Advertisement
Guest User

debug

a guest
Feb 8th, 2017
633
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 380.40 KB | None | 0 0
  1. =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2017.02.07 14:04:10 =~=~=~=~=~=~=~=~=~=~=~=
  2. login as: admin
  3.  
  4.  
  5. (Cisco Controller)
  6. User: admin
  7. Password:********
  8. (Cisco Controller) >dbe  ebug client 64:b0:a6:c9:56:d2
  9.  
  10. (Cisco Controller) >*apfMsConnTask_6: Feb 07 22:41:39.380: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  11.  
  12. *DHCP Socket Task: Feb 07 22:41:40.596: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xda159cf0)
  13. *DHCP Socket Task: Feb 07 22:41:40.596: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  14. *DHCP Socket Task: Feb 07 22:41:40.596: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  15. *DHCP Socket Task: Feb 07 22:41:40.597: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xda159cf0)
  16. *DHCP Socket Task: Feb 07 22:41:40.597: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  17. *DHCP Socket Task: Feb 07 22:41:40.597: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  18. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xda159cf0)
  19. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a466e8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  20. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  21. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  22. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  23.  
  24. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  25. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  26. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  27. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  28. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xda159cf0)
  29. *DHCP Socket Task: Feb 07 22:41:40.611: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a466e8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  30. *pemReceiveTask: Feb 07 22:41:40.612: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  31. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 Got action frame from this client.
  32. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  33. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 64:d8:14:1e:e8:8d
  34. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  35. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  36. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  37. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  38. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:20:37:06:7c:10:bd
  39. *apfMsConnTask_6: Feb 07 22:43:51.379: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  40.  
  41. *spamApTask1: Feb 07 22:43:51.419: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 20:37:06:7c:10:bd (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  42. *spamApTask1: Feb 07 22:43:51.419: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  43.  
  44. *spamApTask1: Feb 07 22:43:51.419: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  45. *apfMsConnTask_5: Feb 07 22:43:51.419: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  46.  
  47. *apfMsConnTask_5: Feb 07 22:43:51.419: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  48. *apfMsConnTask_5: Feb 07 22:43:51.419: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  49. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  50. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  51. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  52. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  53. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  54. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  55. *apfMsConnTask_5: Feb 07 22:43:51.420: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status Assoc denied unspecified) ApVapId 3 Slot 1
  56. *osapiBsnTimer: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  57. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Disassociated
  58.  
  59. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Disassociated
  60.  
  61. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 64:d8:14:1e:e8:80-1 (reason 1, caller apf_ms.c:7614)
  62. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 64:d8:14:1e:e8:8d slot 1(caller apf_ms.c:7616)
  63. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  64. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Removing BSSID 64:d8:14:1e:e8:8d from PMKID cache of station 64:b0:a6:c9:56:d2
  65. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  66. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  67. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  68. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  69. *apfReceiveTask: Feb 07 22:43:52.406: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 20:37:06:7c:10:bd
  70. *apfReceiveTask: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  71. *apfReceiveTask: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  72. *apfReceiveTask: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Idle
  73.  
  74. *apfReceiveTask: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  75. *apfReceiveTask: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [64:d8:14:1e:e8:80]
  76. *apfReceiveTask: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 Deleting mobile on AP 64:d8:14:1e:e8:80(1)
  77. *spamApTask5: Feb 07 22:43:52.407: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.11:53098
  78.  
  79. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  80.  
  81. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  82. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  83. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  84. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  85. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  86.  
  87. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 1
  88.  
  89. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  90.  
  91. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  92. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  93.  
  94. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  95.  
  96. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  97. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  98. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  99. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  100. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  101. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  102. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  103. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  104. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  105. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  106. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  107. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  108. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  109. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  110. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  111. *apfMsConnTask_5: Feb 07 22:45:45.824: RSNIE in Assoc. Req.: (20)
  112.  
  113. *apfMsConnTask_5: Feb 07 22:45:45.824: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  114.  
  115. *apfMsConnTask_5: Feb 07 22:45:45.824: [0016] ac 04 0c 00
  116.  
  117. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  118. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  119. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  120. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  121. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  122.  
  123. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  124. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  125. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  126.  
  127. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  128.  
  129. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  130. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  131. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  132. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  133. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  134. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  135. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  136.  
  137. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  138. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  139. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  140.  
  141. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  142. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  143. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  144. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  145. *apfMsConnTask_5: Feb 07 22:45:45.824: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  146. *apfMsConnTask_5: Feb 07 22:45:45.825: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  147. *apfMsConnTask_5: Feb 07 22:45:45.825: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  148.  
  149. *spamApTask1: Feb 07 22:45:45.826: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  150. *spamApTask1: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 3)
  151. *spamApTask1: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  152. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  153. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  154. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  155. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  156. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  157. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  158. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: New PMKID: (16)
  159.  
  160. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  161.  
  162. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  163. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  164.  
  165. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  166. pmkValidTime:86401
  167.  
  168. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  169.  
  170. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  171. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  172. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  173. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  174. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  175. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  176. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  177.  
  178. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.829: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  179. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  180. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: Including PMKID in M1 (16)
  181.  
  182. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  183.  
  184. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: M1 - Key Data: (22)
  185.  
  186. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  187.  
  188. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: [0016] 5e 34 2f bf 3f 0b
  189.  
  190. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  191. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  192. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  193. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.830: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  194. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.832: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  195. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.832: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  196.  
  197. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.832: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  198. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.832: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  199. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  200. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  201. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 00000010: 00 0f ac 04 0c 00 ......
  202. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  203. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  204. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 00000020: 23 ff b9 2d 1d 43 #..-.C
  205. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  206. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  207. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  208. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  209.  
  210. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  211.  
  212. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  213. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  214. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.833: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  215. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  216. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  217.  
  218. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  219. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  220. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  221. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  222. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  223.  
  224. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  225.  
  226. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  227.  
  228. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Building Client Payload:
  229.  
  230. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  231.  
  232. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  233.  
  234. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  235.  
  236. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  237.  
  238. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 ssid: IOS
  239.  
  240. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  241.  
  242. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  243. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.835: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  244. *spamApTask1: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  245. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  246. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  247.  
  248. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  249. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  250. type = Airespace AP - Learn IP address
  251. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  252. IPv4 ACL ID = 255, IPv
  253. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  254. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  255.  
  256. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  257.  
  258. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  259.  
  260. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  261. *Dot1x_NW_MsgTask_2: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  262. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  263. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  264. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  265. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  266. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  267. type = Airespace AP - Learn IP address
  268. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  269. IPv4 ACL ID = 255,
  270. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  271. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  272.  
  273. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  274.  
  275. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  276.  
  277. *apfReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  278. *pemReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  279. *pemReceiveTask: Feb 07 22:45:45.836: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  280. *DHCP Socket Task: Feb 07 22:45:46.029: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xde159cf0)
  281. *DHCP Socket Task: Feb 07 22:45:46.029: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  282. *DHCP Socket Task: Feb 07 22:45:46.029: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  283. *DHCP Socket Task: Feb 07 22:45:46.031: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xde159cf0)
  284. *DHCP Socket Task: Feb 07 22:45:46.031: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  285. *DHCP Socket Task: Feb 07 22:45:46.031: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  286. *DHCP Socket Task: Feb 07 22:45:46.034: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xde159cf0)
  287. *DHCP Socket Task: Feb 07 22:45:46.034: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a484d8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  288. *DHCP Socket Task: Feb 07 22:45:46.034: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  289. *DHCP Socket Task: Feb 07 22:45:46.034: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  290. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  291. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  292.  
  293. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  294. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  295. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  296. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  297. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xde159cf0)
  298. *DHCP Socket Task: Feb 07 22:45:46.035: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a484d8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  299. *pemReceiveTask: Feb 07 22:45:46.036: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  300. *apfMsConnTask_5: Feb 07 23:00:26.256: 64:b0:a6:c9:56:d2 Got action frame from this client.
  301. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  302. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 20:37:06:7c:10:bd
  303. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  304. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  305. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  306. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  307. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:64:d8:14:1e:e8:8d
  308. *apfMsConnTask_5: Feb 07 23:00:26.257: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  309.  
  310. *spamApTask5: Feb 07 23:00:26.296: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 64:d8:14:1e:e8:8d (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  311. *spamApTask5: Feb 07 23:00:26.296: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  312.  
  313. *spamApTask5: Feb 07 23:00:26.296: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  314. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  315.  
  316. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  317. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  318. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  319. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  320. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  321. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  322. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  323. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  324. *apfMsConnTask_6: Feb 07 23:00:26.297: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status Assoc denied unspecified) ApVapId 3 Slot 1
  325. *osapiBsnTimer: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  326. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  327.  
  328. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  329.  
  330. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  331. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  332. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  333. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  334. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  335. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  336. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  337. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  338. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 64:d8:14:1e:e8:8d
  339. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  340. *apfReceiveTask: Feb 07 23:00:27.254: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  341. *apfReceiveTask: Feb 07 23:00:27.255: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  342.  
  343. *apfReceiveTask: Feb 07 23:00:27.255: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  344. *apfReceiveTask: Feb 07 23:00:27.255: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  345. *apfReceiveTask: Feb 07 23:00:27.255: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
  346. *spamApTask1: Feb 07 23:00:27.256: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.12:12973
  347.  
  348. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  349.  
  350. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  351. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 64:d8:14:1e:e8:80(1)
  352. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 64:d8:14:1e:e8:8d AP APd867.d99c.f685
  353. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 64:D8:14:1E:E8:80
  354. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  355.  
  356. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 1
  357.  
  358. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  359.  
  360. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  361. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  362.  
  363. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  364.  
  365. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  366. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  367. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  368. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  369. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  370. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  371. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  372. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  373. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  374. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  375. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  376. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  377. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  378. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  379. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  380. *apfMsConnTask_6: Feb 07 23:00:53.174: RSNIE in Assoc. Req.: (20)
  381.  
  382. *apfMsConnTask_6: Feb 07 23:00:53.174: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  383.  
  384. *apfMsConnTask_6: Feb 07 23:00:53.174: [0016] ac 04 0c 00
  385.  
  386. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  387. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  388. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  389. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  390. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  391.  
  392. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 64:d8:14:1e:e8:80 - AID ===> 1
  393. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  394. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  395.  
  396. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  397.  
  398. *apfMsConnTask_6: Feb 07 23:00:53.174: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  399. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  400. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  401. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  402. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  403. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  404. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Idle to Associated
  405.  
  406. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  407. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  408. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  409.  
  410. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  411. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  412. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  413. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  414. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  415. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status 0) ApVapId 3 Slot 1
  416. *apfMsConnTask_6: Feb 07 23:00:53.175: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Associated
  417.  
  418. *spamApTask5: Feb 07 23:00:53.176: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  419. *spamApTask5: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 73)
  420. *spamApTask5: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  421. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  422. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  423. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  424. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  425. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  426. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Adding BSSID 64:d8:14:1e:e8:8d to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  427. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: New PMKID: (16)
  428.  
  429. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  430.  
  431. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  432. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  433.  
  434. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  435. pmkValidTime:86429
  436.  
  437. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  438.  
  439. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  440. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  441. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  442. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  443. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  444. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  445. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  446.  
  447. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  448. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  449. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: Including PMKID in M1 (16)
  450.  
  451. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  452.  
  453. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: M1 - Key Data: (22)
  454.  
  455. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: [0000] dd 14 00 0f ac 04 c2 1b fc c9 10 63 b8 3e cc 98
  456.  
  457. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: [0016] 1a 53 12 c2 b1 3e
  458.  
  459. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  460. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  461. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  462. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.178: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  463. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  464. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  465.  
  466. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  467. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  468. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  469. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  470. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 00000010: 00 0f ac 04 0c 00 ......
  471. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  472. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  473. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 00000020: 23 ff b9 2d 1d 43 #..-.C
  474. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  475. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  476. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  477. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  478.  
  479. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  480.  
  481. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  482. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  483. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.183: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  484. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  485. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  486.  
  487. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  488. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  489. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  490. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  491. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  492.  
  493. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  494.  
  495. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  496.  
  497. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Building Client Payload:
  498.  
  499. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  500.  
  501. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  502.  
  503. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  504.  
  505. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  506.  
  507. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 ssid: IOS
  508.  
  509. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  510.  
  511. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  512. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  513. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  514. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  515.  
  516. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  517. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  518. type = Airespace AP - Learn IP address
  519. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  520. IPv4 ACL ID = 255, IPv
  521. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  522. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  523.  
  524. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  525.  
  526. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  527.  
  528. *spamApTask5: Feb 07 23:00:53.186: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  529. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  530. *Dot1x_NW_MsgTask_2: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  531. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  532. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  533. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  534. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  535. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  536. type = Airespace AP - Learn IP address
  537. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  538. IPv4 ACL ID = 255,
  539. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  540. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  541.  
  542. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  543.  
  544. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  545.  
  546. *apfReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  547. *pemReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  548. *pemReceiveTask: Feb 07 23:00:53.187: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  549. *DHCP Socket Task: Feb 07 23:00:53.338: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xe2159cf0)
  550. *DHCP Socket Task: Feb 07 23:00:53.338: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  551. *DHCP Socket Task: Feb 07 23:00:53.338: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  552. *DHCP Socket Task: Feb 07 23:00:53.339: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xe2159cf0)
  553. *DHCP Socket Task: Feb 07 23:00:53.339: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  554. *DHCP Socket Task: Feb 07 23:00:53.339: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  555. *DHCP Socket Task: Feb 07 23:00:53.341: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xe2159cf0)
  556. *DHCP Socket Task: Feb 07 23:00:53.341: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a4a2c8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  557. *DHCP Socket Task: Feb 07 23:00:53.341: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  558. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  559. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  560. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  561.  
  562. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  563. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  564. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  565. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  566. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xe2159cf0)
  567. *DHCP Socket Task: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a4a2c8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  568. *pemReceiveTask: Feb 07 23:00:53.342: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  569. *apfMsConnTask_6: Feb 07 23:01:09.312: 64:b0:a6:c9:56:d2 Got action frame from this client.
  570. *apfMsConnTask_6: Feb 07 23:01:28.840: 64:b0:a6:c9:56:d2 Got action frame from this client.
  571. *apfMsConnTask_6: Feb 07 23:01:35.681: 64:b0:a6:c9:56:d2 Got action frame from this client.
  572. *apfMsConnTask_6: Feb 07 23:01:38.289: 64:b0:a6:c9:56:d2 Got action frame from this client.
  573. *apfMsConnTask_6: Feb 07 23:01:52.120: 64:b0:a6:c9:56:d2 Got action frame from this client.
  574. *apfMsConnTask_6: Feb 07 23:02:15.958: 64:b0:a6:c9:56:d2 Got action frame from this client.
  575. *apfMsConnTask_6: Feb 07 23:02:19.813: 64:b0:a6:c9:56:d2 Got action frame from this client.
  576. *apfMsConnTask_6: Feb 07 23:02:44.465: 64:b0:a6:c9:56:d2 Got action frame from this client.
  577. *apfMsConnTask_6: Feb 07 23:02:55.080: 64:b0:a6:c9:56:d2 Got action frame from this client.
  578. *apfMsConnTask_6: Feb 07 23:03:50.826: 64:b0:a6:c9:56:d2 Got action frame from this client.
  579. *apfMsConnTask_6: Feb 07 23:03:57.753: 64:b0:a6:c9:56:d2 Got action frame from this client.
  580. *apfMsConnTask_6: Feb 07 23:04:32.928: 64:b0:a6:c9:56:d2 Got action frame from this client.
  581. *apfMsConnTask_6: Feb 07 23:04:36.513: 64:b0:a6:c9:56:d2 Got action frame from this client.
  582. *apfMsConnTask_6: Feb 07 23:06:36.670: 64:b0:a6:c9:56:d2 Got action frame from this client.
  583. *apfMsConnTask_6: Feb 07 23:06:40.679: 64:b0:a6:c9:56:d2 Got action frame from this client.
  584. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 Got action frame from this client.
  585. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  586. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 64:d8:14:1e:e8:8d
  587. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  588. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  589. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  590. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  591. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:20:37:06:7c:10:bd
  592. *apfMsConnTask_6: Feb 07 23:07:49.387: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  593.  
  594. *spamApTask1: Feb 07 23:07:49.430: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 20:37:06:7c:10:bd (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  595. *spamApTask1: Feb 07 23:07:49.430: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  596.  
  597. *spamApTask1: Feb 07 23:07:49.430: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  598. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  599.  
  600. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  601. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  602. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  603. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  604. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  605. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  606. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  607. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  608. *apfMsConnTask_5: Feb 07 23:07:49.431: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status Assoc denied unspecified) ApVapId 3 Slot 1
  609. *osapiBsnTimer: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  610. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Disassociated
  611.  
  612. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Disassociated
  613.  
  614. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 64:d8:14:1e:e8:80-1 (reason 1, caller apf_ms.c:7614)
  615. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 64:d8:14:1e:e8:8d slot 1(caller apf_ms.c:7616)
  616. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  617. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Removing BSSID 64:d8:14:1e:e8:8d from PMKID cache of station 64:b0:a6:c9:56:d2
  618. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  619. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  620. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  621. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  622. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 20:37:06:7c:10:bd
  623. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  624. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  625. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Idle
  626.  
  627. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  628. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [64:d8:14:1e:e8:80]
  629. *apfReceiveTask: Feb 07 23:07:50.410: 64:b0:a6:c9:56:d2 Deleting mobile on AP 64:d8:14:1e:e8:80(1)
  630. *spamApTask5: Feb 07 23:07:50.411: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.11:53098
  631.  
  632. *apfMsConnTask_5: Feb 07 23:09:23.023: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  633.  
  634. *apfMsConnTask_5: Feb 07 23:09:23.023: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  635. *apfMsConnTask_5: Feb 07 23:09:23.023: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  636. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  637. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  638. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  639.  
  640. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 1
  641.  
  642. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  643.  
  644. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  645. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  646.  
  647. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  648.  
  649. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  650. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  651. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  652. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  653. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  654. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  655. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  656. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  657. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  658. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  659. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  660. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  661. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  662. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  663. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  664. *apfMsConnTask_5: Feb 07 23:09:23.024: RSNIE in Assoc. Req.: (20)
  665.  
  666. *apfMsConnTask_5: Feb 07 23:09:23.024: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  667.  
  668. *apfMsConnTask_5: Feb 07 23:09:23.024: [0016] ac 04 0c 00
  669.  
  670. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  671. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  672. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  673. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  674. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  675.  
  676. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  677. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  678. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  679.  
  680. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  681.  
  682. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  683. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  684. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  685. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  686. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  687. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  688. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  689.  
  690. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  691. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  692. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  693.  
  694. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  695. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  696. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  697. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  698. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  699. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  700. *apfMsConnTask_5: Feb 07 23:09:23.024: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  701.  
  702. *spamApTask1: Feb 07 23:09:23.026: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  703. *spamApTask1: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 8)
  704. *spamApTask1: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  705. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  706. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  707. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  708. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  709. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  710. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  711. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: New PMKID: (16)
  712.  
  713. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  714.  
  715. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  716. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  717.  
  718. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  719. pmkValidTime:86409
  720.  
  721. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  722.  
  723. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  724. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  725. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  726. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  727. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  728. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  729. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  730.  
  731. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  732. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  733. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: Including PMKID in M1 (16)
  734.  
  735. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  736.  
  737. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: M1 - Key Data: (22)
  738.  
  739. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  740.  
  741. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: [0016] 5e 34 2f bf 3f 0b
  742.  
  743. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  744. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  745. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  746. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.029: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  747. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  748. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  749.  
  750. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  751. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  752. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  753. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  754. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 00000010: 00 0f ac 04 0c 00 ......
  755. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  756. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  757. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 00000020: 23 ff b9 2d 1d 43 #..-.C
  758. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  759. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  760. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  761. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  762.  
  763. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  764.  
  765. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  766. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  767. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.033: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  768. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  769. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  770.  
  771. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  772. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  773. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  774. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  775. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.035: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  776.  
  777. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  778.  
  779. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  780.  
  781. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Building Client Payload:
  782.  
  783. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  784.  
  785. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  786.  
  787. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  788.  
  789. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  790.  
  791. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 ssid: IOS
  792.  
  793. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  794.  
  795. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  796. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  797. *spamApTask1: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  798. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  799. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  800.  
  801. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  802. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  803. type = Airespace AP - Learn IP address
  804. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  805. IPv4 ACL ID = 255, IPv
  806. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  807. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  808.  
  809. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  810.  
  811. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  812.  
  813. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  814. *Dot1x_NW_MsgTask_2: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  815. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  816. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  817. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  818. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  819. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  820. type = Airespace AP - Learn IP address
  821. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  822. IPv4 ACL ID = 255,
  823. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  824. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  825.  
  826. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  827.  
  828. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  829.  
  830. *apfReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  831. *pemReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  832. *pemReceiveTask: Feb 07 23:09:23.036: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  833. *DHCP Socket Task: Feb 07 23:09:23.252: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xe6159cf0)
  834. *DHCP Socket Task: Feb 07 23:09:23.252: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  835. *DHCP Socket Task: Feb 07 23:09:23.252: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  836. *DHCP Socket Task: Feb 07 23:09:23.256: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xe6159cf0)
  837. *DHCP Socket Task: Feb 07 23:09:23.256: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  838. *DHCP Socket Task: Feb 07 23:09:23.256: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  839. *DHCP Socket Task: Feb 07 23:09:23.257: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xe6159cf0)
  840. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a4c0b8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  841. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  842. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  843. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  844. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  845.  
  846. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  847. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  848. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  849. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  850. *pemReceiveTask: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  851. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xe6159cf0)
  852. *DHCP Socket Task: Feb 07 23:09:23.258: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a4c0b8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  853. *dot1xMsgTask: Feb 07 23:42:06.038: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  854.  
  855. *dot1xMsgTask: Feb 07 23:42:06.038: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  856. *dot1xMsgTask: Feb 07 23:42:06.038: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  857.  
  858. *dot1xMsgTask: Feb 07 23:42:06.038: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  859. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
  860. *dot1xMsgTask: Feb 07 23:42:06.038: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  861. *dot1xMsgTask: Feb 07 23:42:06.038: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  862. *Dot1x_NW_MsgTask_2: Feb 07 23:42:06.040: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  863. *Dot1x_NW_MsgTask_2: Feb 07 23:42:06.040: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  864.  
  865. *Dot1x_NW_MsgTask_2: Feb 07 23:42:06.040: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  866. *Dot1x_NW_MsgTask_2: Feb 07 23:42:06.040: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  867. *Dot1x_NW_MsgTask_2: Feb 07 23:42:06.040: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  868. *apfMsConnTask_5: Feb 07 23:56:13.288: 64:b0:a6:c9:56:d2 Got action frame from this client.
  869. *apfMsConnTask_5: Feb 07 23:57:20.282: 64:b0:a6:c9:56:d2 Got action frame from this client.
  870. *apfMsConnTask_5: Feb 07 23:57:31.031: 64:b0:a6:c9:56:d2 Got action frame from this client.
  871. *apfMsConnTask_5: Feb 07 23:57:34.072: 64:b0:a6:c9:56:d2 Got action frame from this client.
  872. *apfMsConnTask_5: Feb 07 23:57:44.600: 64:b0:a6:c9:56:d2 Got action frame from this client.
  873. *apfMsConnTask_5: Feb 07 23:58:09.269: 64:b0:a6:c9:56:d2 Got action frame from this client.
  874. *apfMsConnTask_5: Feb 08 00:07:11.177: 64:b0:a6:c9:56:d2 Got action frame from this client.
  875. *apfMsConnTask_5: Feb 08 00:09:20.830: 64:b0:a6:c9:56:d2 Got action frame from this client.
  876. *apfMsConnTask_5: Feb 08 00:09:29.890: 64:b0:a6:c9:56:d2 Got action frame from this client.
  877. *apfMsConnTask_5: Feb 08 00:09:30.244: 64:b0:a6:c9:56:d2 Got action frame from this client.
  878. *apfMsConnTask_5: Feb 08 00:09:49.772: 64:b0:a6:c9:56:d2 Got action frame from this client.
  879. *apfMsConnTask_5: Feb 08 00:10:41.222: 64:b0:a6:c9:56:d2 Got action frame from this client.
  880. *apfMsConnTask_5: Feb 08 00:10:48.735: 64:b0:a6:c9:56:d2 Got action frame from this client.
  881. *apfMsConnTask_5: Feb 08 00:11:01.750: 64:b0:a6:c9:56:d2 Got action frame from this client.
  882. *apfMsConnTask_5: Feb 08 00:11:05.368: 64:b0:a6:c9:56:d2 Got action frame from this client.
  883. *apfMsConnTask_5: Feb 08 00:11:17.495: 64:b0:a6:c9:56:d2 Got action frame from this client.
  884. *apfMsConnTask_5: Feb 08 00:11:33.558: 64:b0:a6:c9:56:d2 Got action frame from this client.
  885. *apfMsConnTask_5: Feb 08 00:11:47.877: 64:b0:a6:c9:56:d2 Got action frame from this client.
  886. *apfMsConnTask_5: Feb 08 00:11:58.401: 64:b0:a6:c9:56:d2 Got action frame from this client.
  887. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 Got action frame from this client.
  888. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  889. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 20:37:06:7c:10:bd
  890. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  891. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  892. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  893. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  894. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:10:bd:18:6d:78:2d
  895. *apfMsConnTask_5: Feb 08 00:13:10.157: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  896.  
  897. *spamApTask6: Feb 08 00:13:10.200: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 10:bd:18:6d:78:2d (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  898. *spamApTask6: Feb 08 00:13:10.200: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  899.  
  900. *spamApTask6: Feb 08 00:13:10.200: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  901. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  902.  
  903. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 thread:a4fdd60
  904. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  905. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  906. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  907. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  908. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  909. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  910. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  911. *apfMsConnTask_0: Feb 08 00:13:10.201: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 10:bd:18:6d:78:2d (status Assoc denied unspecified) ApVapId 3 Slot 1
  912. *osapiBsnTimer: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  913. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  914.  
  915. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  916.  
  917. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  918. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  919. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  920. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  921. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  922. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  923. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  924. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  925. *apfReceiveTask: Feb 08 00:13:11.137: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 10:bd:18:6d:78:2d
  926. *apfReceiveTask: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  927. *apfReceiveTask: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  928. *apfReceiveTask: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  929.  
  930. *apfReceiveTask: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  931. *apfReceiveTask: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  932. *apfReceiveTask: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
  933. *spamApTask1: Feb 08 00:13:11.138: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.12:12973
  934.  
  935. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  936.  
  937. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 thread:a4fdd60
  938. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 10:bd:18:6d:78:20(1)
  939. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 10:bd:18:6d:78:2d AP APd867.d9e1.0c09
  940. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 10:BD:18:6D:78:20
  941. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  942.  
  943. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 0
  944.  
  945. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  946.  
  947. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  948. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  949.  
  950. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  951.  
  952. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  953. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  954. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  955. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  956. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  957. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  958. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  959. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  960. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  961. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  962. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  963. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  964. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  965. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  966. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  967. *apfMsConnTask_0: Feb 08 00:13:44.928: RSNIE in Assoc. Req.: (20)
  968.  
  969. *apfMsConnTask_0: Feb 08 00:13:44.928: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  970.  
  971. *apfMsConnTask_0: Feb 08 00:13:44.928: [0016] ac 04 0c 00
  972.  
  973. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  974. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  975. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  976. *apfMsConnTask_0: Feb 08 00:13:44.928: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  977. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  978.  
  979. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 10:bd:18:6d:78:20 - AID ===> 1
  980. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  981. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  982.  
  983. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  984.  
  985. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  986. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3for this client
  987. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  988. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3 flex-acl-name:
  989. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  990. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  991. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Idle to Associated
  992.  
  993. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  994. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  995. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  996.  
  997. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 on apVapId 3
  998. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  999. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1000. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1001. *apfMsConnTask_0: Feb 08 00:13:44.929: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1002. *apfMsConnTask_0: Feb 08 00:13:44.931: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 10:bd:18:6d:78:2d (status 0) ApVapId 3 Slot 1
  1003. *apfMsConnTask_0: Feb 08 00:13:44.931: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Associated to Associated
  1004.  
  1005. *spamApTask6: Feb 08 00:13:44.931: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 10:bd:18:6d:78:20
  1006. *spamApTask6: Feb 08 00:13:44.933: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 98)
  1007. *spamApTask6: Feb 08 00:13:44.933: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  1008. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.933: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  1009. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  1010. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1011. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  1012. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  1013. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Adding BSSID 10:bd:18:6d:78:2d to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  1014. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: New PMKID: (16)
  1015.  
  1016. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: [0000] a9 b1 dd 94 54 4d 74 a9 84 87 5c 3d 70 eb dd 3f
  1017.  
  1018. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  1019. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  1020.  
  1021. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  1022. pmkValidTime:86396
  1023.  
  1024. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  1025.  
  1026. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  1027. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  1028. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  1029. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  1030. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  1031. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  1032. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1033.  
  1034. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 10:bd:18:6d:78:2d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1035. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 10:bd:18:6d:78:2d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1036. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: Including PMKID in M1 (16)
  1037.  
  1038. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: [0000] a9 b1 dd 94 54 4d 74 a9 84 87 5c 3d 70 eb dd 3f
  1039.  
  1040. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: M1 - Key Data: (22)
  1041.  
  1042. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: [0000] dd 14 00 0f ac 04 a9 b1 dd 94 54 4d 74 a9 84 87
  1043.  
  1044. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: [0016] 5c 3d 70 eb dd 3f
  1045.  
  1046. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  1047. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1048. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  1049. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.934: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1050. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1051. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1052.  
  1053. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  1054. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  1055. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  1056. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  1057. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 00000010: 00 0f ac 04 0c 00 ......
  1058. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  1059. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  1060. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 00000020: 23 ff b9 2d 1d 43 #..-.C
  1061. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  1062. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  1063. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1064. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1065.  
  1066. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1067.  
  1068. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1069. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  1070. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.937: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1071. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1072. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1073.  
  1074. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  1075. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1076. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  1077. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  1078. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  1079.  
  1080. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  1081.  
  1082. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  1083.  
  1084. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.939: 64:b0:a6:c9:56:d2 Building Client Payload:
  1085.  
  1086. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  1087.  
  1088. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  1089.  
  1090. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  1091.  
  1092. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  1093.  
  1094. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 ssid: IOS
  1095.  
  1096. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  1097.  
  1098. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3for this client
  1099. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1100. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3 flex-acl-name:
  1101. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  1102.  
  1103. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  1104. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  1105. type = Airespace AP - Learn IP address
  1106. on AP 10:bd:18:6d:78:20, slot 1, interface = 1, QOS = 2
  1107. IPv4 ACL ID = 255, IPv
  1108. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1109. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1110.  
  1111. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1112.  
  1113. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1114.  
  1115. *spamApTask6: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 10:bd:18:6d:78:20
  1116. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1117. *Dot1x_NW_MsgTask_2: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  1118. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  1119. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  1120. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  1121. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  1122. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  1123. type = Airespace AP - Learn IP address
  1124. on AP 10:bd:18:6d:78:20, slot 1, interface = 1, QOS = 2
  1125. IPv4 ACL ID = 255,
  1126. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1127. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1128.  
  1129. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1130.  
  1131. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1132.  
  1133. *apfReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1134. *pemReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1135. *pemReceiveTask: Feb 08 00:13:44.940: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1136. *DHCP Socket Task: Feb 08 00:13:45.200: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xea159cf0)
  1137. *DHCP Socket Task: Feb 08 00:13:45.200: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  1138. *DHCP Socket Task: Feb 08 00:13:45.200: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  1139. *DHCP Socket Task: Feb 08 00:13:45.202: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xea159cf0)
  1140. *DHCP Socket Task: Feb 08 00:13:45.202: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  1141. *DHCP Socket Task: Feb 08 00:13:45.202: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  1142. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xea159cf0)
  1143. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a4dea8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  1144. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  1145. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  1146. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  1147. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  1148.  
  1149. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  1150. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1151. *DHCP Socket Task: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1152. *pemReceiveTask: Feb 08 00:13:45.204: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  1153. *DHCP Socket Task: Feb 08 00:13:45.205: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  1154. *apfMsConnTask_0: Feb 08 00:13:54.781: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1155. *apfMsConnTask_0: Feb 08 00:15:19.165: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1156. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1157. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  1158. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 10:bd:18:6d:78:2d
  1159. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  1160. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  1161. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  1162. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  1163. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:20:37:06:7c:10:bd
  1164. *apfMsConnTask_0: Feb 08 00:38:33.488: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  1165.  
  1166. *spamApTask1: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 20:37:06:7c:10:bd (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  1167. *spamApTask1: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  1168.  
  1169. *spamApTask1: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  1170. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1171.  
  1172. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  1173. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  1174. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 on apVapId 3
  1175. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1176. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1177. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1178. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1179. *apfMsConnTask_5: Feb 08 00:38:33.526: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  1180. *apfMsConnTask_5: Feb 08 00:38:33.527: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status Assoc denied unspecified) ApVapId 3 Slot 1
  1181. *osapiBsnTimer: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  1182. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Associated to Disassociated
  1183.  
  1184. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Disassociated to Disassociated
  1185.  
  1186. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 10:bd:18:6d:78:20-1 (reason 1, caller apf_ms.c:7614)
  1187. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 10:bd:18:6d:78:2d slot 1(caller apf_ms.c:7616)
  1188. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1189. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Removing BSSID 10:bd:18:6d:78:2d from PMKID cache of station 64:b0:a6:c9:56:d2
  1190. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  1191. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  1192. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  1193. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  1194. *apfReceiveTask: Feb 08 00:38:34.449: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 20:37:06:7c:10:bd
  1195. *apfReceiveTask: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  1196. *apfReceiveTask: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  1197. *apfReceiveTask: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Disassociated to Idle
  1198.  
  1199. *apfReceiveTask: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  1200. *apfReceiveTask: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [10:bd:18:6d:78:20]
  1201. *apfReceiveTask: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 Deleting mobile on AP 10:bd:18:6d:78:20(1)
  1202. *spamApTask6: Feb 08 00:38:34.450: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.13:4289
  1203.  
  1204. *apfMsConnTask_5: Feb 08 00:39:41.568: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1205.  
  1206. *apfMsConnTask_5: Feb 08 00:39:41.568: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  1207. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  1208. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  1209. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  1210. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  1211.  
  1212. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 2
  1213.  
  1214. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  1215.  
  1216. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  1217. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  1218.  
  1219. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  1220.  
  1221. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  1222. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  1223. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  1224. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  1225. *apfMsConnTask_5: Feb 08 00:39:41.569: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  1226. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  1227. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  1228. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  1229. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  1230. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  1231. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  1232. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  1233. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  1234. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  1235. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  1236. *apfMsConnTask_5: Feb 08 00:39:41.570: RSNIE in Assoc. Req.: (20)
  1237.  
  1238. *apfMsConnTask_5: Feb 08 00:39:41.570: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  1239.  
  1240. *apfMsConnTask_5: Feb 08 00:39:41.570: [0016] ac 04 0c 00
  1241.  
  1242. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  1243. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  1244. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  1245. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  1246. *apfMsConnTask_5: Feb 08 00:39:41.570: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  1247.  
  1248. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  1249. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  1250. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  1251.  
  1252. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  1253.  
  1254. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  1255. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  1256. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1257. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  1258. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  1259. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  1260. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  1261.  
  1262. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  1263. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  1264. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  1265.  
  1266. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  1267. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1268. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1269. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1270. *apfMsConnTask_5: Feb 08 00:39:41.571: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1271. *apfMsConnTask_5: Feb 08 00:39:41.572: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  1272. *apfMsConnTask_5: Feb 08 00:39:41.572: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  1273.  
  1274. *spamApTask1: Feb 08 00:39:41.574: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  1275. *spamApTask1: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 46)
  1276. *spamApTask1: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  1277. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  1278. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  1279. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1280. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  1281. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  1282. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  1283. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: New PMKID: (16)
  1284.  
  1285. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  1286.  
  1287. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  1288. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  1289.  
  1290. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  1291. pmkValidTime:86386
  1292.  
  1293. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  1294.  
  1295. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  1296. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  1297. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  1298. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  1299. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  1300. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  1301. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1302.  
  1303. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1304. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1305. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: Including PMKID in M1 (16)
  1306.  
  1307. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  1308.  
  1309. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: M1 - Key Data: (22)
  1310.  
  1311. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  1312.  
  1313. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: [0016] 5e 34 2f bf 3f 0b
  1314.  
  1315. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  1316. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1317. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  1318. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.576: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1319. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1320. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1321.  
  1322. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  1323. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  1324. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  1325. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  1326. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 00000010: 00 0f ac 04 0c 00 ......
  1327. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  1328. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  1329. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 00000020: 23 ff b9 2d 1d 43 #..-.C
  1330. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  1331. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  1332. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.579: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1333. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.580: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1334.  
  1335. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.580: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1336.  
  1337. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.580: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1338. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  1339. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.580: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1340. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.581: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1341. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.581: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1342.  
  1343. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.581: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  1344. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.581: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1345. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.581: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  1346. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  1347. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  1348.  
  1349. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  1350.  
  1351. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  1352.  
  1353. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Building Client Payload:
  1354.  
  1355. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  1356.  
  1357. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  1358.  
  1359. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  1360.  
  1361. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  1362.  
  1363. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 ssid: IOS
  1364.  
  1365. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  1366.  
  1367. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  1368. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1369. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  1370. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  1371.  
  1372. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  1373. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  1374. type = Airespace AP - Learn IP address
  1375. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  1376. IPv4 ACL ID = 255, IPv
  1377. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1378. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1379.  
  1380. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1381.  
  1382. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1383.  
  1384. *spamApTask1: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  1385. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1386. *Dot1x_NW_MsgTask_2: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  1387. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  1388. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  1389. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  1390. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  1391. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  1392. type = Airespace AP - Learn IP address
  1393. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  1394. IPv4 ACL ID = 255,
  1395. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1396. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1397.  
  1398. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1399.  
  1400. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1401.  
  1402. *apfReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1403. *pemReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1404. *pemReceiveTask: Feb 08 00:39:41.582: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1405. *DHCP Socket Task: Feb 08 00:39:41.859: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xee159cf0)
  1406. *DHCP Socket Task: Feb 08 00:39:41.860: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  1407. *DHCP Socket Task: Feb 08 00:39:41.860: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  1408. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xee159cf0)
  1409. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  1410. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  1411. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xee159cf0)
  1412. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a4fc98 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  1413. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  1414. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  1415. *DHCP Socket Task: Feb 08 00:39:41.862: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  1416. *DHCP Socket Task: Feb 08 00:39:41.863: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  1417.  
  1418. *DHCP Socket Task: Feb 08 00:39:41.863: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  1419. *DHCP Socket Task: Feb 08 00:39:41.863: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1420. *DHCP Socket Task: Feb 08 00:39:41.863: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1421. *pemReceiveTask: Feb 08 00:39:41.863: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  1422. *DHCP Socket Task: Feb 08 00:39:41.864: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  1423. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1424. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  1425. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 20:37:06:7c:10:bd
  1426. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  1427. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  1428. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  1429. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  1430. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:64:d8:14:1e:e8:8d
  1431. *apfMsConnTask_5: Feb 08 00:39:48.977: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  1432.  
  1433. *spamApTask5: Feb 08 00:39:49.012: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 64:d8:14:1e:e8:8d (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  1434. *spamApTask5: Feb 08 00:39:49.012: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  1435.  
  1436. *spamApTask5: Feb 08 00:39:49.012: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  1437. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1438.  
  1439. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  1440. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  1441. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  1442. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1443. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1444. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1445. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1446. *apfMsConnTask_6: Feb 08 00:39:49.013: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  1447. *apfMsConnTask_6: Feb 08 00:39:49.014: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status Assoc denied unspecified) ApVapId 3 Slot 1
  1448. *osapiBsnTimer: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  1449. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  1450.  
  1451. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  1452.  
  1453. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  1454. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  1455. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1456. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  1457. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  1458. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  1459. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  1460. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  1461. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 64:d8:14:1e:e8:8d
  1462. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  1463. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  1464. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  1465.  
  1466. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  1467. *apfReceiveTask: Feb 08 00:39:49.937: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  1468. *apfReceiveTask: Feb 08 00:39:49.938: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
  1469. *spamApTask1: Feb 08 00:39:49.938: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.12:12973
  1470.  
  1471. *apfMsConnTask_6: Feb 08 00:40:05.973: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1472. *apfMsConnTask_6: Feb 08 00:40:05.973: 64:b0:a6:c9:56:d2 no PMK cache entry for this client. Can't do preauth.
  1473. *apfMsConnTask_0: Feb 08 00:40:39.409: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1474.  
  1475. *apfMsConnTask_0: Feb 08 00:40:39.409: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 thread:a4fdd60
  1476. *apfMsConnTask_0: Feb 08 00:40:39.409: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 10:bd:18:6d:78:20(1)
  1477. *apfMsConnTask_0: Feb 08 00:40:39.409: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 10:bd:18:6d:78:2d AP APd867.d9e1.0c09
  1478. *apfMsConnTask_0: Feb 08 00:40:39.409: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 10:BD:18:6D:78:20
  1479. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  1480.  
  1481. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 0
  1482.  
  1483. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  1484.  
  1485. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  1486. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  1487.  
  1488. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  1489.  
  1490. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  1491. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  1492. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  1493. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  1494. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  1495. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  1496. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  1497. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  1498. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  1499. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  1500. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  1501. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  1502. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  1503. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  1504. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  1505. *apfMsConnTask_0: Feb 08 00:40:39.410: RSNIE in Assoc. Req.: (20)
  1506.  
  1507. *apfMsConnTask_0: Feb 08 00:40:39.410: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  1508.  
  1509. *apfMsConnTask_0: Feb 08 00:40:39.410: [0016] ac 04 0c 00
  1510.  
  1511. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  1512. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  1513. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  1514. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  1515. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  1516.  
  1517. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 10:bd:18:6d:78:20 - AID ===> 1
  1518. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  1519. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  1520.  
  1521. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  1522.  
  1523. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  1524. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3for this client
  1525. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1526. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3 flex-acl-name:
  1527. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  1528. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  1529. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Idle to Associated
  1530.  
  1531. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  1532. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  1533. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  1534.  
  1535. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 on apVapId 3
  1536. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1537. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1538. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1539. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1540. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 10:bd:18:6d:78:2d (status 0) ApVapId 3 Slot 1
  1541. *apfMsConnTask_0: Feb 08 00:40:39.410: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Associated to Associated
  1542.  
  1543. *spamApTask6: Feb 08 00:40:39.411: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 10:bd:18:6d:78:20
  1544. *spamApTask6: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 3)
  1545. *spamApTask6: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  1546. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  1547. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  1548. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1549. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  1550. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  1551. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Adding BSSID 10:bd:18:6d:78:2d to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  1552. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: New PMKID: (16)
  1553.  
  1554. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: [0000] a9 b1 dd 94 54 4d 74 a9 84 87 5c 3d 70 eb dd 3f
  1555.  
  1556. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.413: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  1557. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  1558.  
  1559. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  1560. pmkValidTime:86384
  1561.  
  1562. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  1563.  
  1564. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  1565. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  1566. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  1567. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  1568. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  1569. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  1570. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1571.  
  1572. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 10:bd:18:6d:78:2d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1573. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 10:bd:18:6d:78:2d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1574. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: Including PMKID in M1 (16)
  1575.  
  1576. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: [0000] a9 b1 dd 94 54 4d 74 a9 84 87 5c 3d 70 eb dd 3f
  1577.  
  1578. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: M1 - Key Data: (22)
  1579.  
  1580. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: [0000] dd 14 00 0f ac 04 a9 b1 dd 94 54 4d 74 a9 84 87
  1581.  
  1582. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: [0016] 5c 3d 70 eb dd 3f
  1583.  
  1584. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  1585. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1586. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  1587. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.414: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1588. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1589. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1590.  
  1591. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  1592. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  1593. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  1594. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  1595. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 00000010: 00 0f ac 04 0c 00 ......
  1596. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  1597. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  1598. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 00000020: 23 ff b9 2d 1d 43 #..-.C
  1599. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  1600. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  1601. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1602. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1603.  
  1604. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1605.  
  1606. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1607. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  1608. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.417: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1609. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.419: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1610. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.419: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1611.  
  1612. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  1613. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1614. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  1615. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  1616. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  1617.  
  1618. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  1619.  
  1620. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  1621.  
  1622. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Building Client Payload:
  1623.  
  1624. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  1625.  
  1626. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  1627.  
  1628. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  1629.  
  1630. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  1631.  
  1632. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 ssid: IOS
  1633.  
  1634. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  1635.  
  1636. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3for this client
  1637. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1638. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 10:bd:18:6d:78:20 vapId 3 apVapId 3 flex-acl-name:
  1639. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  1640.  
  1641. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  1642. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  1643. type = Airespace AP - Learn IP address
  1644. on AP 10:bd:18:6d:78:20, slot 1, interface = 1, QOS = 2
  1645. IPv4 ACL ID = 255, IPv
  1646. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1647. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1648.  
  1649. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1650.  
  1651. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1652.  
  1653. *spamApTask6: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 10:bd:18:6d:78:20
  1654. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1655. *Dot1x_NW_MsgTask_2: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  1656. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  1657. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  1658. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  1659. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  1660. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  1661. type = Airespace AP - Learn IP address
  1662. on AP 10:bd:18:6d:78:20, slot 1, interface = 1, QOS = 2
  1663. IPv4 ACL ID = 255,
  1664. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1665. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1666.  
  1667. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1668.  
  1669. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1670.  
  1671. *apfReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1672. *pemReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1673. *pemReceiveTask: Feb 08 00:40:39.420: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1674. *DHCP Socket Task: Feb 08 00:40:39.638: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xf2159cf0)
  1675. *DHCP Socket Task: Feb 08 00:40:39.638: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  1676. *DHCP Socket Task: Feb 08 00:40:39.638: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  1677. *DHCP Socket Task: Feb 08 00:40:39.649: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xf2159cf0)
  1678. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  1679. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  1680. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xf2159cf0)
  1681. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a51a88 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  1682. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  1683. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  1684. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  1685. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  1686.  
  1687. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  1688. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1689. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1690. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  1691. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xf2159cf0)
  1692. *DHCP Socket Task: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a51a88 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  1693. *pemReceiveTask: Feb 08 00:40:39.650: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  1694. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1695. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  1696. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 10:bd:18:6d:78:2d
  1697. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  1698. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  1699. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  1700. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  1701. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:20:37:06:7c:10:bd
  1702. *apfMsConnTask_0: Feb 08 00:42:17.697: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  1703.  
  1704. *spamApTask1: Feb 08 00:42:17.738: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 20:37:06:7c:10:bd (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  1705. *spamApTask1: Feb 08 00:42:17.738: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  1706.  
  1707. *spamApTask1: Feb 08 00:42:17.738: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  1708. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1709.  
  1710. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  1711. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  1712. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:10:bd:18:6d:78:20-01 on apVapId 3
  1713. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1714. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1715. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1716. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1717. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  1718. *apfMsConnTask_5: Feb 08 00:42:17.739: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status Assoc denied unspecified) ApVapId 3 Slot 1
  1719. *osapiBsnTimer: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  1720. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Associated to Disassociated
  1721.  
  1722. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Disassociated to Disassociated
  1723.  
  1724. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 10:bd:18:6d:78:20-1 (reason 1, caller apf_ms.c:7614)
  1725. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 10:bd:18:6d:78:2d slot 1(caller apf_ms.c:7616)
  1726. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1727. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 Removing BSSID 10:bd:18:6d:78:2d from PMKID cache of station 64:b0:a6:c9:56:d2
  1728. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  1729. *apfReceiveTask: Feb 08 00:42:18.625: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  1730. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  1731. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  1732. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 20:37:06:7c:10:bd
  1733. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  1734. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  1735. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 10:bd:18:6d:78:20 from Disassociated to Idle
  1736.  
  1737. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  1738. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [10:bd:18:6d:78:20]
  1739. *apfReceiveTask: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 Deleting mobile on AP 10:bd:18:6d:78:20(1)
  1740. *spamApTask6: Feb 08 00:42:18.626: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.13:4289
  1741.  
  1742. *apfMsConnTask_5: Feb 08 00:44:59.168: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1743.  
  1744. *apfMsConnTask_5: Feb 08 00:44:59.168: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  1745. *apfMsConnTask_5: Feb 08 00:44:59.168: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  1746. *apfMsConnTask_5: Feb 08 00:44:59.168: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  1747. *apfMsConnTask_5: Feb 08 00:44:59.168: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  1748. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  1749.  
  1750. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 2
  1751.  
  1752. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  1753.  
  1754. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  1755. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  1756.  
  1757. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  1758.  
  1759. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  1760. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  1761. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  1762. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  1763. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  1764. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  1765. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  1766. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  1767. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  1768. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  1769. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  1770. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  1771. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  1772. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  1773. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  1774. *apfMsConnTask_5: Feb 08 00:44:59.169: RSNIE in Assoc. Req.: (20)
  1775.  
  1776. *apfMsConnTask_5: Feb 08 00:44:59.169: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  1777.  
  1778. *apfMsConnTask_5: Feb 08 00:44:59.169: [0016] ac 04 0c 00
  1779.  
  1780. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  1781. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  1782. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  1783. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  1784. *apfMsConnTask_5: Feb 08 00:44:59.169: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  1785.  
  1786. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  1787. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  1788. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  1789.  
  1790. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  1791.  
  1792. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  1793. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  1794. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1795. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  1796. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  1797. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  1798. *apfMsConnTask_5: Feb 08 00:44:59.171: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  1799.  
  1800. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  1801. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  1802. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  1803.  
  1804. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  1805. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1806. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1807. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1808. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1809. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  1810. *apfMsConnTask_5: Feb 08 00:44:59.172: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  1811.  
  1812. *spamApTask1: Feb 08 00:44:59.173: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  1813. *spamApTask1: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 54)
  1814. *spamApTask1: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  1815. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  1816. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  1817. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1818. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  1819. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  1820. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  1821. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: New PMKID: (16)
  1822.  
  1823. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  1824.  
  1825. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  1826. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  1827.  
  1828. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  1829. pmkValidTime:86390
  1830.  
  1831. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  1832.  
  1833. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  1834. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  1835. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  1836. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  1837. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  1838. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  1839. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1840.  
  1841. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1842. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  1843. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: Including PMKID in M1 (16)
  1844.  
  1845. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  1846.  
  1847. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: M1 - Key Data: (22)
  1848.  
  1849. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  1850.  
  1851. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: [0016] 5e 34 2f bf 3f 0b
  1852.  
  1853. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  1854. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1855. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  1856. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.175: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1857. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1858. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1859.  
  1860. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  1861. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  1862. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  1863. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  1864. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 00000010: 00 0f ac 04 0c 00 ......
  1865. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  1866. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  1867. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 00000020: 23 ff b9 2d 1d 43 #..-.C
  1868. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  1869. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  1870. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1871. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1872.  
  1873. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1874.  
  1875. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  1876. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  1877. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.180: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  1878. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  1879. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  1880.  
  1881. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  1882. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  1883. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  1884. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  1885. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  1886.  
  1887. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  1888.  
  1889. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  1890.  
  1891. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Building Client Payload:
  1892.  
  1893. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  1894.  
  1895. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  1896.  
  1897. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  1898.  
  1899. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  1900.  
  1901. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 ssid: IOS
  1902.  
  1903. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  1904.  
  1905. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  1906. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  1907. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  1908. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  1909.  
  1910. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  1911. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  1912. type = Airespace AP - Learn IP address
  1913. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  1914. IPv4 ACL ID = 255, IPv
  1915. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1916. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1917.  
  1918. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1919.  
  1920. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1921.  
  1922. *spamApTask1: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  1923. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1924. *Dot1x_NW_MsgTask_2: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  1925. *apfReceiveTask: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  1926. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  1927. *apfReceiveTask: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  1928. *apfReceiveTask: Feb 08 00:44:59.183: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  1929. *apfReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  1930. type = Airespace AP - Learn IP address
  1931. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  1932. IPv4 ACL ID = 255,
  1933. *apfReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  1934. *apfReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1935.  
  1936. *apfReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1937.  
  1938. *apfReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  1939.  
  1940. *apfReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  1941. *pemReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1942. *pemReceiveTask: Feb 08 00:44:59.184: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  1943. *DHCP Socket Task: Feb 08 00:44:59.499: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xf7159cf0)
  1944. *DHCP Socket Task: Feb 08 00:44:59.499: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  1945. *DHCP Socket Task: Feb 08 00:44:59.499: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  1946. *DHCP Socket Task: Feb 08 00:44:59.501: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xf7159cf0)
  1947. *DHCP Socket Task: Feb 08 00:44:59.501: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  1948. *DHCP Socket Task: Feb 08 00:44:59.501: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  1949. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xf7159cf0)
  1950. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a53878 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  1951. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  1952. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  1953. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  1954. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  1955.  
  1956. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  1957. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1958. *DHCP Socket Task: Feb 08 00:44:59.504: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  1959. *DHCP Socket Task: Feb 08 00:44:59.505: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  1960. *pemReceiveTask: Feb 08 00:44:59.505: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  1961. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 Got action frame from this client.
  1962. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  1963. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 20:37:06:7c:10:bd
  1964. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  1965. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  1966. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  1967. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  1968. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:64:d8:14:1e:e8:8d
  1969. *apfMsConnTask_5: Feb 08 00:54:33.618: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  1970.  
  1971. *spamApTask5: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 64:d8:14:1e:e8:8d (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  1972. *spamApTask5: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  1973.  
  1974. *spamApTask5: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  1975. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  1976.  
  1977. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  1978. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  1979. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  1980. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  1981. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  1982. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  1983. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  1984. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  1985. *apfMsConnTask_6: Feb 08 00:54:33.655: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status Assoc denied unspecified) ApVapId 3 Slot 1
  1986. *osapiBsnTimer: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  1987. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  1988.  
  1989. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  1990.  
  1991. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  1992. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  1993. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  1994. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  1995. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  1996. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  1997. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  1998. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  1999. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 64:d8:14:1e:e8:8d
  2000. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  2001. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  2002. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  2003.  
  2004. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  2005. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  2006. *apfReceiveTask: Feb 08 00:54:34.577: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
  2007. *spamApTask1: Feb 08 00:54:34.578: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.12:12973
  2008.  
  2009. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  2010.  
  2011. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  2012. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 64:d8:14:1e:e8:80(1)
  2013. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 64:d8:14:1e:e8:8d AP APd867.d99c.f685
  2014. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 64:D8:14:1E:E8:80
  2015. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  2016.  
  2017. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 1
  2018.  
  2019. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  2020.  
  2021. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  2022. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  2023.  
  2024. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  2025.  
  2026. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  2027. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  2028. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  2029. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  2030. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  2031. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  2032. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  2033. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  2034. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  2035. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  2036. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  2037. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  2038. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  2039. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  2040. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  2041. *apfMsConnTask_6: Feb 08 00:56:03.778: RSNIE in Assoc. Req.: (20)
  2042.  
  2043. *apfMsConnTask_6: Feb 08 00:56:03.778: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  2044.  
  2045. *apfMsConnTask_6: Feb 08 00:56:03.778: [0016] ac 04 0c 00
  2046.  
  2047. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  2048. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  2049. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  2050. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  2051. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  2052.  
  2053. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 64:d8:14:1e:e8:80 - AID ===> 1
  2054. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  2055. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  2056.  
  2057. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  2058.  
  2059. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  2060. *apfMsConnTask_6: Feb 08 00:56:03.778: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  2061. *apfMsConnTask_6: Feb 08 00:56:03.779: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  2062. *apfMsConnTask_6: Feb 08 00:56:03.779: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  2063. *apfMsConnTask_6: Feb 08 00:56:03.779: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  2064. *apfMsConnTask_6: Feb 08 00:56:03.779: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  2065. *apfMsConnTask_6: Feb 08 00:56:03.779: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Idle to Associated
  2066.  
  2067. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  2068. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  2069. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  2070.  
  2071. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  2072. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  2073. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  2074. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  2075. *apfMsConnTask_6: Feb 08 00:56:03.780: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  2076. *apfMsConnTask_6: Feb 08 00:56:03.781: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status 0) ApVapId 3 Slot 1
  2077. *apfMsConnTask_6: Feb 08 00:56:03.781: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Associated
  2078.  
  2079. *spamApTask5: Feb 08 00:56:03.781: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  2080. *spamApTask5: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 3)
  2081. *spamApTask5: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  2082. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  2083. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  2084. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  2085. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  2086. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  2087. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Adding BSSID 64:d8:14:1e:e8:8d to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  2088. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: New PMKID: (16)
  2089.  
  2090. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  2091.  
  2092. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  2093. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  2094.  
  2095. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  2096. pmkValidTime:86423
  2097.  
  2098. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  2099.  
  2100. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  2101. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  2102. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  2103. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  2104. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  2105. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  2106. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2107.  
  2108. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  2109. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  2110. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: Including PMKID in M1 (16)
  2111.  
  2112. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  2113.  
  2114. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: M1 - Key Data: (22)
  2115.  
  2116. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: [0000] dd 14 00 0f ac 04 c2 1b fc c9 10 63 b8 3e cc 98
  2117.  
  2118. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: [0016] 1a 53 12 c2 b1 3e
  2119.  
  2120. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  2121. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2122. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  2123. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.783: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2124. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2125. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2126.  
  2127. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  2128. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  2129. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  2130. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  2131. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 00000010: 00 0f ac 04 0c 00 ......
  2132. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  2133. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  2134. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 00000020: 23 ff b9 2d 1d 43 #..-.C
  2135. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  2136. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  2137. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2138. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2139.  
  2140. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2141.  
  2142. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2143. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  2144. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.787: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2145. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.789: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2146. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2147.  
  2148. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  2149. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2150. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2151. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  2152. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  2153.  
  2154. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  2155.  
  2156. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  2157.  
  2158. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Building Client Payload:
  2159.  
  2160. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  2161.  
  2162. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  2163.  
  2164. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  2165.  
  2166. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  2167.  
  2168. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 ssid: IOS
  2169.  
  2170. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  2171.  
  2172. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  2173. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  2174. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  2175. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  2176.  
  2177. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  2178. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  2179. type = Airespace AP - Learn IP address
  2180. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  2181. IPv4 ACL ID = 255, IPv
  2182. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  2183. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2184.  
  2185. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2186.  
  2187. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2188.  
  2189. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  2190. *Dot1x_NW_MsgTask_2: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  2191. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  2192. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  2193. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  2194. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  2195. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  2196. type = Airespace AP - Learn IP address
  2197. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  2198. IPv4 ACL ID = 255,
  2199. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  2200. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2201.  
  2202. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2203.  
  2204. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2205.  
  2206. *apfReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  2207. *pemReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  2208. *pemReceiveTask: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  2209. *spamApTask5: Feb 08 00:56:03.790: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  2210. *DHCP Socket Task: Feb 08 00:56:03.942: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xfa159cf0)
  2211. *DHCP Socket Task: Feb 08 00:56:03.942: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  2212. *DHCP Socket Task: Feb 08 00:56:03.942: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  2213. *DHCP Socket Task: Feb 08 00:56:03.945: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xfa159cf0)
  2214. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  2215. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  2216. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xfa159cf0)
  2217. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a55668 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  2218. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  2219. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  2220. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  2221. *DHCP Socket Task: Feb 08 00:56:03.952: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  2222.  
  2223. *pemReceiveTask: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  2224. *DHCP Socket Task: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  2225. *DHCP Socket Task: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  2226. *DHCP Socket Task: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  2227. *DHCP Socket Task: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  2228. *DHCP Socket Task: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xfa159cf0)
  2229. *DHCP Socket Task: Feb 08 00:56:03.953: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a55668 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  2230. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 Got action frame from this client.
  2231. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  2232. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 64:d8:14:1e:e8:8d
  2233. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  2234. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  2235. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  2236. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  2237. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:20:37:06:7c:10:bd
  2238. *apfMsConnTask_6: Feb 08 01:20:07.600: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  2239.  
  2240. *spamApTask1: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 20:37:06:7c:10:bd (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  2241. *spamApTask1: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  2242.  
  2243. *spamApTask1: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  2244. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  2245.  
  2246. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  2247. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  2248. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  2249. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  2250. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  2251. *apfMsConnTask_5: Feb 08 01:20:07.637: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  2252. *apfMsConnTask_5: Feb 08 01:20:07.638: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  2253. *apfMsConnTask_5: Feb 08 01:20:07.638: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  2254. *apfMsConnTask_5: Feb 08 01:20:07.638: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status Assoc denied unspecified) ApVapId 3 Slot 1
  2255. *osapiBsnTimer: Feb 08 01:20:08.632: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  2256. *apfReceiveTask: Feb 08 01:20:08.632: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Disassociated
  2257.  
  2258. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Disassociated
  2259.  
  2260. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 64:d8:14:1e:e8:80-1 (reason 1, caller apf_ms.c:7614)
  2261. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 64:d8:14:1e:e8:8d slot 1(caller apf_ms.c:7616)
  2262. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  2263. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Removing BSSID 64:d8:14:1e:e8:8d from PMKID cache of station 64:b0:a6:c9:56:d2
  2264. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  2265. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  2266. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  2267. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  2268. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 20:37:06:7c:10:bd
  2269. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  2270. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  2271. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Idle
  2272.  
  2273. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  2274. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [64:d8:14:1e:e8:80]
  2275. *apfReceiveTask: Feb 08 01:20:08.633: 64:b0:a6:c9:56:d2 Deleting mobile on AP 64:d8:14:1e:e8:80(1)
  2276. *spamApTask5: Feb 08 01:20:08.634: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.11:53098
  2277.  
  2278. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  2279.  
  2280. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  2281. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  2282. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  2283. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  2284. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  2285.  
  2286. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 2
  2287.  
  2288. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  2289.  
  2290. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  2291. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  2292.  
  2293. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  2294.  
  2295. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  2296. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  2297. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  2298. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  2299. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  2300. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  2301. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  2302. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  2303. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  2304. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  2305. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  2306. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  2307. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  2308. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  2309. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  2310. *apfMsConnTask_5: Feb 08 01:22:35.677: RSNIE in Assoc. Req.: (20)
  2311.  
  2312. *apfMsConnTask_5: Feb 08 01:22:35.677: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  2313.  
  2314. *apfMsConnTask_5: Feb 08 01:22:35.677: [0016] ac 04 0c 00
  2315.  
  2316. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  2317. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  2318. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  2319. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  2320. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  2321.  
  2322. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  2323. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  2324. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  2325.  
  2326. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  2327.  
  2328. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  2329. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  2330. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  2331. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  2332. *apfMsConnTask_5: Feb 08 01:22:35.677: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  2333. *apfMsConnTask_5: Feb 08 01:22:35.678: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  2334. *apfMsConnTask_5: Feb 08 01:22:35.678: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  2335.  
  2336. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  2337. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  2338. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  2339.  
  2340. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  2341. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  2342. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  2343. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  2344. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  2345. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  2346. *apfMsConnTask_5: Feb 08 01:22:35.680: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  2347.  
  2348. *spamApTask1: Feb 08 01:22:35.681: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  2349. *spamApTask1: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 61)
  2350. *spamApTask1: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  2351. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  2352. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  2353. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  2354. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  2355. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  2356. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  2357. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: New PMKID: (16)
  2358.  
  2359. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  2360.  
  2361. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.683: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  2362. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  2363.  
  2364. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  2365. pmkValidTime:86398
  2366.  
  2367. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  2368.  
  2369. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  2370. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  2371. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  2372. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  2373. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  2374. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  2375. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2376.  
  2377. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  2378. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  2379. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: Including PMKID in M1 (16)
  2380.  
  2381. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  2382.  
  2383. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: M1 - Key Data: (22)
  2384.  
  2385. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  2386.  
  2387. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: [0016] 5e 34 2f bf 3f 0b
  2388.  
  2389. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  2390. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2391. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  2392. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.684: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2393. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2394. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2395.  
  2396. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  2397. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  2398. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  2399. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  2400. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 00000010: 00 0f ac 04 0c 00 ......
  2401. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  2402. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  2403. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 00000020: 23 ff b9 2d 1d 43 #..-.C
  2404. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  2405. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  2406. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2407. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2408.  
  2409. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2410.  
  2411. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2412. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  2413. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.688: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2414. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2415. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2416.  
  2417. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  2418. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2419. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2420. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  2421. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  2422.  
  2423. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  2424.  
  2425. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  2426.  
  2427. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Building Client Payload:
  2428.  
  2429. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  2430.  
  2431. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  2432.  
  2433. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  2434.  
  2435. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  2436.  
  2437. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 ssid: IOS
  2438.  
  2439. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  2440.  
  2441. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  2442. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  2443. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  2444. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.690: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  2445.  
  2446. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  2447. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  2448. type = Airespace AP - Learn IP address
  2449. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  2450. IPv4 ACL ID = 255, IPv
  2451. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  2452. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2453.  
  2454. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2455.  
  2456. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2457.  
  2458. *spamApTask1: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  2459. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  2460. *Dot1x_NW_MsgTask_2: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  2461. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  2462. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  2463. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  2464. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  2465. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  2466. type = Airespace AP - Learn IP address
  2467. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  2468. IPv4 ACL ID = 255,
  2469. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  2470. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2471.  
  2472. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2473.  
  2474. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2475.  
  2476. *apfReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  2477. *pemReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  2478. *pemReceiveTask: Feb 08 01:22:35.691: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  2479. *DHCP Socket Task: Feb 08 01:22:35.784: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xff159cf0)
  2480. *DHCP Socket Task: Feb 08 01:22:35.784: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  2481. *DHCP Socket Task: Feb 08 01:22:35.784: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  2482. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xff159cf0)
  2483. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  2484. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  2485. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xff159cf0)
  2486. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a57458 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  2487. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  2488. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  2489. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  2490. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  2491.  
  2492. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  2493. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  2494. *DHCP Socket Task: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  2495. *pemReceiveTask: Feb 08 01:22:35.790: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  2496. *DHCP Socket Task: Feb 08 01:22:35.793: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  2497. *DHCP Socket Task: Feb 08 01:22:35.793: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0xff159cf0)
  2498. *DHCP Socket Task: Feb 08 01:22:35.793: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a57458 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  2499. *apfMsConnTask_5: Feb 08 01:44:27.089: 64:b0:a6:c9:56:d2 Got action frame from this client.
  2500. *dot1xMsgTask: Feb 08 01:44:51.097: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2501.  
  2502. *dot1xMsgTask: Feb 08 01:44:51.097: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2503. *dot1xMsgTask: Feb 08 01:44:51.097: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2504.  
  2505. *dot1xMsgTask: Feb 08 01:44:51.097: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2506. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
  2507. *dot1xMsgTask: Feb 08 01:44:51.097: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2508. *dot1xMsgTask: Feb 08 01:44:51.097: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2509. *Dot1x_NW_MsgTask_2: Feb 08 01:44:51.616: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2510. *Dot1x_NW_MsgTask_2: Feb 08 01:44:51.616: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2511.  
  2512. *Dot1x_NW_MsgTask_2: Feb 08 01:44:51.616: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2513. *Dot1x_NW_MsgTask_2: Feb 08 01:44:51.616: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2514. *Dot1x_NW_MsgTask_2: Feb 08 01:44:51.616: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2515. *apfMsConnTask_5: Feb 08 01:45:06.394: 64:b0:a6:c9:56:d2 Got action frame from this client.
  2516. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 Got action frame from this client.
  2517. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  2518. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 20:37:06:7c:10:bd
  2519. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  2520. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  2521. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  2522. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  2523. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:64:d8:14:1e:e8:8d
  2524. *apfMsConnTask_5: Feb 08 01:45:10.171: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  2525.  
  2526. *spamApTask5: Feb 08 01:45:10.204: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 64:d8:14:1e:e8:8d (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  2527. *spamApTask5: Feb 08 01:45:10.204: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  2528.  
  2529. *spamApTask5: Feb 08 01:45:10.204: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  2530. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  2531.  
  2532. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  2533. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  2534. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  2535. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  2536. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  2537. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  2538. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  2539. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  2540. *apfMsConnTask_6: Feb 08 01:45:10.206: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status Assoc denied unspecified) ApVapId 3 Slot 1
  2541. *osapiBsnTimer: Feb 08 01:45:11.164: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  2542. *apfReceiveTask: Feb 08 01:45:11.165: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  2543.  
  2544. *apfReceiveTask: Feb 08 01:45:11.165: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  2545.  
  2546. *apfReceiveTask: Feb 08 01:45:11.165: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  2547. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  2548. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  2549. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  2550. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  2551. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  2552. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  2553. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  2554. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 64:d8:14:1e:e8:8d
  2555. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  2556. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  2557. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  2558.  
  2559. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  2560. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  2561. *apfReceiveTask: Feb 08 01:45:11.166: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
  2562. *spamApTask1: Feb 08 01:45:11.167: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.12:12973
  2563.  
  2564. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  2565.  
  2566. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  2567. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 64:d8:14:1e:e8:80(1)
  2568. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 64:d8:14:1e:e8:8d AP APd867.d99c.f685
  2569. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 64:D8:14:1E:E8:80
  2570. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  2571.  
  2572. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 0
  2573.  
  2574. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  2575.  
  2576. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  2577. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  2578.  
  2579. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  2580.  
  2581. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  2582. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  2583. *apfMsConnTask_6: Feb 08 01:45:33.319: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  2584. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  2585. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  2586. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  2587. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  2588. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  2589. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  2590. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  2591. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  2592. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  2593. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  2594. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  2595. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  2596. *apfMsConnTask_6: Feb 08 01:45:33.320: RSNIE in Assoc. Req.: (20)
  2597.  
  2598. *apfMsConnTask_6: Feb 08 01:45:33.320: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  2599.  
  2600. *apfMsConnTask_6: Feb 08 01:45:33.320: [0016] ac 04 0c 00
  2601.  
  2602. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  2603. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  2604. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  2605. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  2606. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  2607.  
  2608. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 64:d8:14:1e:e8:80 - AID ===> 1
  2609. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  2610. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  2611.  
  2612. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  2613.  
  2614. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  2615. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  2616. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  2617. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  2618. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  2619. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  2620. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Idle to Associated
  2621.  
  2622. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  2623. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  2624. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  2625.  
  2626. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  2627. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  2628. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  2629. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  2630. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  2631. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status 0) ApVapId 3 Slot 1
  2632. *apfMsConnTask_6: Feb 08 01:45:33.320: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Associated
  2633.  
  2634. *spamApTask5: Feb 08 01:45:33.322: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  2635. *spamApTask5: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 26)
  2636. *spamApTask5: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  2637. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  2638. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  2639. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  2640. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  2641. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  2642. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Adding BSSID 64:d8:14:1e:e8:8d to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  2643. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: New PMKID: (16)
  2644.  
  2645. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  2646.  
  2647. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.324: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  2648. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  2649.  
  2650. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  2651. pmkValidTime:86384
  2652.  
  2653. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  2654.  
  2655. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  2656. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  2657. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  2658. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  2659. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  2660. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  2661. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2662.  
  2663. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  2664. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  2665. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: Including PMKID in M1 (16)
  2666.  
  2667. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  2668.  
  2669. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: M1 - Key Data: (22)
  2670.  
  2671. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: [0000] dd 14 00 0f ac 04 c2 1b fc c9 10 63 b8 3e cc 98
  2672.  
  2673. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: [0016] 1a 53 12 c2 b1 3e
  2674.  
  2675. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  2676. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2677. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  2678. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.325: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2679. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.327: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2680. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.327: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2681.  
  2682. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.327: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  2683. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.327: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  2684. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.327: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  2685. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  2686. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 00000010: 00 0f ac 04 0c 00 ......
  2687. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  2688. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  2689. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 00000020: 23 ff b9 2d 1d 43 #..-.C
  2690. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  2691. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  2692. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2693. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2694.  
  2695. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2696.  
  2697. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2698. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  2699. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.328: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2700. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2701. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2702.  
  2703. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  2704. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2705. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2706. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  2707. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  2708.  
  2709. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  2710.  
  2711. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  2712.  
  2713. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Building Client Payload:
  2714.  
  2715. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  2716.  
  2717. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  2718.  
  2719. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  2720.  
  2721. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  2722.  
  2723. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 ssid: IOS
  2724.  
  2725. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  2726.  
  2727. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  2728. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  2729. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  2730. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  2731.  
  2732. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  2733. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  2734. type = Airespace AP - Learn IP address
  2735. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  2736. IPv4 ACL ID = 255, IPv
  2737. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  2738. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2739.  
  2740. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2741.  
  2742. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2743.  
  2744. *spamApTask5: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  2745. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  2746. *Dot1x_NW_MsgTask_2: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  2747. *apfReceiveTask: Feb 08 01:45:33.331: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  2748. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  2749. *apfReceiveTask: Feb 08 01:45:33.333: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  2750. *apfReceiveTask: Feb 08 01:45:33.333: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  2751. *apfReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  2752. type = Airespace AP - Learn IP address
  2753. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  2754. IPv4 ACL ID = 255,
  2755. *apfReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  2756. *apfReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2757.  
  2758. *apfReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2759.  
  2760. *apfReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  2761.  
  2762. *apfReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  2763. *pemReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  2764. *pemReceiveTask: Feb 08 01:45:33.334: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  2765. *DHCP Socket Task: Feb 08 01:45:33.426: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0x2169cf0)
  2766. *DHCP Socket Task: Feb 08 01:45:33.426: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  2767. *DHCP Socket Task: Feb 08 01:45:33.426: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  2768. *DHCP Socket Task: Feb 08 01:45:33.434: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0x2169cf0)
  2769. *DHCP Socket Task: Feb 08 01:45:33.434: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  2770. *DHCP Socket Task: Feb 08 01:45:33.434: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  2771. *DHCP Socket Task: Feb 08 01:45:33.436: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0x2169cf0)
  2772. *DHCP Socket Task: Feb 08 01:45:33.436: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a59248 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  2773. *DHCP Socket Task: Feb 08 01:45:33.436: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  2774. *DHCP Socket Task: Feb 08 01:45:33.436: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  2775. *DHCP Socket Task: Feb 08 01:45:33.436: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  2776. *DHCP Socket Task: Feb 08 01:45:33.436: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  2777.  
  2778. *DHCP Socket Task: Feb 08 01:45:33.437: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  2779. *DHCP Socket Task: Feb 08 01:45:33.437: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  2780. *DHCP Socket Task: Feb 08 01:45:33.437: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  2781. *DHCP Socket Task: Feb 08 01:45:33.437: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  2782. *pemReceiveTask: Feb 08 01:45:33.437: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  2783. *dot1xMsgTask: Feb 08 01:56:09.461: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2784.  
  2785. *dot1xMsgTask: Feb 08 01:56:09.461: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2786. *dot1xMsgTask: Feb 08 01:56:09.461: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2787.  
  2788. *dot1xMsgTask: Feb 08 01:56:09.461: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2789. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
  2790. *dot1xMsgTask: Feb 08 01:56:09.461: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2791. *dot1xMsgTask: Feb 08 01:56:09.461: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2792. *Dot1x_NW_MsgTask_2: Feb 08 01:56:09.513: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2793. *Dot1x_NW_MsgTask_2: Feb 08 01:56:09.513: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2794.  
  2795. *Dot1x_NW_MsgTask_2: Feb 08 01:56:09.513: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2796. *Dot1x_NW_MsgTask_2: Feb 08 01:56:09.513: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2797. *Dot1x_NW_MsgTask_2: Feb 08 01:56:09.513: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2798. *dot1xMsgTask: Feb 08 02:57:38.192: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2799.  
  2800. *dot1xMsgTask: Feb 08 02:57:38.192: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2801. *dot1xMsgTask: Feb 08 02:57:38.192: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2802.  
  2803. *dot1xMsgTask: Feb 08 02:57:38.192: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2804. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.03
  2805. *dot1xMsgTask: Feb 08 02:57:38.192: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2806. *dot1xMsgTask: Feb 08 02:57:38.192: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2807. *Dot1x_NW_MsgTask_2: Feb 08 02:57:38.269: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2808. *Dot1x_NW_MsgTask_2: Feb 08 02:57:38.269: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2809.  
  2810. *Dot1x_NW_MsgTask_2: Feb 08 02:57:38.269: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2811. *Dot1x_NW_MsgTask_2: Feb 08 02:57:38.269: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2812. *Dot1x_NW_MsgTask_2: Feb 08 02:57:38.269: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2813. *dot1xMsgTask: Feb 08 03:58:55.495: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2814.  
  2815. *dot1xMsgTask: Feb 08 03:58:55.495: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2816. *dot1xMsgTask: Feb 08 03:58:55.495: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2817.  
  2818. *dot1xMsgTask: Feb 08 03:58:55.495: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2819. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.04
  2820. *dot1xMsgTask: Feb 08 03:58:55.495: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2821. *dot1xMsgTask: Feb 08 03:58:55.495: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2822. *osapiBsnTimer: Feb 08 03:58:56.719: 64:b0:a6:c9:56:d2 802.1x 'timeoutEvt' Timer expired for station 64:b0:a6:c9:56:d2 and for message = M5
  2823. *Dot1x_NW_MsgTask_2: Feb 08 03:58:56.719: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2824.  
  2825. *Dot1x_NW_MsgTask_2: Feb 08 03:58:56.719: 64:b0:a6:c9:56:d2 Retransmit 1 of EAPOL-Key M5 (length 131) for mobile 64:b0:a6:c9:56:d2
  2826. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2827. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2828.  
  2829. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2830. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 EAPOL Key message with invalid authenticator replay counter
  2831. got 00 00 00 00 00 00 00 04
  2832. expected 00 00 00 00 00 00 00 05
  2833. from mobile 64:b0:a6:c9:56:d2
  2834. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2835. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2836.  
  2837. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2838. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2839. *Dot1x_NW_MsgTask_2: Feb 08 03:58:57.416: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2840. *dot1xMsgTask: Feb 08 05:00:03.291: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2841.  
  2842. *dot1xMsgTask: Feb 08 05:00:03.291: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2843. *dot1xMsgTask: Feb 08 05:00:03.291: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2844.  
  2845. *dot1xMsgTask: Feb 08 05:00:03.291: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2846. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.06
  2847. *dot1xMsgTask: Feb 08 05:00:03.291: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2848. *dot1xMsgTask: Feb 08 05:00:03.291: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2849. *osapiBsnTimer: Feb 08 05:00:04.490: 64:b0:a6:c9:56:d2 802.1x 'timeoutEvt' Timer expired for station 64:b0:a6:c9:56:d2 and for message = M5
  2850. *Dot1x_NW_MsgTask_2: Feb 08 05:00:04.490: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2851.  
  2852. *Dot1x_NW_MsgTask_2: Feb 08 05:00:04.490: 64:b0:a6:c9:56:d2 Retransmit 1 of EAPOL-Key M5 (length 131) for mobile 64:b0:a6:c9:56:d2
  2853. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2854. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2855.  
  2856. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2857. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 EAPOL Key message with invalid authenticator replay counter
  2858. got 00 00 00 00 00 00 00 06
  2859. expected 00 00 00 00 00 00 00 07
  2860. from mobile 64:b0:a6:c9:56:d2
  2861. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2862. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2863.  
  2864. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2865. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.177: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2866. *Dot1x_NW_MsgTask_2: Feb 08 05:00:05.178: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2867. *dot1xMsgTask: Feb 08 06:01:20.518: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2868.  
  2869. *dot1xMsgTask: Feb 08 06:01:20.518: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2870. *dot1xMsgTask: Feb 08 06:01:20.518: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2871.  
  2872. *dot1xMsgTask: Feb 08 06:01:20.518: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2873. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.08
  2874. *dot1xMsgTask: Feb 08 06:01:20.518: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2875. *dot1xMsgTask: Feb 08 06:01:20.518: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2876. *Dot1x_NW_MsgTask_2: Feb 08 06:01:20.667: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2877. *Dot1x_NW_MsgTask_2: Feb 08 06:01:20.667: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2878.  
  2879. *Dot1x_NW_MsgTask_2: Feb 08 06:01:20.667: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2880. *Dot1x_NW_MsgTask_2: Feb 08 06:01:20.667: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2881. *Dot1x_NW_MsgTask_2: Feb 08 06:01:20.667: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2882. *dot1xMsgTask: Feb 08 07:02:07.141: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2883.  
  2884. *dot1xMsgTask: Feb 08 07:02:07.141: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2885. *dot1xMsgTask: Feb 08 07:02:07.141: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2886.  
  2887. *dot1xMsgTask: Feb 08 07:02:07.141: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2888. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.09
  2889. *dot1xMsgTask: Feb 08 07:02:07.141: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2890. *dot1xMsgTask: Feb 08 07:02:07.141: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2891. *osapiBsnTimer: Feb 08 07:02:08.365: 64:b0:a6:c9:56:d2 802.1x 'timeoutEvt' Timer expired for station 64:b0:a6:c9:56:d2 and for message = M5
  2892. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.365: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2893.  
  2894. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.365: 64:b0:a6:c9:56:d2 Retransmit 1 of EAPOL-Key M5 (length 131) for mobile 64:b0:a6:c9:56:d2
  2895. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2896. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2897.  
  2898. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2899. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 EAPOL Key message with invalid authenticator replay counter
  2900. got 00 00 00 00 00 00 00 09
  2901. expected 00 00 00 00 00 00 00 0a
  2902. from mobile 64:b0:a6:c9:56:d2
  2903. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2904. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2905.  
  2906. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2907. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2908. *Dot1x_NW_MsgTask_2: Feb 08 07:02:08.895: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2909. *dot1xMsgTask: Feb 08 08:03:38.149: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2910.  
  2911. *dot1xMsgTask: Feb 08 08:03:38.149: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2912. *dot1xMsgTask: Feb 08 08:03:38.149: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2913.  
  2914. *dot1xMsgTask: Feb 08 08:03:38.149: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2915. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.0b
  2916. *dot1xMsgTask: Feb 08 08:03:38.149: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2917. *dot1xMsgTask: Feb 08 08:03:38.149: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2918. *Dot1x_NW_MsgTask_2: Feb 08 08:03:38.800: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2919. *Dot1x_NW_MsgTask_2: Feb 08 08:03:38.800: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2920.  
  2921. *Dot1x_NW_MsgTask_2: Feb 08 08:03:38.800: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2922. *Dot1x_NW_MsgTask_2: Feb 08 08:03:38.800: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2923. *Dot1x_NW_MsgTask_2: Feb 08 08:03:38.800: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2924. *dot1xMsgTask: Feb 08 09:05:01.784: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2925.  
  2926. *dot1xMsgTask: Feb 08 09:05:01.784: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2927. *dot1xMsgTask: Feb 08 09:05:01.784: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2928.  
  2929. *dot1xMsgTask: Feb 08 09:05:01.784: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2930. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.0c
  2931. *dot1xMsgTask: Feb 08 09:05:01.784: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2932. *dot1xMsgTask: Feb 08 09:05:01.784: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2933. *Dot1x_NW_MsgTask_2: Feb 08 09:05:02.019: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2934. *Dot1x_NW_MsgTask_2: Feb 08 09:05:02.019: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2935.  
  2936. *Dot1x_NW_MsgTask_2: Feb 08 09:05:02.019: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2937. *Dot1x_NW_MsgTask_2: Feb 08 09:05:02.019: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2938. *Dot1x_NW_MsgTask_2: Feb 08 09:05:02.019: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2939. *dot1xMsgTask: Feb 08 10:05:48.684: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2940.  
  2941. *dot1xMsgTask: Feb 08 10:05:48.684: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2942. *dot1xMsgTask: Feb 08 10:05:48.684: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2943.  
  2944. *dot1xMsgTask: Feb 08 10:05:48.684: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2945. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.0d
  2946. *dot1xMsgTask: Feb 08 10:05:48.684: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2947. *dot1xMsgTask: Feb 08 10:05:48.684: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2948. *osapiBsnTimer: Feb 08 10:05:49.899: 64:b0:a6:c9:56:d2 802.1x 'timeoutEvt' Timer expired for station 64:b0:a6:c9:56:d2 and for message = M5
  2949. *Dot1x_NW_MsgTask_2: Feb 08 10:05:49.899: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2950.  
  2951. *Dot1x_NW_MsgTask_2: Feb 08 10:05:49.899: 64:b0:a6:c9:56:d2 Retransmit 1 of EAPOL-Key M5 (length 131) for mobile 64:b0:a6:c9:56:d2
  2952. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.247: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2953. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.247: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2954.  
  2955. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.247: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2956. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.247: 64:b0:a6:c9:56:d2 EAPOL Key message with invalid authenticator replay counter
  2957. got 00 00 00 00 00 00 00 0d
  2958. expected 00 00 00 00 00 00 00 0e
  2959. from mobile 64:b0:a6:c9:56:d2
  2960. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.248: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2961. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.248: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2962.  
  2963. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.248: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2964. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.248: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2965. *Dot1x_NW_MsgTask_2: Feb 08 10:05:50.248: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2966. *dot1xMsgTask: Feb 08 11:07:22.695: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2967.  
  2968. *dot1xMsgTask: Feb 08 11:07:22.695: 64:b0:a6:c9:56:d2 Key exchange done, data packets from mobile 64:b0:a6:c9:56:d2 should be forwarded shortly
  2969. *dot1xMsgTask: Feb 08 11:07:22.695: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2970.  
  2971. *dot1xMsgTask: Feb 08 11:07:22.695: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  2972. state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.0f
  2973. *dot1xMsgTask: Feb 08 11:07:22.695: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  2974. *dot1xMsgTask: Feb 08 11:07:22.695: 64:b0:a6:c9:56:d2 Updated broadcast key sent to mobile 64:B0:A6:C9:56:D2
  2975. *Dot1x_NW_MsgTask_2: Feb 08 11:07:22.972: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  2976. *Dot1x_NW_MsgTask_2: Feb 08 11:07:22.972: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  2977.  
  2978. *Dot1x_NW_MsgTask_2: Feb 08 11:07:22.972: 64:b0:a6:c9:56:d2 Received EAPOL-key in REKEYNEGOTIATING state (message 6) from mobile 64:b0:a6:c9:56:d2
  2979. *Dot1x_NW_MsgTask_2: Feb 08 11:07:22.972: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  2980. *Dot1x_NW_MsgTask_2: Feb 08 11:07:22.972: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  2981. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 Got action frame from this client.
  2982. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  2983. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 64:d8:14:1e:e8:8d
  2984. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  2985. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  2986. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  2987. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  2988. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:20:37:06:7c:10:bd
  2989. *apfMsConnTask_6: Feb 08 12:05:44.566: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  2990.  
  2991. *spamApTask1: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 20:37:06:7c:10:bd (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  2992. *spamApTask1: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  2993.  
  2994. *spamApTask1: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  2995. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  2996.  
  2997. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  2998. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  2999. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  3000. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3001. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3002. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3003. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3004. *apfMsConnTask_5: Feb 08 12:05:44.606: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  3005. *apfMsConnTask_5: Feb 08 12:05:44.607: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status Assoc denied unspecified) ApVapId 3 Slot 1
  3006. *osapiBsnTimer: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  3007. *apfReceiveTask: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Disassociated
  3008.  
  3009. *apfReceiveTask: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Disassociated
  3010.  
  3011. *apfReceiveTask: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 64:d8:14:1e:e8:80-1 (reason 1, caller apf_ms.c:7614)
  3012. *apfReceiveTask: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 64:d8:14:1e:e8:8d slot 1(caller apf_ms.c:7616)
  3013. *apfReceiveTask: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3014. *apfReceiveTask: Feb 08 12:05:45.442: 64:b0:a6:c9:56:d2 Removing BSSID 64:d8:14:1e:e8:8d from PMKID cache of station 64:b0:a6:c9:56:d2
  3015. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  3016. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  3017. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  3018. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  3019. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 20:37:06:7c:10:bd
  3020. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  3021. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  3022. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Idle
  3023.  
  3024. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  3025. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [64:d8:14:1e:e8:80]
  3026. *apfReceiveTask: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 Deleting mobile on AP 64:d8:14:1e:e8:80(1)
  3027. *spamApTask5: Feb 08 12:05:45.443: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.11:53098
  3028.  
  3029. *apfMsConnTask_5: Feb 08 12:05:50.893: 64:b0:a6:c9:56:d2 Got action frame from this client.
  3030. *apfMsConnTask_5: Feb 08 12:05:50.893: 64:b0:a6:c9:56:d2 no PMK cache entry for this client. Can't do preauth.
  3031. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  3032.  
  3033. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  3034. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  3035. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  3036. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  3037. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  3038.  
  3039. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 1
  3040.  
  3041. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  3042.  
  3043. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  3044. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  3045.  
  3046. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  3047.  
  3048. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  3049. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  3050. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  3051. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  3052. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  3053. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  3054. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  3055. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  3056. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  3057. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  3058. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  3059. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  3060. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  3061. *apfMsConnTask_5: Feb 08 12:06:24.958: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  3062. *apfMsConnTask_5: Feb 08 12:06:24.959: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  3063. *apfMsConnTask_5: Feb 08 12:06:24.959: RSNIE in Assoc. Req.: (20)
  3064.  
  3065. *apfMsConnTask_5: Feb 08 12:06:24.959: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  3066.  
  3067. *apfMsConnTask_5: Feb 08 12:06:24.959: [0016] ac 04 0c 00
  3068.  
  3069. *apfMsConnTask_5: Feb 08 12:06:24.959: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  3070. *apfMsConnTask_5: Feb 08 12:06:24.959: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  3071. *apfMsConnTask_5: Feb 08 12:06:24.959: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  3072. *apfMsConnTask_5: Feb 08 12:06:24.959: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  3073. *apfMsConnTask_5: Feb 08 12:06:24.959: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  3074.  
  3075. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  3076. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  3077. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  3078.  
  3079. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  3080.  
  3081. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  3082. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  3083. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3084. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3085. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  3086. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  3087. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  3088.  
  3089. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  3090. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  3091. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  3092.  
  3093. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  3094. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3095. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3096. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3097. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3098. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  3099. *apfMsConnTask_5: Feb 08 12:06:24.960: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  3100.  
  3101. *spamApTask1: Feb 08 12:06:24.961: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3102. *spamApTask1: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 1)
  3103. *spamApTask1: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  3104. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  3105. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  3106. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3107. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  3108. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  3109. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  3110. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: New PMKID: (16)
  3111.  
  3112. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  3113.  
  3114. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  3115. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  3116.  
  3117. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  3118. pmkValidTime:86386
  3119.  
  3120. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  3121.  
  3122. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  3123. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  3124. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  3125. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  3126. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  3127. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  3128. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3129.  
  3130. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3131. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3132. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: Including PMKID in M1 (16)
  3133.  
  3134. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  3135.  
  3136. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: M1 - Key Data: (22)
  3137.  
  3138. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  3139.  
  3140. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: [0016] 5e 34 2f bf 3f 0b
  3141.  
  3142. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  3143. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3144. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  3145. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.963: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3146. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3147. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3148.  
  3149. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  3150. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  3151. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  3152. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  3153. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 00000010: 00 0f ac 04 0c 00 ......
  3154. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  3155. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  3156. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 00000020: 23 ff b9 2d 1d 43 #..-.C
  3157. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  3158. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  3159. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3160. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3161.  
  3162. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3163.  
  3164. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3165. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  3166. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.967: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3167. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3168. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3169.  
  3170. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  3171. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3172. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  3173. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  3174. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  3175.  
  3176. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  3177.  
  3178. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  3179.  
  3180. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Building Client Payload:
  3181.  
  3182. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  3183.  
  3184. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  3185.  
  3186. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  3187.  
  3188. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  3189.  
  3190. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 ssid: IOS
  3191.  
  3192. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  3193.  
  3194. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  3195. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3196. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3197. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  3198.  
  3199. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  3200. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  3201. type = Airespace AP - Learn IP address
  3202. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  3203. IPv4 ACL ID = 255, IPv
  3204. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  3205. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3206.  
  3207. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3208.  
  3209. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.969: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3210.  
  3211. *spamApTask1: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3212. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  3213. *Dot1x_NW_MsgTask_2: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  3214. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  3215. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  3216. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  3217. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  3218. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  3219. type = Airespace AP - Learn IP address
  3220. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  3221. IPv4 ACL ID = 255,
  3222. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  3223. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3224.  
  3225. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3226.  
  3227. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3228.  
  3229. *apfReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  3230. *pemReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  3231. *pemReceiveTask: Feb 08 12:06:24.970: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  3232. *DHCP Socket Task: Feb 08 12:06:25.046: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0x5169cf0)
  3233. *DHCP Socket Task: Feb 08 12:06:25.046: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  3234. *DHCP Socket Task: Feb 08 12:06:25.046: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  3235. *DHCP Socket Task: Feb 08 12:06:25.048: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0x5169cf0)
  3236. *DHCP Socket Task: Feb 08 12:06:25.049: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  3237. *DHCP Socket Task: Feb 08 12:06:25.049: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  3238. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0x5169cf0)
  3239. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a60a08 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  3240. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  3241. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  3242. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  3243. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  3244.  
  3245. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  3246. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  3247. *DHCP Socket Task: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  3248. *pemReceiveTask: Feb 08 12:06:25.050: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  3249. *DHCP Socket Task: Feb 08 12:06:25.051: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  3250. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 Got action frame from this client.
  3251. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 Doing preauth for this client over the DS
  3252. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 Doing local roaming for destination address 20:37:06:7c:10:bd
  3253. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 Got 1 AKMs in RSNIE
  3254. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 RSNIE AKM matches with PMK cache entry :0x4
  3255. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 pmkRoName derived sucessfully
  3256. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 Validate FTIE for R0KH-ID, Store SNonce passed
  3257. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 Created a new preauth entry for AP:64:d8:14:1e:e8:8d
  3258. *apfMsConnTask_5: Feb 08 12:26:56.388: 64:b0:a6:c9:56:d2 FT Auth Resp: Setting adaptive AKM 4 into RSN Data at 19
  3259.  
  3260. *spamApTask5: Feb 08 12:26:56.422: 64:b0:a6:c9:56:d2 Association Failed on REAP AP BSSID 64:d8:14:1e:e8:8d (slot 1), status 11 0 802.11r Key Cache look up failed in (re)-assoc req
  3261. *spamApTask5: Feb 08 12:26:56.422: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 8, reasonCode 1
  3262.  
  3263. *spamApTask5: Feb 08 12:26:56.422: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  3264. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  3265.  
  3266. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  3267. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Ignoring 802.11 assoc request from mobile pending deletion
  3268. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 12 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  3269. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3270. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3271. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3272. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3273. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  3274. *apfMsConnTask_6: Feb 08 12:26:56.424: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status Assoc denied unspecified) ApVapId 3 Slot 1
  3275. *osapiBsnTimer: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  3276. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7521) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  3277.  
  3278. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  3279.  
  3280. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  3281. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  3282. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3283. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  3284. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  3285. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  3286. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  3287. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  3288. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 Removing TGr reauth entry on AP station 64:d8:14:1e:e8:8d
  3289. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  3290. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  3291. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  3292.  
  3293. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  3294. *apfReceiveTask: Feb 08 12:26:57.418: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  3295. *apfReceiveTask: Feb 08 12:26:57.419: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
  3296. *spamApTask1: Feb 08 12:26:57.419: 64:b0:a6:c9:56:d2 Delete Mobile request sent to the AP 172.16.40.12:12973
  3297.  
  3298. *apfMsConnTask_6: Feb 08 12:27:02.351: 64:b0:a6:c9:56:d2 Got action frame from this client.
  3299. *apfMsConnTask_6: Feb 08 12:27:02.351: 64:b0:a6:c9:56:d2 no PMK cache entry for this client. Can't do preauth.
  3300. *apfMsConnTask_6: Feb 08 12:28:38.769: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  3301.  
  3302. *apfMsConnTask_6: Feb 08 12:28:38.769: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 thread:a5003a0
  3303. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 64:d8:14:1e:e8:80(1)
  3304. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 64:d8:14:1e:e8:8d AP APd867.d99c.f685
  3305. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 64:D8:14:1E:E8:80
  3306. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  3307.  
  3308. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 0
  3309.  
  3310. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  3311.  
  3312. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  3313. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  3314.  
  3315. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  3316.  
  3317. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  3318. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  3319. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  3320. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  3321. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  3322. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  3323. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  3324. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  3325. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  3326. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  3327. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  3328. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  3329. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  3330. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  3331. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  3332. *apfMsConnTask_6: Feb 08 12:28:38.770: RSNIE in Assoc. Req.: (20)
  3333.  
  3334. *apfMsConnTask_6: Feb 08 12:28:38.770: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  3335.  
  3336. *apfMsConnTask_6: Feb 08 12:28:38.770: [0016] ac 04 0c 00
  3337.  
  3338. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  3339. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  3340. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  3341. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  3342. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  3343.  
  3344. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 64:d8:14:1e:e8:80 - AID ===> 1
  3345. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  3346. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  3347.  
  3348. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  3349.  
  3350. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  3351. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  3352. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3353. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  3354. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  3355. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  3356. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Idle to Associated
  3357.  
  3358. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  3359. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  3360. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  3361.  
  3362. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:64:d8:14:1e:e8:80-01 on apVapId 3
  3363. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3364. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3365. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3366. *apfMsConnTask_6: Feb 08 12:28:38.770: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3367. *apfMsConnTask_6: Feb 08 12:28:38.771: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 64:d8:14:1e:e8:8d (status 0) ApVapId 3 Slot 1
  3368. *apfMsConnTask_6: Feb 08 12:28:38.771: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Associated
  3369.  
  3370. *spamApTask5: Feb 08 12:28:38.772: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  3371. *spamApTask5: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 11)
  3372. *spamApTask5: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  3373. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  3374. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  3375. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3376. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  3377. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  3378. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Adding BSSID 64:d8:14:1e:e8:8d to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  3379. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: New PMKID: (16)
  3380.  
  3381. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  3382.  
  3383. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  3384. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  3385.  
  3386. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  3387. pmkValidTime:86376
  3388.  
  3389. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  3390.  
  3391. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  3392. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  3393. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  3394. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  3395. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  3396. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  3397. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3398.  
  3399. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3400. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 64:d8:14:1e:e8:8d in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3401. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: Including PMKID in M1 (16)
  3402.  
  3403. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: [0000] c2 1b fc c9 10 63 b8 3e cc 98 1a 53 12 c2 b1 3e
  3404.  
  3405. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: M1 - Key Data: (22)
  3406.  
  3407. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: [0000] dd 14 00 0f ac 04 c2 1b fc c9 10 63 b8 3e cc 98
  3408.  
  3409. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: [0016] 1a 53 12 c2 b1 3e
  3410.  
  3411. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  3412. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3413. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  3414. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.775: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3415. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.778: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3416. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.778: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3417.  
  3418. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.778: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  3419. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  3420. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  3421. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  3422. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 00000010: 00 0f ac 04 0c 00 ......
  3423. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  3424. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  3425. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 00000020: 23 ff b9 2d 1d 43 #..-.C
  3426. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  3427. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  3428. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3429. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3430.  
  3431. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3432.  
  3433. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3434. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  3435. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.779: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3436. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3437. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3438.  
  3439. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  3440. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3441. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  3442. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  3443. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  3444.  
  3445. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  3446.  
  3447. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  3448.  
  3449. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Building Client Payload:
  3450.  
  3451. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  3452.  
  3453. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  3454.  
  3455. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  3456.  
  3457. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  3458.  
  3459. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 ssid: IOS
  3460.  
  3461. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  3462.  
  3463. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3for this client
  3464. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3465. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 64:d8:14:1e:e8:80 vapId 3 apVapId 3 flex-acl-name:
  3466. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  3467.  
  3468. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  3469. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  3470. type = Airespace AP - Learn IP address
  3471. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  3472. IPv4 ACL ID = 255, IPv
  3473. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  3474. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.781: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3475.  
  3476. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3477.  
  3478. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3479.  
  3480. *spamApTask5: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 64:d8:14:1e:e8:80
  3481. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  3482. *Dot1x_NW_MsgTask_2: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  3483. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  3484. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  3485. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  3486. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  3487. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  3488. type = Airespace AP - Learn IP address
  3489. on AP 64:d8:14:1e:e8:80, slot 1, interface = 1, QOS = 2
  3490. IPv4 ACL ID = 255,
  3491. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  3492. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3493.  
  3494. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3495.  
  3496. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3497.  
  3498. *apfReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  3499. *pemReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  3500. *pemReceiveTask: Feb 08 12:28:38.782: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  3501. *DHCP Socket Task: Feb 08 12:28:38.868: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0x9169cf0)
  3502. *DHCP Socket Task: Feb 08 12:28:38.869: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  3503. *DHCP Socket Task: Feb 08 12:28:38.869: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  3504. *DHCP Socket Task: Feb 08 12:28:38.874: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0x9169cf0)
  3505. *DHCP Socket Task: Feb 08 12:28:38.874: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  3506. *DHCP Socket Task: Feb 08 12:28:38.874: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  3507. *DHCP Socket Task: Feb 08 12:28:38.875: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0x9169cf0)
  3508. *DHCP Socket Task: Feb 08 12:28:38.875: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a645e8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  3509. *DHCP Socket Task: Feb 08 12:28:38.875: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  3510. *DHCP Socket Task: Feb 08 12:28:38.875: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  3511. *DHCP Socket Task: Feb 08 12:28:38.882: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  3512. *DHCP Socket Task: Feb 08 12:28:38.882: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  3513.  
  3514. *pemReceiveTask: Feb 08 12:28:38.882: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  3515. *DHCP Socket Task: Feb 08 12:28:38.882: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  3516. *DHCP Socket Task: Feb 08 12:28:38.882: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  3517. *DHCP Socket Task: Feb 08 12:28:38.882: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  3518. *DHCP Socket Task: Feb 08 12:28:38.883: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  3519. *DHCP Socket Task: Feb 08 12:28:38.883: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec03, xid 0x9169cf0)
  3520. *DHCP Socket Task: Feb 08 12:28:38.883: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a645e8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  3521. *spamApTask5: Feb 08 12:43:34.318: 64:b0:a6:c9:56:d2 Received DELETE mobile, reason MN_IDLE_TIMEOUT, from AP 64:d8:14:1e:e8:80, slot 1 ...cleaning up mscb
  3522. *spamApTask5: Feb 08 12:43:34.318: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 4, reasonCode 4
  3523.  
  3524. *spamApTask5: Feb 08 12:43:34.318: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  3525. *spamApTask5: Feb 08 12:43:34.318: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  3526. *spamApTask5: Feb 08 12:43:34.318: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  3527. *spamApTask5: Feb 08 12:43:34.318: 64:b0:a6:c9:56:d2 0 PMK-remove groupcast messages sent
  3528. *osapiBsnTimer: Feb 08 12:43:35.289: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  3529. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Associated to Disassociated
  3530.  
  3531. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 64:d8:14:1e:e8:80-1 (reason 4, caller apf_ms.c:7495)
  3532. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Disassociated
  3533.  
  3534. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 64:d8:14:1e:e8:80-1 (reason 1, caller apf_ms.c:7614)
  3535. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 64:d8:14:1e:e8:8d slot 1(caller apf_ms.c:7616)
  3536. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3537. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Removing BSSID 64:d8:14:1e:e8:8d from PMKID cache of station 64:b0:a6:c9:56:d2
  3538. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  3539. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  3540. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Global PMK Cache deletion failed.
  3541. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  3542. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  3543. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 64:d8:14:1e:e8:80 from Disassociated to Idle
  3544.  
  3545. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  3546. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [64:d8:14:1e:e8:80]
  3547. *apfReceiveTask: Feb 08 12:43:35.290: 64:b0:a6:c9:56:d2 Deleting mobile on AP 64:d8:14:1e:e8:80(1)
  3548. *apfMsConnTask_5: Feb 08 12:43:37.236: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  3549.  
  3550. *apfMsConnTask_5: Feb 08 12:43:37.236: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  3551. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Adding mobile on LWAPP AP 20:37:06:7c:10:b0(1)
  3552. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  3553. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  3554. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  3555.  
  3556. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 1
  3557.  
  3558. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  3559.  
  3560. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  3561. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Applying Interface(computers-103) policy on Mobile, role Unassociated. Ms NAC State 0 Quarantine Vlan 0 Access Vlan 0
  3562.  
  3563. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Not re-applying interface policy for local switching Client
  3564.  
  3565. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2931)
  3566. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing Url ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2951)
  3567. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2972)
  3568. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  3569. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  3570. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  3571. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  3572. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  3573. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  3574. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  3575. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  3576. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  3577. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  3578. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  3579. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  3580. *apfMsConnTask_5: Feb 08 12:43:37.237: RSNIE in Assoc. Req.: (20)
  3581.  
  3582. *apfMsConnTask_5: Feb 08 12:43:37.237: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  3583.  
  3584. *apfMsConnTask_5: Feb 08 12:43:37.237: [0016] ac 04 0c 00
  3585.  
  3586. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  3587. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  3588. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  3589. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  3590. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  3591.  
  3592. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Updating AID for REAP AP Client 20:37:06:7c:10:b0 - AID ===> 2
  3593. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Initializing policy
  3594. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0)
  3595.  
  3596. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  3597.  
  3598. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  3599. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  3600. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3601. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3602. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 apfMsAssoStateInc
  3603. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 apfMsWepPskStateInc
  3604. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Idle to Associated
  3605.  
  3606. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  3607. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  3608. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  3609.  
  3610. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  3611. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3612. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3613. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3614. *apfMsConnTask_5: Feb 08 12:43:37.237: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3615. *apfMsConnTask_5: Feb 08 12:43:37.238: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  3616. *apfMsConnTask_5: Feb 08 12:43:37.238: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  3617.  
  3618. *spamApTask1: Feb 08 12:43:37.239: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3619. *spamApTask1: Feb 08 12:43:37.241: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 55)
  3620. *spamApTask1: Feb 08 12:43:37.241: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  3621. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 1 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:47
  3622. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  3623. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3624. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 8
  3625. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  3626. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  3627. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: New PMKID: (16)
  3628.  
  3629. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  3630.  
  3631. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  3632. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  3633.  
  3634. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  3635. pmkValidTime:86378
  3636.  
  3637. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  3638.  
  3639. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  3640. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  3641. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  3642. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  3643. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  3644. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  3645. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3646.  
  3647. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3648. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3649. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: Including PMKID in M1 (16)
  3650.  
  3651. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  3652.  
  3653. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: M1 - Key Data: (22)
  3654.  
  3655. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  3656.  
  3657. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: [0016] 5e 34 2f bf 3f 0b
  3658.  
  3659. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  3660. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3661. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  3662. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.242: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3663. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3664. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3665.  
  3666. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  3667. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  3668. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  3669. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  3670. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 00000010: 00 0f ac 04 0c 00 ......
  3671. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  3672. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  3673. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 00000020: 23 ff b9 2d 1d 43 #..-.C
  3674. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  3675. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  3676. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3677. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3678.  
  3679. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3680.  
  3681. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3682. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  3683. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.245: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3684. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3685. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3686.  
  3687. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  3688. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3689. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  3690. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  3691. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 0.0.0.0 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  3692.  
  3693. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Mobility query, PEM State: L2AUTHCOMPLETE
  3694.  
  3695. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Building Mobile Announce :
  3696.  
  3697. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Building Client Payload:
  3698.  
  3699. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Client Ip: 0.0.0.0
  3700.  
  3701. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Client Vlan Ip: 172.16.40.99, Vlan mask : 255.255.255.224
  3702.  
  3703. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Client Vap Security: 1073758208
  3704.  
  3705. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Virtual Ip: 1.1.1.1
  3706.  
  3707. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 ssid: IOS
  3708.  
  3709. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.247: 64:b0:a6:c9:56:d2 Building VlanIpPayload.
  3710.  
  3711. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) DHCP required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3for this client
  3712. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3713. *spamApTask1: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3714. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3715. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
  3716.  
  3717. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6677, Adding TMP rule
  3718. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule
  3719. type = Airespace AP - Learn IP address
  3720. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  3721. IPv4 ACL ID = 255, IPv
  3722. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  3723. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3724.  
  3725. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3726.  
  3727. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3728.  
  3729. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  3730. *Dot1x_NW_MsgTask_2: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  3731. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local
  3732. Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.16.40.69
  3733. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED
  3734. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6315, Adding TMP rule
  3735. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Replacing Fast Path rule
  3736. type = Airespace AP - Learn IP address
  3737. on AP 20:37:06:7c:10:b0, slot 1, interface = 1, QOS = 2
  3738. IPv4 ACL ID = 255,
  3739. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 5, DSCP = 0, TokenID = 15206, IntfId = 5 Local Bridging Vlan = 103, Local Bridging intf id = 5
  3740. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3741.  
  3742. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3743.  
  3744. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0
  3745.  
  3746. *apfReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255,URL ACL ID 255)
  3747. *pemReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  3748. *pemReceiveTask: Feb 08 12:43:37.248: 64:b0:a6:c9:56:d2 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0
  3749. *DHCP Socket Task: Feb 08 12:43:37.584: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 103, port 1, encap 0xec00, xid 0xa169cf0)
  3750. *DHCP Socket Task: Feb 08 12:43:37.584: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 0ff:ff:ff:ff:ff:ff
  3751. *DHCP Socket Task: Feb 08 12:43:37.584: 64:b0:a6:c9:56:d2 DHCP dropping looped REQUEST from DS (encap type 0xec00)
  3752. *DHCP Socket Task: Feb 08 12:43:37.586: 64:b0:a6:c9:56:d2 DHCP received op BOOTREQUEST (1) (len 308,vlan 102, port 1, encap 0xec00, xid 0xa169cf0)
  3753. *DHCP Socket Task: Feb 08 12:43:37.586: 64:b0:a6:c9:56:d2 DHCP (encap type 0xec00) mstype 000:0c:29:e2:95:cc
  3754. *DHCP Socket Task: Feb 08 12:43:37.586: 64:b0:a6:c9:56:d2 DHCP Consume the DHCP packet from Flexconnect Locally switched client.
  3755. *DHCP Socket Task: Feb 08 12:43:37.588: 64:b0:a6:c9:56:d2 DHCP received op BOOTREPLY (2) (len 318,vlan 102, port 1, encap 0xec00, xid 0xa169cf0)
  3756. *DHCP Socket Task: Feb 08 12:43:37.588: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (mscb=0x7f6c23a663d8 ip=0xac102867)(server 172.16.40.67, yiaddr 172.16.40.103)
  3757. *DHCP Socket Task: Feb 08 12:43:37.588: 64:b0:a6:c9:56:d2 DHCP setting server from ACK (server 172.16.40.67, yiaddr 172.16.40.103)
  3758. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 Static IP client associated to interface computers-103 which can support client subnet.
  3759. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  3760. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 172.16.40.103 DHCP_REQD (7) Change state to RUN (20) last state DHCP_REQD (7)
  3761.  
  3762. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 Assigning Address 172.16.40.103 to mobile
  3763. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  3764. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 DHCP success event for client. Clearing dhcp failure count for interface computers-103.
  3765. *DHCP Socket Task: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 DHCP Setting DHCP Relay from ACK (server 172.16.40.67, Relay 172.16.40.99, vlanId 103)
  3766. *pemReceiveTask: Feb 08 12:43:37.589: 64:b0:a6:c9:56:d2 172.16.40.103 Removed NPU entry.
  3767. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  3768.  
  3769. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  3770. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  3771. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  3772. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  3773. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  3774.  
  3775. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 2
  3776.  
  3777. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  3778.  
  3779. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 FT Adaptive AKM not negotiated
  3780. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  3781. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  3782. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  3783. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  3784. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  3785. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  3786. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  3787. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  3788. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  3789. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  3790. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  3791. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  3792. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  3793. *apfMsConnTask_5: Feb 08 12:44:14.110: RSNIE in Assoc. Req.: (20)
  3794.  
  3795. *apfMsConnTask_5: Feb 08 12:44:14.110: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  3796.  
  3797. *apfMsConnTask_5: Feb 08 12:44:14.110: [0016] ac 04 0c 00
  3798.  
  3799. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  3800. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  3801. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  3802. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  3803. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  3804.  
  3805. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 AID 2 in Assoc Req from flex AP 20:37:06:7c:10:b0 is same as in mscb 64:b0:a6:c9:56:d2
  3806. *apfMsConnTask_5: Feb 08 12:44:14.110: 64:b0:a6:c9:56:d2 apfMsRunStateDec
  3807. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 apfMs1xStateDec
  3808. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 172.16.40.103 RUN (20) Change state to START (0) last state RUN (20)
  3809.  
  3810. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  3811. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Initializing policy
  3812. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Change state to AUTHCHECK (2) last state START (0)
  3813.  
  3814. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 172.16.40.103 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  3815.  
  3816. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  3817. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 172.16.40.103 8021X_REQD (3) Client already has IP 172.16.40.103, DHCP Not required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3
  3818. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3819. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 172.16.40.103 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3820. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  3821.  
  3822. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  3823. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  3824. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  3825.  
  3826. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  3827. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3828. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3829. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3830. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3831. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  3832. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  3833. *apfMsConnTask_5: Feb 08 12:44:14.111: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  3834.  
  3835. *spamApTask1: Feb 08 12:44:14.112: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3836. *spamApTask1: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 59)
  3837. *spamApTask1: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  3838. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 reauth_sm state transition 1 ---> 0 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:53
  3839. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  3840. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3841. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  3842. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  3843. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  3844. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  3845. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: New PMKID: (16)
  3846.  
  3847. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  3848.  
  3849. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  3850. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Skipping cache delete as AP will get cache update.
  3851. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  3852.  
  3853. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  3854. pmkValidTime:86405
  3855.  
  3856. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  3857.  
  3858. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  3859. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  3860. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  3861. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  3862. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  3863. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  3864. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3865.  
  3866. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3867. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  3868. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: Including PMKID in M1 (16)
  3869.  
  3870. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  3871.  
  3872. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: M1 - Key Data: (22)
  3873.  
  3874. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  3875.  
  3876. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: [0016] 5e 34 2f bf 3f 0b
  3877.  
  3878. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  3879. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3880. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  3881. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.114: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3882. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3883. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3884.  
  3885. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  3886. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  3887. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  3888. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  3889. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 00000010: 00 0f ac 04 0c 00 ......
  3890. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  3891. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  3892. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 00000020: 23 ff b9 2d 1d 43 #..-.C
  3893. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  3894. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  3895. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3896. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3897.  
  3898. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3899.  
  3900. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  3901. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  3902. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.118: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  3903. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  3904. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  3905.  
  3906. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  3907. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  3908. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  3909. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  3910. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 172.16.40.103 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  3911.  
  3912. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 172.16.40.103 L2AUTHCOMPLETE (4) Client already has IP 172.16.40.103, DHCP Not required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3
  3913. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3914. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 172.16.40.103 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3915. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  3916. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.121: 64:b0:a6:c9:56:d2 172.16.40.103 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
  3917.  
  3918. *spamApTask1: Feb 08 12:44:14.122: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3919. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.122: 64:b0:a6:c9:56:d2 172.16.40.103 RUN (20) Reached PLUMBFASTPATH: from line 6813
  3920. *Dot1x_NW_MsgTask_2: Feb 08 12:44:14.122: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  3921. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Updating 11r vendor IE
  3922.  
  3923. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Processing assoc-req station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 thread:a4ffd40
  3924. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  3925. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Association received from mobile on BSSID 20:37:06:7c:10:bd AP AP0007.7d43.2abd
  3926. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Station: 64:B0:A6:C9:56:D2 11v BSS Transition not enabled on the AP 20:37:06:7C:10:B0
  3927. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Global 200 Clients are allowed to AP radio
  3928.  
  3929. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Max Client Trap Threshold: 0 cur: 2
  3930.  
  3931. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Rf profile 600 Clients are allowed to AP wlan
  3932.  
  3933. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 FT Adaptive AKM not negotiated
  3934. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 override for default ap group, marking intgrp NULL
  3935. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
  3936. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 In processSsidIE:6494 setting Central switched to FALSE
  3937. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Set Clinet MSCB as Central Association Disabled
  3938. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Applying site-specific Local Bridging override for station 64:b0:a6:c9:56:d2 - vapId 3, site 'default-group', interface 'computers-103'
  3939. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Applying Local Bridging Interface Policy for station 64:b0:a6:c9:56:d2 - vlan 103, interface id 5, interface 'computers-103'
  3940. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 Set Clinet Non AP specific Flexgroup apfMsAccessVlan = 103
  3941. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 This apfMsAccessVlan may be changed later from AAA after L2 Auth
  3942. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 processSsidIE statusCode is 0 and status is 0
  3943. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 processSsidIE ssid_done_flag is 0 finish_flag is 0
  3944. *apfMsConnTask_5: Feb 08 12:44:46.952: 64:b0:a6:c9:56:d2 STA - rates (4): 176 72 96 108 0 0 0 0 0 0 0 0 0 0 0 0
  3945. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 suppRates statusCode is 0 and gotSuppRatesElement is 1
  3946. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Marking this mobile as TGr capable.
  3947. *apfMsConnTask_5: Feb 08 12:44:46.953: RSNIE in Assoc. Req.: (20)
  3948.  
  3949. *apfMsConnTask_5: Feb 08 12:44:46.953: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f
  3950.  
  3951. *apfMsConnTask_5: Feb 08 12:44:46.953: [0016] ac 04 0c 00
  3952.  
  3953. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Processing RSN IE type 48, length 20 for mobile 64:b0:a6:c9:56:d2
  3954. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 RSN Capabilities: 12
  3955. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Marking Mobile as non-11w Capable
  3956. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Validating FT AKM's on WLAN
  3957. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Setting adaptive AKM 4 into RSN Data at 19
  3958.  
  3959. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 AID 2 in Assoc Req from flex AP 20:37:06:7c:10:b0 is same as in mscb 64:b0:a6:c9:56:d2
  3960. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 apfMsRunStateDec
  3961. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 apfMs1xStateDec
  3962. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 172.16.40.103 RUN (20) Change state to START (0) last state RUN (20)
  3963.  
  3964. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  3965. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Initializing policy
  3966. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Change state to AUTHCHECK (2) last state START (0)
  3967.  
  3968. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 172.16.40.103 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
  3969.  
  3970. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Encryption policy is set to 0x80000001
  3971. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 172.16.40.103 8021X_REQD (3) Client already has IP 172.16.40.103, DHCP Not required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3
  3972. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  3973. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 172.16.40.103 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  3974. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 apfPemAddUser2 (apf_policy.c:437) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  3975.  
  3976. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 apfPemAddUser2:session timeout forstation 64:b0:a6:c9:56:d2 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
  3977. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Stopping deletion of Mobile Station: (callerId: 48)
  3978. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
  3979.  
  3980. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Sending assoc-resp with status 0 station:64:b0:a6:c9:56:d2 AP:20:37:06:7c:10:b0-01 on apVapId 3
  3981. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Including FT Mobility Domain IE (length 5) in Initial assoc Resp to mobile
  3982. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Sending R0KH-ID as:-84.16.40.69
  3983. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Sending R1KH-ID as 00:0c:29:37:39:3e
  3984. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Including FT IE (length 98) in Initial Assoc Resp to mobile
  3985. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Clearing the existing FT session data for mobile as we received a fresh Association.
  3986. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 Sending Assoc Response to station on BSSID 20:37:06:7c:10:bd (status 0) ApVapId 3 Slot 1
  3987. *apfMsConnTask_5: Feb 08 12:44:46.953: 64:b0:a6:c9:56:d2 apfProcessAssocReq (apf_80211.c:10849) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Associated
  3988.  
  3989. *spamApTask1: Feb 08 12:44:46.955: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  3990. *spamApTask1: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Received ADD_MOBILE ack - Initiating 1x to STA 64:b0:a6:c9:56:d2 (idx 61)
  3991. *spamApTask1: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Sent dot1x auth initiate message for mobile 64:b0:a6:c9:56:d2
  3992. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 reauth_sm state transition 0 ---> 0 for mobile 64:b0:a6:c9:56:d2 at 1x_reauth_sm.c:53
  3993. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Creating a PKC PMKID Cache entry for station 64:b0:a6:c9:56:d2 (RSN 2)
  3994. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  3995. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  3996. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  3997. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Setting active key cache index 8 ---> 0
  3998. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Adding BSSID 20:37:06:7c:10:bd to PMKID cache at index 0 for station 64:b0:a6:c9:56:d2
  3999. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: New PMKID: (16)
  4000.  
  4001. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  4002.  
  4003. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Creating global PMK cache for this TGr client
  4004. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Skipping cache delete as AP will get cache update.
  4005. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Created PMK Cache Entry for TGr AKM:PSK 64:b0:a6:c9:56:d2
  4006.  
  4007. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 R0KH-ID:172.16.40.69 R1KH-ID:00:0c:29:37:39:3e MSK Len:48
  4008. pmkValidTime:86403
  4009.  
  4010. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Adding Audit session ID payload in Mobility handoff
  4011.  
  4012. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 0 PMK-update groupcast messages sent
  4013. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Initiating RSN PSK to mobile 64:b0:a6:c9:56:d2
  4014. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
  4015. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Disable re-auth, use PMK lifetime.
  4016. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 dot1x - moving mobile 64:b0:a6:c9:56:d2 into Force Auth state
  4017. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Skipping EAP-Success to mobile 64:b0:a6:c9:56:d2 (encryptBit:0)
  4018. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  4019.  
  4020. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  4021. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Found an cache entry for BSSID 20:37:06:7c:10:bd in PMKID cache at index 0 of station 64:b0:a6:c9:56:d2
  4022. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: Including PMKID in M1 (16)
  4023.  
  4024. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: [0000] 55 ee 26 53 d3 56 eb 8c 21 f2 5e 34 2f bf 3f 0b
  4025.  
  4026. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: M1 - Key Data: (22)
  4027.  
  4028. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: [0000] dd 14 00 0f ac 04 55 ee 26 53 d3 56 eb 8c 21 f2
  4029.  
  4030. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: [0016] 5e 34 2f bf 3f 0b
  4031.  
  4032. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Starting key exchange to mobile 64:b0:a6:c9:56:d2, data packets will be dropped
  4033. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  4034. state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
  4035. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.957: 64:b0:a6:c9:56:d2 Allocating EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  4036. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  4037. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  4038.  
  4039. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTK_START state (message 2) from mobile 64:b0:a6:c9:56:d2
  4040. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Successfully computed PTK from PMK!!!
  4041. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Received valid MIC in EAPOL Key Message M2!!!!!
  4042. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
  4043. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 00000010: 00 0f ac 04 0c 00 ......
  4044. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
  4045. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 00000010: ac 04 0c 00 01 00 2f 8f ae f6 a5 a9 b4 47 31 35 ....../......G15
  4046. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 00000020: 23 ff b9 2d 1d 43 #..-.C
  4047. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Calculating PMKR0Name
  4048. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 DOT11R: Sending cache add
  4049. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  4050. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  4051.  
  4052. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  4053.  
  4054. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Sending EAPOL-Key Message to mobile 64:b0:a6:c9:56:d2
  4055. state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
  4056. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.961: 64:b0:a6:c9:56:d2 Reusing allocated memory for EAP Pkt for retransmission to mobile 64:b0:a6:c9:56:d2
  4057. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Received EAPOL-Key from mobile 64:b0:a6:c9:56:d2
  4058. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 key Desc Version FT - 1
  4059.  
  4060. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 64:b0:a6:c9:56:d2
  4061. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Stopping retransmission timer for mobile 64:b0:a6:c9:56:d2
  4062. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Freeing EAP Retransmit Bufer for mobile 64:b0:a6:c9:56:d2
  4063. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 apfMs1xStateInc
  4064. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 172.16.40.103 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
  4065.  
  4066. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 172.16.40.103 L2AUTHCOMPLETE (4) Client already has IP 172.16.40.103, DHCP Not required on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3
  4067. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Not Using WMM Compliance code qosCap 00
  4068. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 172.16.40.103 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 20:37:06:7c:10:b0 vapId 3 apVapId 3 flex-acl-name:
  4069. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 apfMsRunStateInc
  4070. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 172.16.40.103 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
  4071.  
  4072. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 172.16.40.103 RUN (20) Reached PLUMBFASTPATH: from line 6813
  4073. *Dot1x_NW_MsgTask_2: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Successfully Plumbed PTK session Keysfor mobile 64:b0:a6:c9:56:d2
  4074. *spamApTask1: Feb 08 12:44:46.964: 64:b0:a6:c9:56:d2 Successful transmission of LWAPP Add-Mobile to AP 20:37:06:7c:10:b0
  4075. *spamApTask1: Feb 08 12:53:12.395: 64:b0:a6:c9:56:d2 Received DELETE mobile, reason MN_IDLE_TIMEOUT, from AP 20:37:06:7c:10:b0, slot 1 ...cleaning up mscb
  4076. *spamApTask1: Feb 08 12:53:12.395: 64:b0:a6:c9:56:d2 apfMsDeleteByMscb Scheduling mobile for deletion with deleteReason 4, reasonCode 4
  4077.  
  4078. *spamApTask1: Feb 08 12:53:12.395: 64:b0:a6:c9:56:d2 Scheduling deletion of Mobile Station: (callerId: 30) in 1 seconds
  4079. *spamApTask1: Feb 08 12:53:12.395: 64:b0:a6:c9:56:d2 DOT11R: Sending cache delete
  4080. *spamApTask1: Feb 08 12:53:12.395: 64:b0:a6:c9:56:d2 Removing PMK cache entry for station 64:b0:a6:c9:56:d2
  4081. *spamApTask1: Feb 08 12:53:12.395: 64:b0:a6:c9:56:d2 0 PMK-remove groupcast messages sent
  4082. *osapiBsnTimer: Feb 08 12:53:13.229: 64:b0:a6:c9:56:d2 apfMsExpireCallback (apf_ms.c:637) Expiring Mobile!
  4083. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Associated to Disassociated
  4084.  
  4085. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 4, caller apf_ms.c:7495)
  4086. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 apfSendDisAssocMsgDebug (apf_80211.c:3541) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Disassociated
  4087.  
  4088. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Sent Disassociate to mobile on AP 20:37:06:7c:10:b0-1 (reason 1, caller apf_ms.c:7614)
  4089. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Sent Deauthenticate to mobile on BSSID 20:37:06:7c:10:bd slot 1(caller apf_ms.c:7616)
  4090. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Resetting MSCB PMK Cache Entry 0 for station 64:b0:a6:c9:56:d2
  4091. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Removing BSSID 20:37:06:7c:10:bd from PMKID cache of station 64:b0:a6:c9:56:d2
  4092. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Setting active key cache index 0 ---> 8
  4093. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Deleting the PMK cache when de-authenticating the client.
  4094. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Global PMK Cache deletion failed.
  4095. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 apfMsAssoStateDec
  4096. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 apfMsWepPskStateDec
  4097. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 apfMsExpireMobileStation (apf_ms.c:7657) Changing state for mobile 64:b0:a6:c9:56:d2 on AP 20:37:06:7c:10:b0 from Disassociated to Idle
  4098.  
  4099. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
  4100. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 172.16.40.103 START (0) Deleted mobile LWAPP rule on AP [20:37:06:7c:10:b0]
  4101. *apfReceiveTask: Feb 08 12:53:13.230: 64:b0:a6:c9:56:d2 Deleting mobile on AP 20:37:06:7c:10:b0(1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement