4 23
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 232)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] [0000] 27 de bd 94 b4 d9 f9 ea f4 7c 2b b4 ad f3 c4 23
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=232) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.350: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000000: 30 16 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000010: 00 0f ac 01 28 00 00 00 ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00000010: ac 01 28 00 00 00 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.365: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Building Mobile Announce :
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Building Client Payload:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Client Ip: 0.0.0.0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Client Vap Security: 16448
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Virtual Ip: 1.1.1.1
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 ssid: usftwctrHH
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Building VlanIpPayload.
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:37:32.384: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:37:35.411: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:37:42.380: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:37:42.380: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
*spamApTask6: Jan 24 12:37:42.380: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:37:42.381: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:37:42.381: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1
*spamApTask6: Jan 24 12:37:42.381: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*Apf Guest: Jan 24 12:37:42.715: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0
*osapiBsnTimer: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*pemReceiveTask: Jan 24 12:37:43.315: [PA] 00:10:40:a1:65:12 0.0.0.0 Removed NPU entry.
(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >*spamApTask6: Jan 24 12:38:03.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0 cur: 2
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] RSNIE in Assoc. Req.: (22)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] [0016] ac 01 28 00 00 00
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 RSN Capabilities: 40
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 2
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:38:37.040: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated
*spamApTask6: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.042: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.071: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879f2d/00:10:40:a1:65:12/105802) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=55) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 55 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 55)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.072: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 55, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.079: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=56) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 56)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.080: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 56, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.094: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=57) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 57)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.095: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 57, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.110: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=58) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 58)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.111: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 58, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.125: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=59) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 59)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.134: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 59, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.143: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=60) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 60)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.144: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 60, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.162: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
MAC: 00:10:40:a1:65:12, source 4
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] New PMKID: (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] [0000] b2 50 8c a3 de ae 83 b1 02 b6 69 69 a2 c8 21 e7
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 60)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] [0000] b2 50 8c a3 de ae 83 b1 02 b6 69 69 a2 c8 21 e7
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=60) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.164: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000000: 30 16 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000010: 00 0f ac 01 28 00 00 00 ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00000010: ac 01 28 00 00 00 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.178: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Building Mobile Announce :
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Building Client Payload:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Client Ip: 0.0.0.0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Client Vap Security: 16448
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Virtual Ip: 1.1.1.1
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 ssid: usftwctrHH
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Building VlanIpPayload.
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:38:37.189: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:38:40.221: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:38:48.728: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:38:48.728: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
*spamApTask6: Jan 24 12:38:48.728: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:38:48.730: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:38:48.730: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1
*spamApTask6: Jan 24 12:38:48.730: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:38:49.606: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:38:49.609: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated
*apfReceiveTask: Jan 24 12:38:49.609: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*apfReceiveTask: Jan 24 12:38:49.610: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*spamApTask6: Jan 24 12:39:09.273: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*Apf Guest: Jan 24 12:39:13.474: [PA] Wired client head is NULL, no clients in the list. Number of clients = 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Processing assoc-req station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 thread:9f1c560
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Adding mobile on LWAPP AP 00:3a:7d:3e:01:b0(1)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Association received from mobile on BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Global 200 Clients are allowed to AP radio
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Max Client Trap Threshold: 0 cur: 2
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Rf profile 600 Clients are allowed to AP wlan
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 In processSsidIE:5788 setting Central switched to FALSE
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Set Clinet MSCB as Central Association Disabled
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying site-specific Local Bridging override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying Local Bridging Interface Policy for station 00:10:40:a1:65:12 - vlan 401, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:, interface nasid:
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Setting the NAS Id to AP group specific Id 'NVS-USFW-N1-00-PWLC02'
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Set Clinet AP specific apfMsAccessVlan = 415
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 STA - rates (8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] RSNIE in Assoc. Req.: (22)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] [0000] 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] [0016] ac 01 28 00 00 00
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Processing RSN IE type 48, length 22 for mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Received 802.11i 802.1X key management suite, enabling dot1x Authentication
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 RSN Capabilities: 40
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Marking Mobile as non-11w Capable
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Received RSN IE with 0 PMKIDs from mobile 00:10:40:a1:65:12
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Updating AID for REAP AP Client 00:3a:7d:3e:01:b0 - AID ===> 2
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Initializing policy
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfMsAssoStateInc
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Idle to Associated
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfPemAddUser2:session timeout forstation 00:10:40:a1:65:12 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Sending assoc-resp with status 0 station:00:10:40:a1:65:12 AP:00:3a:7d:3e:01:b0-01 on apVapId 1
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 Sending Assoc Response to station on BSSID 00:3a:7d:3e:01:bf (status 0) ApVapId 1 Slot 1
*apfMsConnTask_0: Jan 24 12:39:42.416: [PA] 00:10:40:a1:65:12 apfProcessAssocReq (apf_80211.c:9582) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Associated
*spamApTask6: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Sent 1x initiate message to multi thread task for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 reauth_sm state transition 0 ---> 1 for mobile 00:10:40:a1:65:12 at 1x_reauth_sm.c:47
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 EAP-PARAM Debug - eap-params for Wlan-Id :33 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Connecting state
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.418: [PA] 00:10:40:a1:65:12 Sending EAP-Request/Identity to mobile 00:10:40:a1:65:12 (EAP Id 1)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Received Identity Response (count=1) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Resetting reauth count 1 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 EAP State update from Connecting to Authenticating for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticating state
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.447: [PA] 00:10:40:a1:65:12 Created Acct-Session-ID (58879f6e/00:10:40:a1:65:12/105803) for the mobile
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=214) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 WARNING: updated EAP-Identifier 1 ===> 214 for STA 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 214)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.450: [PA] 00:10:40:a1:65:12 Allocating EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 214, EAP Type 3)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.456: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=215) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 215)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.457: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 215, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.471: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=216) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 216)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.472: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 216, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.488: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=217) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 217)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.489: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 217, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.501: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=218) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 218)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.511: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 218, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.521: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Processing Access-Challenge for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Entering Backend Auth Req state (id=219) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Sending EAP Request from AAA to mobile 00:10:40:a1:65:12 (EAP Id 219)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.522: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Received EAPOL EAPPKT from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Received EAP Response from mobile 00:10:40:a1:65:12 (EAP Id 219, EAP Type 43)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Resetting reauth count 0 to 0 for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.585: [PA] 00:10:40:a1:65:12 Entering Backend Auth Response state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Processing Access-Accept for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Resetting web IPv4 acl from 255 to 255
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Resetting web IPv4 Flex acl from 65535 to 65535
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) already exists in name table, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Username entry (us0v1290) created in mscb for mobile, length = 253
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 override for default ap group, marking intgrp NULL
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 415
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Check before Setting the NAS Id to WLAN specific Id ''
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 override from ap group, removing intf group from mscb
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying site-specific override for station 00:10:40:a1:65:12 - vapId 33, site 'USFW-Centre-MFG', interface 'management'
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying Interface policy on Mobile, role Unassociated. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 401
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Re-applying interface policy for client
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2435)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2456)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Values before applying NASID - interfacetype:0, ovrd:0, mscb nasid:NVS-USFW-N1-00-PWLC02, interface nasid:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Applying AP group specific NAS Id 'NVS-USFW-N1-00-PWLC02'
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Inserting AAA Override struct for mobile
MAC: 00:10:40:a1:65:12, source 4
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Station 00:10:40:a1:65:12 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Stopping reauth timeout for 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Creating a PKC PMKID Cache entry for station 00:10:40:a1:65:12 (RSN 2)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Adding BSSID 00:3a:7d:3e:01:bf to PMKID cache at index 0 for station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] New PMKID: (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] [0000] 30 5d 56 3a 7f 9c a3 5f 3d 11 7d 1c 50 f4 23 bd
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Zeroize AAA Overrides from local for station
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 0 PMK-update groupcast messages sent
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 PMK sent to mobility group
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Sending EAP-Success to mobile 00:10:40:a1:65:12 (EAP Id 219)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Freeing AAACB from Dot1xCB as AAA auth is done for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Found an cache entry for BSSID 00:3a:7d:3e:01:bf in PMKID cache at index 0 of station 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] Including PMKID in M1 (16)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] [0000] 30 5d 56 3a 7f 9c a3 5f 3d 11 7d 1c 50 f4 23 bd
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Starting key exchange to mobile 00:10:40:a1:65:12, data packets will be dropped
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Entering Backend Auth Success state (id=219) for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 Received Auth Success while in Authenticating state for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.587: [PA] 00:10:40:a1:65:12 dot1x - moving mobile 00:10:40:a1:65:12 into Authenticated state
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTK_START state (message 2) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in Association request:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000000: 30 16 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000010: 00 0f ac 01 28 00 00 00 ....(...
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Dumping RSNIE received in EAPOL M2 :
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000000: 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00000010: ac 01 28 00 00 00 ..(...
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 PMK: Sending cache add
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Sending EAPOL-Key Message to mobile 00:10:40:a1:65:12
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.607: [PA] 00:10:40:a1:65:12 Reusing allocated memory for EAP Pkt for retransmission to mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Received EAPOL-Key from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Stopping retransmission timer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.623: [PA] 00:10:40:a1:65:12 Freeing EAP Retransmit Bufer for mobile 00:10:40:a1:65:12
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 apfMs1xStateInc
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Mobility query, PEM State: L2AUTHCOMPLETE
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Building Mobile Announce :
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Building Client Payload:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Client Ip: 0.0.0.0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Client Vlan Ip: 10.0.54.84, Vlan mask : 255.255.255.248
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Client Vap Security: 16448
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Virtual Ip: 1.1.1.1
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 ssid: usftwctrHH
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Building VlanIpPayload.
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1for this client
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 Not Using WMM Compliance code qosCap 20
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:7d:3e:01:b0 vapId 33 apVapId 1 flex-acl-name:
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6575, Adding TMP rule
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255, IPv
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*Dot1x_NW_MsgTask_2: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:39:42.624: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 10.0.54.84
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6191, Adding TMP rule
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
type = Airespace AP - Learn IP address
on AP 00:3a:7d:3e:01:b0, slot 1, interface = 4, QOS = 2
IPv4 ACL ID = 255,
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 64206, IntfId = 0 Local Bridging Vlan = 401, Local Bridging intf id = 0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 64206 AverageRate = 0, BurstRate = 0
*apfReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
*pemReceiveTask: Jan 24 12:39:45.505: [PA] 00:10:40:a1:65:12 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
*spamApTask6: Jan 24 12:39:51.592: [PA] 00:10:40:a1:65:12 Association Failed on REAP AP BSSID 00:3a:7d:3e:01:bf (slot 1), status 1 0 Capabilities changed
*spamApTask6: Jan 24 12:39:51.592: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
*spamApTask6: Jan 24 12:39:51.592: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*spamApTask6: Jan 24 12:39:51.593: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_AP_AUTH_STOP, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
*spamApTask6: Jan 24 12:39:51.593: [PA] 00:10:40:a1:65:12 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 15, reasonCode 1
*spamApTask6: Jan 24 12:39:51.593: [PA] 00:10:40:a1:65:12 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
*osapiBsnTimer: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7069) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Associated to Disassociated
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Sent Deauthenticate to mobile on BSSID 00:3a:7d:3e:01:b0 slot 1(caller apf_ms.c:7163)
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Resetting MSCB PMK Cache Entry 0 for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Removing BSSID 00:3a:7d:3e:01:bf from PMKID cache of station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Setting active key cache index 0 ---> 8
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Deleting the PMK cache when de-authenticating the client.
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 PMK: Sending cache delete
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Removing PMK cache entry for station 00:10:40:a1:65:12
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsAssoStateDec
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 apfMsExpireMobileStation (apf_ms.c:7201) Changing state for mobile 00:10:40:a1:65:12 on AP 00:3a:7d:3e:01:b0 from Disassociated to Idle
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 0.0.0.0 START (0) Deleted mobile LWAPP rule on AP [00:3a:7d:3e:01:b0]
*pemReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 0.0.0.0 Removed NPU entry.
*apfReceiveTask: Jan 24 12:39:52.440: [PA] 00:10:40:a1:65:12 Deleting mobile on AP 00:3a:7d:3e:01:b0(1)
*spamApTask6: Jan 24 12:40:12.281: [PA] 00:10:40:a1:65:12 Received DELETE mobile, reason MN_REASSOC_TIMEOUT, from AP 00:3a:7d:3e:01:b0, slot 1 ...cleaning up mscb
01-25-2017 10:32 AM
I would suspect this is a bug of the software version you running. What version of software you run on your WLC ?
Rasika
01-25-2017 10:47 AM
8.0.133.0
Im still waiting on the client to get back to me on the model of end device they are using.
02-01-2017 04:13 AM
Hi,
Running a cisco tool i can see the below:
Jan 24 12:39:42.416 | *apfMsConnTask_0 | Client made new Association to AP/BSSID BSSID 00:3a:7d:3e:01:9f AP USFW-CTR-AP51-N |
Jan 24 12:39:42.416 | *apfMsConnTask_0 | The WLC/AP has found from client association request Information Element that claims PMKID Caching support |
Jan 24 12:39:42.416 | *apfMsConnTask_0 | The Reassociation Request from the client comes with 0 PMKID |
Jan 24 12:39:42.416 | *apfMsConnTask_0 | Client is entering the 802.1x or PSK Authentication state |
Jan 24 12:39:42.416 | *apfMsConnTask_0 | Client has successfully cleared AP association phase |
Jan 24 12:39:42.416 | *apfMsConnTask_0 | WLC/AP is sending an Association Response to the client with status code 0 = Successful association |
Jan 24 12:39:42.418 | *Dot1x_NW_MsgTask_2 | Client will be required to Reauthenticate in 0 seconds |
Jan 24 12:39:42.418 | *Dot1x_NW_MsgTask_2 | WLC/AP is sending EAP-Identity-Request to the client |
Jan 24 12:39:42.447 | *Dot1x_NW_MsgTask_2 | Client sent EAP-Identity-Response to WLC/AP |
Jan 24 12:39:42.587 | *Dot1x_NW_MsgTask_2 | RADIUS Server permitted access |
Jan 24 12:39:42.587 | *Dot1x_NW_MsgTask_2 | Client will be required to Reauthenticate in 0 seconds |
Jan 24 12:39:42.587 | *Dot1x_NW_MsgTask_2 | 4-Way PTK Handshake, Sending M1 |
Jan 24 12:39:42.607 | *Dot1x_NW_MsgTask_2 | 4-Way PTK Handshake, Received M2 |
Jan 24 12:39:42.607 | *Dot1x_NW_MsgTask_2 | 4-Way PTK Handshake, Sending M3 |
Jan 24 12:39:42.623 | *Dot1x_NW_MsgTask_2 | 4-Way PTK Handshake, Received M4 |
Jan 24 12:39:42.624 | *Dot1x_NW_MsgTask_2 | Client has completed PSK Dot1x or WEP authentication phase |
Jan 24 12:39:42.624 | *Dot1x_NW_MsgTask_2 | Client has entered DHCP Required state |
Jan 24 12:39:51.593 | *spamApTask6 | Client delete code: Default reason code for all client delete requests That can be due to possible reasons: Error during PMIPv6 MAG config/ Error during dataplane rule creation for client/ Redirect URL is present and Radius NAC with mac filtering is set, pending for posture/ No dot1x control block found for client, internal error/ Client did not answer retries for SA query (802.11w)/ Default value for flex local auth clients/ Client ACL not present on AP |
Jan 24 12:39:52.440 | *apfReceiveTask | Client session has timed out |
Jan 24 12:39:52.440 | *apfReceiveTask | Client has been deauthenticated |
Jan 24 12:39:52.440 | *apfReceiveTask | Client session has timed out |
So based on the logs there is an issue when the client gets an IP address. You could check the error log above for more info.
HTH
04-12-2018 03:36 PM
10-01-2018 04:32 AM
https://cway.cisco.com/tools/WirelessDebugAnalyzer/
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide