Advertisement
Guest User

Untitled

a guest
Oct 8th, 2019
621
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 146.30 KB | None | 0 0
  1. Tue Oct 8 03:38:04 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  2. Tue Oct 8 03:38:04 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
  3. Tue Oct 8 03:38:04 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  4. Tue Oct 8 03:38:04 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
  5. Tue Oct 8 03:38:05 2019 kern.warn kernel: [26246.886579] [wifi1] FWLOG: [26894911] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x19a624a
  6. Tue Oct 8 03:38:05 2019 kern.warn kernel: [26246.886657] [wifi1] FWLOG: [26894922] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435ab4 )
  7. Tue Oct 8 03:38:05 2019 kern.warn kernel: [26246.886697] [wifi1] FWLOG: [26894950] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x19a62e9
  8. Tue Oct 8 03:38:14 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session CEC2EA00BEED7AD1
  9. Tue Oct 8 03:38:14 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1410000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"26246.261535"}
  10. Tue Oct 8 04:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  11. Tue Oct 8 04:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
  12. Tue Oct 8 04:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
  13. Tue Oct 8 04:04:40 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: group key handshake failed (RSN) after 4tries
  14. Tue Oct 8 04:04:40 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  15. Tue Oct 8 04:04:40 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
  16. Tue Oct 8 04:04:40 2019 kern.warn kernel: [26246.886736] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [28528156] WAL_DBGID_SET_HW_FILTER ( 0x435ab4 )
  17. Tue Oct 8 04:04:40 2019 kern.warn kernel: [27842.058287] [wifi1] FWLOG: [28528665] WAL_DBGID_SET_HW_FILTER ( 0x4359cc )
  18. Tue Oct 8 04:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  19. Tue Oct 8 04:04:45 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: deauthenticated due to local deauth request
  20. Tue Oct 8 04:31:34 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  21. Tue Oct 8 04:31:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  22. Tue Oct 8 04:31:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  23. Tue Oct 8 04:31:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  24. Tue Oct 8 04:31:34 2019 kern.warn kernel: [29456.228717] [wifi1] FWLOG: [30181761] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1cc898e
  25. Tue Oct 8 04:31:34 2019 kern.warn kernel: [29456.228788] [wifi1] FWLOG: [30181774] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435b9c )
  26. Tue Oct 8 04:31:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  27. Tue Oct 8 04:31:35 2019 kern.warn kernel: [29457.229050] [wifi1] FWLOG: [30181800] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x7fc0401
  28. Tue Oct 8 04:31:44 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 818731093D7FBF89
  29. Tue Oct 8 04:31:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"29456.172748"}
  30. Tue Oct 8 04:32:12 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  31. Tue Oct 8 04:32:12 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  32. Tue Oct 8 04:32:12 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
  33. Tue Oct 8 04:32:12 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  34. Tue Oct 8 04:32:12 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
  35. Tue Oct 8 04:32:13 2019 kern.warn kernel: [29495.232973] [wifi1] FWLOG: [30220712] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x1cd21b3
  36. Tue Oct 8 04:32:13 2019 kern.warn kernel: [29495.233049] [wifi1] FWLOG: [30220723] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435c84 )
  37. Tue Oct 8 04:32:13 2019 kern.warn kernel: [29495.233090] [wifi1] [wifi1] FWLOG: [30220954] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  38. Tue Oct 8 04:32:22 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session FCFB1744E486584A
  39. Tue Oct 8 04:32:22 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1400000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"29494.214104"}
  40. Tue Oct 8 04:39:43 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
  41. Tue Oct 8 04:39:43 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  42. Tue Oct 8 04:39:43 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  43. Tue Oct 8 04:39:43 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  44. Tue Oct 8 04:39:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
  45. Tue Oct 8 04:39:44 2019 kern.warn kernel: [29504.233842] [wifi1] [wifi1] [wifi1] FWLOG: [30682729] WAL_DBGID_SET_HW_FILTER ( 0x435b9c )
  46. Tue Oct 8 04:40:34 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  47. Tue Oct 8 04:40:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  48. Tue Oct 8 04:40:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  49. Tue Oct 8 04:40:34 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  50. Tue Oct 8 04:40:34 2019 kern.warn kernel: [29996.286521] [wifi1] FWLOG: [30734716] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1d4f989
  51. Tue Oct 8 04:40:34 2019 kern.warn kernel: [29996.286607] [wifi1] FWLOG: [30734729] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435d6c )
  52. Tue Oct 8 04:40:34 2019 kern.warn kernel: [29996.286648] [wifi1] FWLOG: [30734753] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
  53. Tue Oct 8 04:40:34 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  54. Tue Oct 8 04:40:39 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  55. Tue Oct 8 04:40:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 40:9c:28:1e:5c:93 /1
  56. Tue Oct 8 04:40:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  57. Tue Oct 8 04:40:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  58. Tue Oct 8 04:40:40 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath2 (reason:On other VAP)
  59. Tue Oct 8 04:40:40 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  60. Tue Oct 8 04:40:40 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  61. Tue Oct 8 04:40:40 2019 kern.warn kernel: [30002.037487] ieee80211_ioctl_kickmac[15026]
  62. Tue Oct 8 04:40:40 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
  63. Tue Oct 8 04:40:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"2","ip_assign_type":"roamed","auth_ts":"29996.185451"}
  64. Tue Oct 8 04:40:49 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session F789A9A27AE11E3B
  65. Tue Oct 8 04:40:49 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath0","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"30001.372865"}
  66. Tue Oct 8 04:41:49 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 40:9c:28:1e:5c:93 / 192.168.178.52
  67. Tue Oct 8 04:45:48 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  68. Tue Oct 8 04:56:36 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  69. Tue Oct 8 04:56:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  70. Tue Oct 8 04:56:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  71. Tue Oct 8 04:56:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  72. Tue Oct 8 04:56:36 2019 kern.warn kernel: [30958.386568] [wifi1] FWLOG: [31719871] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1e401cd
  73. Tue Oct 8 04:56:36 2019 kern.warn kernel: [30958.386653] [wifi1] FWLOG: [31719885] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435e54 )
  74. Tue Oct 8 04:56:36 2019 kern.warn kernel: [30958.386746] [wifi1] FWLOG: [31719905] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
  75. Tue Oct 8 04:56:37 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
  76. Tue Oct 8 04:56:37 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  77. Tue Oct 8 04:56:37 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 40:9c:28:1e:5c:93 / 1
  78. Tue Oct 8 04:56:37 2019 kern.warn kernel: [30959.390452] ieee80211_ioctl_kickmac[15026]
  79. Tue Oct 8 04:56:37 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"sta_leave","event_id":"1"}
  80. Tue Oct 8 04:56:38 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
  81. Tue Oct 8 04:56:38 2019 kern.warn kernel: [30960.475674] ieee80211_ioctl_kickmac[15026]
  82. Tue Oct 8 04:56:46 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 2512F92850E68B4E
  83. Tue Oct 8 04:56:46 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"10000","event_id":"1","ip_assign_type":"roamed","auth_ts":"30958.277610"}
  84. Tue Oct 8 04:57:29 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  85. Tue Oct 8 05:00:41 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  86. Tue Oct 8 05:01:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","ip_delta":"258850000","assoc_delta":"10000","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
  87. Tue Oct 8 05:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: group key handshake completed (RSN)
  88. Tue Oct 8 05:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  89. Tue Oct 8 05:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
  90. Tue Oct 8 05:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
  91. Tue Oct 8 05:04:39 2019 kern.warn kernel: [31441.438086] [wifi1] [wifi1] FWLOG: [32214449] WAL_DBGID_SET_HW_FILTER ( 0x435c84 )
  92. Tue Oct 8 05:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  93. Tue Oct 8 05:10:20 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
  94. Tue Oct 8 05:10:20 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  95. Tue Oct 8 05:10:20 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  96. Tue Oct 8 05:10:20 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  97. Tue Oct 8 05:10:20 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
  98. Tue Oct 8 05:10:20 2019 kern.warn kernel: [31782.474866] [wifi1] FWLOG: [32562870] WAL_DBGID_SET_HW_FILTER ( 0x435e54 )
  99. Tue Oct 8 05:14:57 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  100. Tue Oct 8 05:14:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  101. Tue Oct 8 05:14:57 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  102. Tue Oct 8 05:14:57 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  103. Tue Oct 8 05:14:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  104. Tue Oct 8 05:14:57 2019 kern.warn kernel: [32059.504666] [wifi1] FWLOG: [32846756] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1f533b3
  105. Tue Oct 8 05:14:57 2019 kern.warn kernel: [32059.504744] [wifi1] FWLOG: [32846771] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435f3c )
  106. Tue Oct 8 05:14:57 2019 kern.warn kernel: [32059.504784] [wifi1] FWLOG: [32846794] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
  107. Tue Oct 8 05:15:07 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 61DEC226D0900996
  108. Tue Oct 8 05:15:07 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"32058.784525"}
  109. Tue Oct 8 05:21:04 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  110. Tue Oct 8 05:26:20 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  111. Tue Oct 8 05:26:20 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
  112. Tue Oct 8 05:26:20 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  113. Tue Oct 8 05:26:20 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  114. Tue Oct 8 05:26:20 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
  115. Tue Oct 8 05:26:21 2019 kern.warn kernel: [32742.576239] [wifi1] FWLOG: [33546535] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x1ffe132
  116. Tue Oct 8 05:26:21 2019 kern.warn kernel: [32742.576319] [wifi1] FWLOG: [33546546] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x436024 )
  117. Tue Oct 8 05:26:21 2019 kern.warn kernel: [32742.576359] [wifi1] FWLOG: [33546584] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x1ffe1e2
  118. Tue Oct 8 05:26:30 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 580AEED378C8DF43
  119. Tue Oct 8 05:26:30 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1420000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"32742.183980"}
  120. Tue Oct 8 05:31:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","ip_delta":"958250000","assoc_delta":"0","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
  121. Tue Oct 8 05:51:27 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
  122. Tue Oct 8 05:51:27 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  123. Tue Oct 8 05:51:27 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  124. Tue Oct 8 05:51:27 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  125. Tue Oct 8 05:51:27 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
  126. Tue Oct 8 05:51:28 2019 kern.warn kernel: [32742.576397] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [35089176] WAL_DBGID_SET_HW_FILTER ( 0x435f3c )
  127. Tue Oct 8 05:55:35 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  128. Tue Oct 8 05:55:35 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  129. Tue Oct 8 05:55:35 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  130. Tue Oct 8 05:55:35 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  131. Tue Oct 8 05:55:35 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  132. Tue Oct 8 05:55:36 2019 kern.warn kernel: [34497.766598] [wifi1] FWLOG: [35343702] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x21b4d64
  133. Tue Oct 8 05:55:36 2019 kern.warn kernel: [34497.766677] [wifi1] FWLOG: [35343716] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43610c )
  134. Tue Oct 8 05:55:36 2019 kern.warn kernel: [34497.766717] [wifi1] FWLOG: [35343741] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x1ff0401
  135. Tue Oct 8 05:55:40 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  136. Tue Oct 8 05:55:40 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 40:9c:28:1e:5c:93 /1
  137. Tue Oct 8 05:55:40 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  138. Tue Oct 8 05:55:40 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  139. Tue Oct 8 05:55:41 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath2 (reason:On other VAP)
  140. Tue Oct 8 05:55:41 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  141. Tue Oct 8 05:55:41 2019 kern.warn kernel: [34503.005038] ieee80211_ioctl_kickmac[15026]
  142. Tue Oct 8 05:55:41 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  143. Tue Oct 8 05:55:41 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"0"}
  144. Tue Oct 8 05:55:45 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"34497.282123"}
  145. Tue Oct 8 05:55:50 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 47760D0EDDB51871
  146. Tue Oct 8 05:55:51 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","event_type":"soft failure","assoc_delta":"10000","event_id":"1","ip_assign_type":"roamed","auth_ts":"34502.416527"}
  147. Tue Oct 8 05:56:09 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 40:9c:28:1e:5c:93 / 192.168.178.52
  148. Tue Oct 8 06:00:32 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  149. Tue Oct 8 06:01:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","ip_delta":"314600000","assoc_delta":"10000","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
  150. Tue Oct 8 06:01:58 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  151. Tue Oct 8 06:01:58 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  152. Tue Oct 8 06:01:58 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  153. Tue Oct 8 06:01:58 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  154. Tue Oct 8 06:01:58 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
  155. Tue Oct 8 06:01:59 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  156. Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.593878] ieee80211_ioctl_kickmac[15026]
  157. Tue Oct 8 06:01:59 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 40:9c:28:1e:5c:93 / 1
  158. Tue Oct 8 06:01:59 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"sta_leave","event_id":"1"}
  159. Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.808886] [wifi1] FWLOG: [35735810] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x2214910
  160. Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.808963] [wifi1] FWLOG: [35735824] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4361f4 )
  161. Tue Oct 8 06:01:59 2019 kern.warn kernel: [34880.809005] [wifi1] FWLOG: [35735848] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
  162. Tue Oct 8 06:02:00 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
  163. Tue Oct 8 06:02:00 2019 kern.warn kernel: [34881.677146] ieee80211_ioctl_kickmac[15026]
  164. Tue Oct 8 06:02:08 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session F47B1E62BBA3410D
  165. Tue Oct 8 06:02:08 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"10000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"34880.211013"}
  166. Tue Oct 8 06:02:09 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  167. Tue Oct 8 06:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: group key handshake completed (RSN)
  168. Tue Oct 8 06:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  169. Tue Oct 8 06:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
  170. Tue Oct 8 06:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
  171. Tue Oct 8 06:04:40 2019 kern.warn kernel: [35041.826073] [wifi1] [wifi1] FWLOG: [35900740] WAL_DBGID_SET_HW_FILTER ( 0x436024 )
  172. Tue Oct 8 06:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  173. Tue Oct 8 06:14:27 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  174. Tue Oct 8 06:20:28 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  175. Tue Oct 8 06:20:28 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
  176. Tue Oct 8 06:20:28 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  177. Tue Oct 8 06:20:28 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  178. Tue Oct 8 06:20:28 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
  179. Tue Oct 8 06:20:29 2019 kern.warn kernel: [35990.924529] [wifi1] FWLOG: [36872358] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x232a0b1
  180. Tue Oct 8 06:20:29 2019 kern.warn kernel: [35990.924607] [wifi1] FWLOG: [36872369] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4362dc )
  181. Tue Oct 8 06:20:29 2019 kern.warn kernel: [35990.924648] [wifi1] [wifi1] FWLOG: [36872596] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  182. Tue Oct 8 06:20:38 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 37081B4B77809764
  183. Tue Oct 8 06:20:38 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1650000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"35990.155274"}
  184. Tue Oct 8 06:22:56 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  185. Tue Oct 8 06:22:56 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  186. Tue Oct 8 06:22:56 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  187. Tue Oct 8 06:22:56 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  188. Tue Oct 8 06:22:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  189. Tue Oct 8 06:22:57 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  190. Tue Oct 8 06:22:57 2019 kern.warn kernel: [35998.925179] [wifi1] [wifi1] FWLOG: [37024199] RATE: ChainMask 1, phymode 1044489, ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x234f1d4
  191. Tue Oct 8 06:22:57 2019 kern.warn kernel: [36138.939713] [wifi1] FWLOG: [37024212] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4363c4 )
  192. Tue Oct 8 06:22:57 2019 kern.warn kernel: [36138.939756] [wifi1] FWLOG: [37024236] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x220401
  193. Tue Oct 8 06:23:06 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session F47B1E62BBA3410D
  194. Tue Oct 8 06:23:07 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"10000","event_type":"soft failure","assoc_delta":"0","event_id":"2","ip_assign_type":"roamed","auth_ts":"36138.443305"}
  195. Tue Oct 8 06:31:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"10000","ip_delta":"478500000","assoc_delta":"0","event_type":"fixup","event_id":"2","ip_assign_type":"dhcp","auth_ts":"0.0"}
  196. Tue Oct 8 06:41:15 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","arp_reply_gw_seen":"yes","event_type":"fixup","event_id":"2","auth_ts":"0.0"}
  197. Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  198. Tue Oct 8 06:48:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 40:9c:28:1e:5c:93 /1
  199. Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  200. Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  201. Tue Oct 8 06:48:39 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath2 (reason:On other VAP)
  202. Tue Oct 8 06:48:39 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  203. Tue Oct 8 06:48:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  204. Tue Oct 8 06:48:39 2019 kern.warn kernel: [36342.961892] [wifi1]
  205. Tue Oct 8 06:48:39 2019 kern.warn kernel: [37681.346822] ieee80211_ioctl_kickmac[15026]
  206. Tue Oct 8 06:48:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"2"}
  207. Tue Oct 8 06:48:49 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session FE12BB7D73375C84
  208. Tue Oct 8 06:48:49 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","event_type":"soft failure","assoc_delta":"10000","event_id":"1","ip_assign_type":"roamed","auth_ts":"37681.8863"}
  209. Tue Oct 8 06:49:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  210. Tue Oct 8 06:50:09 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 40:9c:28:1e:5c:93 / 192.168.178.52
  211. Tue Oct 8 06:51:14 2019 daemon.info hostapd: ath2: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  212. Tue Oct 8 06:51:14 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: 40:9c:28:1e:5c:93 /1
  213. Tue Oct 8 06:51:14 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: associated
  214. Tue Oct 8 06:51:14 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 WPA: pairwise key handshake completed (RSN)
  215. Tue Oct 8 06:51:14 2019 kern.warn kernel: [37836.115780] [wifi1] FWLOG: [38762460] RATE: ChainMask 1, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x24f77ea
  216. Tue Oct 8 06:51:14 2019 kern.warn kernel: [37836.115866] [wifi1] FWLOG: [38762474] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4364ac )
  217. Tue Oct 8 06:51:15 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
  218. Tue Oct 8 06:51:15 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  219. Tue Oct 8 06:51:15 2019 kern.warn kernel: [37836.642265] ieee80211_ioctl_kickmac[15026]
  220. Tue Oct 8 06:51:15 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 40:9c:28:1e:5c:93 / 1
  221. Tue Oct 8 06:51:15 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"sta_leave","event_id":"1"}
  222. Tue Oct 8 06:51:15 2019 kern.warn kernel: [37837.115856] [wifi1] FWLOG: [38762604] RATE: ChainMask 1, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffe, ht_mcs_set 0x00ff, legacy_rate_set 0x21b0401
  223. Tue Oct 8 06:51:16 2019 daemon.notice stamgr: kick-sta-on 40:9c:28:1e:5c:93 ath0 (reason:On other VAP)
  224. Tue Oct 8 06:51:16 2019 kern.warn kernel: [37837.729109] ieee80211_ioctl_kickmac[15026]
  225. Tue Oct 8 06:51:24 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 RADIUS: starting accounting session 27C277091C533594
  226. Tue Oct 8 06:51:24 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","event_type":"soft failure","assoc_delta":"0","event_id":"1","ip_assign_type":"roamed","auth_ts":"37836.13219"}
  227. Tue Oct 8 06:51:29 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: 40:9c:28:1e:5c:93 / 192.168.178.52
  228. Tue Oct 8 06:59:16 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
  229. Tue Oct 8 06:59:16 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 /1
  230. Tue Oct 8 06:59:16 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
  231. Tue Oct 8 06:59:16 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
  232. Tue Oct 8 06:59:17 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
  233. Tue Oct 8 06:59:26 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session B0CA838859F0F341
  234. Tue Oct 8 06:59:26 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","ip_delta":"1130000","assoc_delta":"10000","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"38318.114558"}
  235. Tue Oct 8 07:01:05 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath2","wpa_auth_delta":"20000","ip_delta":"580890000","assoc_delta":"0","event_type":"fixup","event_id":"1","ip_assign_type":"dhcp","auth_ts":"0.0"}
  236. Tue Oct 8 07:02:02 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"dns_resp_seen":"yes","assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","arp_reply_gw_seen":"yes","event_type":"fixup","event_id":"1","auth_ts":"0.0"}
  237. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916264]
  238. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916264] Could not find the peer
  239. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916326]
  240. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916326] Unable to process TX info
  241. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916352]
  242. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916352] Could not find the peer
  243. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916372]
  244. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38637.916372] Unable to process TX info
  245. Tue Oct 8 07:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: sta_stats
  246. Tue Oct 8 07:04:36 2019 daemon.info hostapd: ath2: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  247. Tue Oct 8 07:04:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: 40:9c:28:1e:5c:93 / 1
  248. Tue Oct 8 07:04:36 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"40:9c:28:1e:5c:93","vap":"ath2","event_type":"sta_leave","event_id":"1"}
  249. Tue Oct 8 07:04:36 2019 kern.warn kernel: [38638.198564] [wifi1] FWLOG: [39583541] WAL_DBGID_SET_HW_FILTER ( 0x4364ac )
  250. Tue Oct 8 07:04:37 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: group key handshake failed (RSN) after 4tries
  251. Tue Oct 8 07:04:37 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1 / 1
  252. Tue Oct 8 07:04:37 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","event_id":"1"}
  253. Tue Oct 8 07:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  254. Tue Oct 8 07:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
  255. Tue Oct 8 07:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
  256. Tue Oct 8 07:04:40 2019 kern.warn kernel: [38642.198972] [wifi1] [wifi1] FWLOG: [39587032] WAL_DBGID_SET_HW_FILTER ( 0x4362dc )
  257. Tue Oct 8 07:04:42 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: deauthenticated due to local deauth request
  258. Tue Oct 8 07:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  259. Tue Oct 8 07:14:36 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  260. Tue Oct 8 07:14:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
  261. Tue Oct 8 07:14:36 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  262. Tue Oct 8 07:14:36 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  263. Tue Oct 8 07:14:36 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
  264. Tue Oct 8 07:14:36 2019 kern.warn kernel: [39238.263596] [wifi1] FWLOG: [40198179] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x265602d
  265. Tue Oct 8 07:14:36 2019 kern.warn kernel: [39238.263673] [wifi1] FWLOG: [40198189] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x436594 )
  266. Tue Oct 8 07:14:36 2019 kern.warn kernel: [39238.263713] [wifi1] FWLOG: [40198214] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x220401
  267. Tue Oct 8 07:14:46 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 830FF3C7F0FCD452
  268. Tue Oct 8 07:14:46 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1220000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"39238.125734"}
  269. Tue Oct 8 07:22:59 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
  270. Tue Oct 8 07:22:59 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 /1
  271. Tue Oct 8 07:22:59 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
  272. Tue Oct 8 07:22:59 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
  273. Tue Oct 8 07:22:59 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
  274. Tue Oct 8 07:23:09 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session CCB004E5DAF8A736
  275. Tue Oct 8 07:23:09 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","auth_delta":"0","vap":"ath0","wpa_auth_delta":"30000","ip_delta":"140000","assoc_delta":"10000","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"39740.913641"}
  276. Tue Oct 8 07:23:34 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=40:9c:28:1e:5c:93 status_code=0
  277. Tue Oct 8 07:23:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","auth_failures":"1","mac":"40:9c:28:1e:5c:93","vap":"ath0","event_type":"failure","event_id":"1","auth_ts":"39776.136227"}
  278. Tue Oct 8 07:23:58 2019 daemon.info hostapd: ath0: STA 40:9c:28:1e:5c:93 IEEE 802.11: disassociated
  279. Tue Oct 8 07:28:44 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: sta_stats
  280. Tue Oct 8 07:28:44 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: disassociated
  281. Tue Oct 8 07:28:44 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1 / 1
  282. Tue Oct 8 07:28:44 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","event_id":"1"}
  283. Tue Oct 8 08:04:39 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  284. Tue Oct 8 08:04:39 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath1: ec:35:86:41:f6:5a / 1
  285. Tue Oct 8 08:04:39 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath1","event_type":"sta_leave","event_id":"1"}
  286. Tue Oct 8 08:04:40 2019 kern.warn kernel: [39239.263663] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [43273328] WAL_DBGID_SET_HW_FILTER ( 0x436594 )
  287. Tue Oct 8 08:04:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  288. Tue Oct 8 08:08:44 2019 daemon.info hostapd: ath1: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  289. Tue Oct 8 08:08:44 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath1: ec:35:86:41:f6:5a /1
  290. Tue Oct 8 08:08:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  291. Tue Oct 8 08:08:44 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  292. Tue Oct 8 08:08:44 2019 user.info : wevent[5523]: wevent.ubnt_custom_event(): EVENT_STA_IP ath1: ec:35:86:41:f6:5a / 192.168.178.88
  293. Tue Oct 8 08:08:45 2019 kern.warn kernel: [42486.602685] [wifi1] FWLOG: [43524002] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x2981fac
  294. Tue Oct 8 08:08:45 2019 kern.warn kernel: [42486.602764] [wifi1] FWLOG: [43524012] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43667c )
  295. Tue Oct 8 08:08:45 2019 kern.warn kernel: [42486.602804] [wifi1] [wifi1] FWLOG: [43524238] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0xcf0401
  296. Tue Oct 8 08:08:54 2019 daemon.info hostapd: ath1: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 8F4068061E00530D
  297. Tue Oct 8 08:08:54 2019 user.info : stahtd[5524]: [STA-TRACKER].stahtd_dump_event(): {"assoc_status":"0","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","arp_reply_gw_seen":"yes","auth_delta":"0","vap":"ath1","wpa_auth_delta":"10000","ip_delta":"1970000","assoc_delta":"0","event_type":"success","event_id":"1","ip_assign_type":"dhcp","auth_ts":"42486.95176"}
  298. Tue Oct 8 08:47:14 2019 user.info : mcad[5675]: ace_reporter.reporter_handle_response(): cfgversion: 54ae48916cb0ddd9 -> d34edcd5c30955a7
  299. Tue Oct 8 08:47:18 2019 user.info : mcad[5675]: ace_reporter.reporter_handle_response(): [setparam] applying new system.cfg
  300. Tue Oct 8 08:47:25 2019 authpriv.info dropbear[5826]: Early exit: Terminated by signal
  301. Tue Oct 8 08:47:44 2019 daemon.info lldpcli[13048]: lldpd should resume operations
  302. Tue Oct 8 08:47:44 2019 daemon.info logread[13050]: failed to send log data to 60.251.196.251:514 via udp
  303. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.003643] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
  304. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.030488] ieee80211_ioctl_siwmode: imr.ifm_active=131712, new mode=3, valid=1
  305. Tue Oct 8 08:47:44 2019 user.err : mcad[13051]: mcad.mca_daemon_main(): Another instance is running, aborting...
  306. Tue Oct 8 08:47:44 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 13051) exited with status 25600. Schedulingfor restart (alert sent).
  307. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.048109] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
  308. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.068025] DEVICE IS DOWN ifname=ath0
  309. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.068118] DEVICE IS DOWN ifname=ath0
  310. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.078940] DEVICE IS DOWN ifname=ath1
  311. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.079039] DEVICE IS DOWN ifname=ath1
  312. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.088881] DEVICE IS DOWN ifname=ath2
  313. Tue Oct 8 08:47:44 2019 kern.warn kernel: [44826.088975] DEVICE IS DOWN ifname=ath2
  314. Tue Oct 8 08:47:44 2019 daemon.err snmpd[13045]: MIB search path: //.snmp/mibs:/usr/share/snmp/mibs
  315. Tue Oct 8 08:47:45 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_protocol_init(): UBNT_DEVICE[b4:fb:e4:f3:9a:c2]
  316. Tue Oct 8 08:47:45 2019 user.info : utermd[13054]: utermd.utermd_main(): server up, fd:3, pid:13054
  317. Tue Oct 8 08:47:45 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_protocol_init(): mcast_ip is 239.254.127.63
  318. Tue Oct 8 08:47:45 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_protocol_init(): ubnt_protocol init done
  319. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.741024] wmi_unified_vdev_stop_send for vap 1 (84ff0000)
  320. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.741103] STOPPED EVENT for vap 1 (84ff0000)
  321. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.867274] wlan_get_active_vport_chan: ch=0
  322. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875361] ol_ath_vap_join: join operation is only for STA/IBSS mode
  323. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875405] ol_if_dfs_configure: called
  324. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875417] ol_if_dfs_configure: ETSI domain
  325. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875430] ol_if_dfs_disable: called
  326. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875784] ol_if_dfs_enable: called
  327. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875810] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
  328. Tue Oct 8 08:47:45 2019 kern.warn kernel: [44826.875852] cac_start chan 5500 timeout 62 sec, curr time: 44526 sec
  329. Tue Oct 8 08:47:46 2019 kern.info kernel: [44827.866504] br0: port 4(ath2) entered blocking state
  330. Tue Oct 8 08:47:46 2019 kern.info kernel: [44827.866535] br0: port 4(ath2) entered forwarding state
  331. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.867631] wmi_unified_vdev_stop_send for vap 0 (84ff0000)
  332. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.867826] STOPPED EVENT for vap 0 (84ff0000)
  333. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997279] wlan_get_active_vport_chan: ch=0
  334. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997624] ol_ath_vap_join: join operation is only for STA/IBSS mode
  335. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997650] ol_if_dfs_configure: called
  336. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997662] ol_if_dfs_configure: ETSI domain
  337. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.997674] ol_if_dfs_disable: called
  338. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.998016] ol_if_dfs_enable: called
  339. Tue Oct 8 08:47:46 2019 kern.warn kernel: [44827.998074] cac_start chan 5500 timeout 62 sec, curr time: 44527 sec
  340. Tue Oct 8 08:47:47 2019 kern.info kernel: [44828.996525] br0: port 3(ath1) entered blocking state
  341. Tue Oct 8 08:47:47 2019 kern.info kernel: [44828.996560] br0: port 3(ath1) entered forwarding state
  342. Tue Oct 8 08:47:47 2019 kern.warn kernel: [44829.157277] wlan_get_active_vport_chan: ch=0
  343. Tue Oct 8 08:47:47 2019 kern.info kernel: [44829.157838] br0: port 2(ath0) entered blocking state
  344. Tue Oct 8 08:47:47 2019 kern.info kernel: [44829.157872] br0: port 2(ath0) entered forwarding state
  345. Tue Oct 8 08:47:47 2019 kern.info kernel: [44829.159417] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
  346. Tue Oct 8 08:47:49 2019 user.notice ortix: netconsole init failed, error 2
  347. Tue Oct 8 08:47:52 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=28:c2:dd:e5:12:e5 status_code=0
  348. Tue Oct 8 08:47:52 2019 user.err : wevent[13055]: ubnt_protocol.ubnt_stainfo_send(): failed to send ubnt wevent (len:88), Network unreachable
  349. Tue Oct 8 08:47:52 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: associated
  350. Tue Oct 8 08:47:52 2019 user.info : wevent[13055]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 28:c2:dd:e5:12:e5 / 1
  351. Tue Oct 8 08:47:52 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: pairwise key handshake completed (RSN)
  352. Tue Oct 8 08:47:53 2019 user.err : wevent[13055]: ubnt_protocol.ubnt_stainfo_send(): failed to send ubnt wevent (len:88), Network unreachable
  353. Tue Oct 8 08:47:53 2019 user.info : wevent[13055]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 28:c2:dd:e5:12:e5 / 192.168.178.108
  354. Tue Oct 8 08:47:53 2019 user.notice syswrapper: ipready.br0 = 192.168.1.20
  355. Tue Oct 8 08:47:53 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 13042) exited with status 9. Scheduling for restart (no alert sent).
  356. Tue Oct 8 08:47:53 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
  357. Tue Oct 8 08:47:53 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.1.20
  358. Tue Oct 8 08:47:53 2019 user.err : wevent[13055]: ubnt_protocol.ubnt_multicast_socket_init(): already drop membership
  359. Tue Oct 8 08:47:53 2019 authpriv.info dropbear[13171]: Not backgrounding
  360. Tue Oct 8 08:47:54 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=36 (max=300)
  361. Tue Oct 8 08:47:54 2019 user.err : mcad[13172]: mcad.mca_daemon_main(): Another instance is running, aborting...
  362. Tue Oct 8 08:47:54 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 13172) exited with status 25600. Schedulingfor restart (alert sent).
  363. Tue Oct 8 08:47:58 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 13044) exited with status 0. Scheduling for restart (no alert sent).
  364. Tue Oct 8 08:47:58 2019 daemon.warn lldpd[13180]: no privilege separation available
  365. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol LLDP enabled and forced
  366. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol CDPv1 disabled
  367. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol CDPv2 disabled
  368. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol SONMP disabled
  369. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol EDP disabled
  370. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: protocol FDP disabled
  371. Tue Oct 8 08:47:58 2019 daemon.info lldpd[13180]: libevent 2.0.22-stable initialized with epoll method
  372. Tue Oct 8 08:47:58 2019 daemon.info lldpcli[13181]: lldpd should resume operations
  373. Tue Oct 8 08:47:59 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.1.20 res=
  374. Tue Oct 8 08:47:59 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=ath1 nas_ip=192.168.1.20 res=
  375. Tue Oct 8 08:47:59 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.1.20 res=
  376. Tue Oct 8 08:48:02 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 RADIUS: starting accounting session 5BAD774E452ED8FC
  377. Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119266] eth0: link up (100Mbps/Full duplex)
  378. Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119467] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  379. Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119607] br0: port 1(eth0) entered blocking state
  380. Tue Oct 8 08:48:03 2019 kern.info kernel: [44845.119636] br0: port 1(eth0) entered forwarding state
  381. Tue Oct 8 08:48:04 2019 user.err : mcad[13207]: mcad.mca_daemon_main(): Another instance is running, aborting...
  382. Tue Oct 8 08:48:04 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 13207) exited with status 25600. Schedulingfor restart (alert sent).
  383. Tue Oct 8 08:48:04 2019 user.info : mca-ctrl[13078]: mca-client.service_json(): failed to contact mcad
  384. Tue Oct 8 08:48:04 2019 user.info : mcad[5675]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
  385. Tue Oct 8 08:48:04 2019 user.info : mcad[5675]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
  386. Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.reporter_reload_config(): authkey=B542B8A70975764F1E71EAAEE14AD003
  387. Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
  388. Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
  389. Tue Oct 8 08:48:14 2019 user.info : mcad[13208]: ace_reporter.set_default_localtime(): time is ready
  390. Tue Oct 8 08:48:14 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=56 (max=300)
  391. Tue Oct 8 08:48:15 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
  392. Tue Oct 8 08:48:15 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): initial contact failed #1, url=http://178.85.165.24:8080/inform, rc=11
  393. Tue Oct 8 08:48:22 2019 user.info : mca-ctrl[13206]: mca-client.service_json(): failed to contact mcad
  394. Tue Oct 8 08:48:22 2019 user.info : stahtd[13056]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","assoc_delta":"10000","mac":"28:c2:dd:e5:12:e5","vap":"ath0","ip_assign_type":"roamed","event_type":"soft failure","assoc_status":"0","auth_delta":"0","wpa_auth_delta":"80000","event_id":"1","auth_ts":"44834.405856"}
  395. Tue Oct 8 08:48:25 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=66 (max=300)
  396. Tue Oct 8 08:48:25 2019 user.info : stahtd[13056]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","dns_resp_seen":"yes","vap":"ath0","mac":"28:c2:dd:e5:12:e5","event_type":"fixup","auth_ts":"0.0","assoc_status":"0","event_id":"1"}
  397. Tue Oct 8 08:48:29 2019 daemon.info logread[13050]: Logread connected to 60.251.196.251:514
  398. Tue Oct 8 08:48:29 2019 user.notice syswrapper: ipready.br0 = 192.168.178.150
  399. Tue Oct 8 08:48:29 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 13171) exited with status 9. Scheduling for restart (no alert sent).
  400. Tue Oct 8 08:48:29 2019 daemon.notice procd: process '/usr/sbin/ntpclient' (pid 13041) exited with status 0. Scheduling for restart (no alert sent).
  401. Tue Oct 8 08:48:29 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
  402. Tue Oct 8 08:48:29 2019 user.info : wevent[13055]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.178.150
  403. Tue Oct 8 08:48:29 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 13180) exited with status 0. Scheduling for restart (no alert sent).
  404. Tue Oct 8 08:48:29 2019 authpriv.info dropbear[13325]: Not backgrounding
  405. Tue Oct 8 08:48:30 2019 daemon.warn lldpd[13331]: no privilege separation available
  406. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol LLDP enabled and forced
  407. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol CDPv1 disabled
  408. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol CDPv2 disabled
  409. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol SONMP disabled
  410. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol EDP disabled
  411. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: protocol FDP disabled
  412. Tue Oct 8 08:48:30 2019 daemon.info lldpd[13331]: libevent 2.0.22-stable initialized with epoll method
  413. Tue Oct 8 08:48:30 2019 daemon.info lldpcli[13332]: lldpd should resume operations
  414. Tue Oct 8 08:48:30 2019 user.info : mcad[13208]: ace_reporter.reporter_set_managed(): [STATE] enter MANAGED
  415. Tue Oct 8 08:48:30 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.178.150 res=
  416. Tue Oct 8 08:48:30 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=ath1 nas_ip=192.168.178.150 res=
  417. Tue Oct 8 08:48:30 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.178.150 res=
  418. Tue Oct 8 08:48:48 2019 kern.warn kernel: [44890.116280] cac_timeout cac expired, chan 5500 curr time 44590
  419. Tue Oct 8 08:48:48 2019 kern.warn kernel: [44890.116377] wmi_unified_vdev_up_send for vap 0 (84ff0000)
  420. Tue Oct 8 08:48:48 2019 kern.warn kernel: [44890.116437] wmi_unified_vdev_up_send for vap 1 (84ff0000)
  421. Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.619333] console [netcon_ext0] disabled
  422. Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.619374] console [netcon0] disabled
  423. Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.629779] console [netcon0] enabled
  424. Tue Oct 8 08:48:50 2019 kern.info kernel: [44891.629984] netconsole: network logging started
  425. Tue Oct 8 08:49:44 2019 user.info : mcad[13208]: ace_reporter.reporter_handle_response(): cfgversion: d34edcd5c30955a7-> 9022292276f25a08
  426. Tue Oct 8 08:49:48 2019 user.info : mcad[13208]: ace_reporter.reporter_handle_response(): [setparam] applying new system.cfg
  427. Tue Oct 8 08:49:55 2019 user.info : mca-monitor[13052]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=6(max=300)
  428. Tue Oct 8 08:49:55 2019 authpriv.info dropbear[13325]: Early exit: Terminated by signal
  429. Tue Oct 8 08:50:15 2019 daemon.info lldpcli[14397]: lldpd should resume operations
  430. Tue Oct 8 08:50:15 2019 daemon.info logread[14396]: failed to send log data to 60.251.196.251:514 via udp
  431. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.515458] ieee80211_ioctl_siwmode: imr.ifm_active=131712, new mode=3, valid=1
  432. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.553797] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
  433. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.580085] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
  434. Tue Oct 8 08:50:16 2019 user.err : mcad[14399]: mcad.mca_daemon_main(): Another instance is running, aborting...
  435. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.594401] ieee80211_ioctl_siwmode: imr.ifm_active=66176, new mode=3, valid=1
  436. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.595117] ieee80211_ioctl_siwmode: imr.ifm_active=131712, new mode=3, valid=1
  437. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.598960] DEVICE IS DOWN ifname=ath0
  438. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.599057] DEVICE IS DOWN ifname=ath0
  439. Tue Oct 8 08:50:16 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 14399) exited with status 25600. Schedulingfor restart (alert sent).
  440. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.622212] DEVICE IS DOWN ifname=vwire1
  441. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.622308] DEVICE IS DOWN ifname=vwire1
  442. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.636399] DEVICE IS DOWN ifname=vwire4
  443. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.636491] DEVICE IS DOWN ifname=vwire4
  444. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.658265] DEVICE IS DOWN ifname=ath2
  445. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.658360] DEVICE IS DOWN ifname=ath2
  446. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.667320] DEVICE IS DOWN ifname=ath3
  447. Tue Oct 8 08:50:16 2019 kern.warn kernel: [44977.667416] DEVICE IS DOWN ifname=ath3
  448. Tue Oct 8 08:50:16 2019 daemon.err snmpd[14393]: MIB search path: //.snmp/mibs:/usr/share/snmp/mibs
  449. Tue Oct 8 08:50:16 2019 user.info : utermd[14402]: utermd.utermd_main(): server up, fd:3, pid:14402
  450. Tue Oct 8 08:50:16 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_protocol_init(): UBNT_DEVICE[b4:fb:e4:f3:9a:c2]
  451. Tue Oct 8 08:50:16 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_protocol_init(): mcast_ip is 239.254.127.63
  452. Tue Oct 8 08:50:16 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_protocol_init(): ubnt_protocol init done
  453. Tue Oct 8 08:50:17 2019 kern.warn kernel: [44978.517328] wlan_get_active_vport_chan: ch=0
  454. Tue Oct 8 08:50:17 2019 kern.info kernel: [44978.517902] br0: port 2(ath0) entered blocking state
  455. Tue Oct 8 08:50:17 2019 kern.info kernel: [44978.517930] br0: port 2(ath0) entered forwarding state
  456. Tue Oct 8 08:50:17 2019 kern.info kernel: [44978.519274] IPv6: ADDRCONF(NETDEV_CHANGE): br0: link becomes ready
  457. Tue Oct 8 08:50:19 2019 kern.warn kernel: [44981.348494] wlan_get_active_vport_chan: ch=0
  458. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.477278] wlan_get_active_vport_chan: ch=0
  459. Tue Oct 8 08:50:20 2019 kern.info kernel: [44981.478178] br0: port 3(vwire1) entered blocking state
  460. Tue Oct 8 08:50:20 2019 kern.info kernel: [44981.478207] br0: port 3(vwire1) entered forwarding state
  461. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.607280] wlan_get_active_vport_chan: ch=0
  462. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.622986] wmi_unified_vdev_stop_send for vap 2 (849b0000)
  463. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.623341] STOPPED EVENT for vap 2 (849b0000)
  464. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.747385] wlan_get_active_vport_chan: ch=0
  465. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755427] ol_ath_vap_join: join operation is only for STA/IBSS mode
  466. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755487] ol_if_dfs_configure: called
  467. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755499] ol_if_dfs_configure: ETSI domain
  468. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755512] ol_if_dfs_disable: called
  469. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755859] ol_if_dfs_enable: called
  470. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755885] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
  471. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755900] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
  472. Tue Oct 8 08:50:20 2019 kern.warn kernel: [44981.755945] cac_start chan 5500 timeout 62 sec, curr time: 44681 sec
  473. Tue Oct 8 08:50:20 2019 user.notice ortix: netconsole init failed, error 2
  474. Tue Oct 8 08:50:21 2019 kern.info kernel: [44982.746695] br0: port 6(vwire4) entered blocking state
  475. Tue Oct 8 08:50:21 2019 kern.info kernel: [44982.746724] br0: port 6(vwire4) entered forwarding state
  476. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.747493] wmi_unified_vdev_stop_send for vap 0 (849b0000)
  477. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.747664] STOPPED EVENT for vap 0 (849b0000)
  478. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877274] wlan_get_active_vport_chan: ch=0
  479. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877614] ol_ath_vap_join: join operation is only for STA/IBSS mode
  480. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877636] ol_if_dfs_configure: called
  481. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877648] ol_if_dfs_configure: ETSI domain
  482. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.877660] ol_if_dfs_disable: called
  483. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.878050] ol_if_dfs_enable: called
  484. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.878100] ieee80211_dfs_send_dfs_wait[304] VAP chan mismatch vap 5180 ic 5500
  485. Tue Oct 8 08:50:21 2019 kern.warn kernel: [44982.878127] cac_start chan 5500 timeout 62 sec, curr time: 44682 sec
  486. Tue Oct 8 08:50:22 2019 kern.info kernel: [44983.876567] br0: port 4(ath2) entered blocking state
  487. Tue Oct 8 08:50:22 2019 kern.info kernel: [44983.876602] br0: port 4(ath2) entered forwarding state
  488. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44983.879702] wmi_unified_vdev_stop_send for vap 1 (849b0000)
  489. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44983.880282] STOPPED EVENT for vap 1 (849b0000)
  490. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007277] wlan_get_active_vport_chan: ch=0
  491. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007636] ol_ath_vap_join: join operation is only for STA/IBSS mode
  492. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007660] ol_if_dfs_configure: called
  493. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007672] ol_if_dfs_configure: ETSI domain
  494. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.007684] ol_if_dfs_disable: called
  495. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.008026] ol_if_dfs_enable: called
  496. Tue Oct 8 08:50:22 2019 kern.warn kernel: [44984.008079] cac_start chan 5500 timeout 62 sec, curr time: 44683 sec
  497. Tue Oct 8 08:50:23 2019 kern.info kernel: [44985.007966] br0: port 5(ath3) entered blocking state
  498. Tue Oct 8 08:50:23 2019 kern.info kernel: [44985.007999] br0: port 5(ath3) entered forwarding state
  499. Tue Oct 8 08:50:24 2019 user.notice syswrapper: ipready.br0 = 192.168.1.20
  500. Tue Oct 8 08:50:24 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 14390) exited with status 9. Scheduling for restart (no alert sent).
  501. Tue Oct 8 08:50:24 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
  502. Tue Oct 8 08:50:24 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.1.20
  503. Tue Oct 8 08:50:24 2019 user.err : wevent[14405]: ubnt_protocol.ubnt_multicast_socket_init(): already drop membership
  504. Tue Oct 8 08:50:25 2019 authpriv.info dropbear[14562]: Not backgrounding
  505. Tue Oct 8 08:50:26 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=37 (max=300)
  506. Tue Oct 8 08:50:26 2019 user.err : mcad[14563]: mcad.mca_daemon_main(): Another instance is running, aborting...
  507. Tue Oct 8 08:50:26 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 14563) exited with status 25600. Schedulingfor restart (alert sent).
  508. Tue Oct 8 08:50:29 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 14392) exited with status 0. Scheduling for restart (no alert sent).
  509. Tue Oct 8 08:50:30 2019 daemon.warn lldpd[14571]: no privilege separation available
  510. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol LLDP enabled and forced
  511. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol CDPv1 disabled
  512. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol CDPv2 disabled
  513. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol SONMP disabled
  514. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol EDP disabled
  515. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: protocol FDP disabled
  516. Tue Oct 8 08:50:30 2019 daemon.info lldpd[14571]: libevent 2.0.22-stable initialized with epoll method
  517. Tue Oct 8 08:50:30 2019 daemon.info lldpcli[14572]: lldpd should resume operations
  518. Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa5.cfg iterface=vwire4 nas_ip=192.168.1.20res=
  519. Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa4.cfg iterface=ath3 nas_ip=192.168.1.20 res=
  520. Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.1.20 res=
  521. Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=vwire1 nas_ip=192.168.1.20res=
  522. Tue Oct 8 08:50:31 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.1.20 res=
  523. Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479385] eth0: link up (100Mbps/Full duplex)
  524. Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479436] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
  525. Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479572] br0: port 1(eth0) entered blocking state
  526. Tue Oct 8 08:50:35 2019 kern.info kernel: [44996.479603] br0: port 1(eth0) entered forwarding state
  527. Tue Oct 8 08:50:36 2019 user.err : mcad[14608]: mcad.mca_daemon_main(): Another instance is running, aborting...
  528. Tue Oct 8 08:50:36 2019 daemon.notice procd: process '/usr/bin/mcad' (pid 14608) exited with status 25600. Schedulingfor restart (alert sent).
  529. Tue Oct 8 08:50:43 2019 user.info : mca-ctrl[14521]: mca-client.service_json(): failed to contact mcad
  530. Tue Oct 8 08:50:43 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
  531. Tue Oct 8 08:50:43 2019 user.err : mcad[13208]: ace_reporter.reporter_fail(): initial contact failed #1, url=http://178.85.165.24:8080/inform, rc=11
  532. Tue Oct 8 08:50:43 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
  533. Tue Oct 8 08:50:43 2019 user.info : mcad[13208]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
  534. Tue Oct 8 08:50:46 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.checkin is -18 ago (max=200)
  535. Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.reporter_reload_config(): authkey=B542B8A70975764F1E71EAAEE14AD003
  536. Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.reporter_reload(): [MCAD] Self-Run Beaconing enabled !
  537. Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.reporter_reload(): [MCAD] Discovery Response disbled !
  538. Tue Oct 8 08:50:46 2019 user.info : mcad[14609]: ace_reporter.set_default_localtime(): time is ready
  539. Tue Oct 8 08:50:46 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
  540. Tue Oct 8 08:50:46 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): initial contact failed #1, url=http://178.85.165.24:8080/inform, rc=11
  541. Tue Oct 8 08:50:49 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 IEEE 802.11: disassociated
  542. Tue Oct 8 08:50:56 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=67 (max=300)
  543. Tue Oct 8 08:51:01 2019 daemon.info logread[14396]: Logread connected to 60.251.196.251:514
  544. Tue Oct 8 08:51:01 2019 user.notice syswrapper: ipready.br0 = 192.168.178.150
  545. Tue Oct 8 08:51:02 2019 daemon.notice procd: process '/usr/sbin/dropbear' (pid 14562) exited with status 9. Scheduling for restart (no alert sent).
  546. Tue Oct 8 08:51:02 2019 daemon.notice procd: process '/usr/sbin/ntpclient' (pid 14389) exited with status 0. Scheduling for restart (no alert sent).
  547. Tue Oct 8 08:51:02 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): Get DHCP IP
  548. Tue Oct 8 08:51:02 2019 user.info : wevent[14405]: ubnt_protocol.ubnt_usr1_handler(): my_ip is 192.168.178.150
  549. Tue Oct 8 08:51:02 2019 daemon.notice procd: process '/usr/sbin/lldpd' (pid 14571) exited with status 0. Scheduling for restart (no alert sent).
  550. Tue Oct 8 08:51:02 2019 user.info : mcad[14609]: ace_reporter.reporter_set_managed(): [STATE] enter MANAGED
  551. Tue Oct 8 08:51:02 2019 authpriv.info dropbear[14849]: Not backgrounding
  552. Tue Oct 8 08:51:02 2019 daemon.warn lldpd[14862]: no privilege separation available
  553. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol LLDP enabled and forced
  554. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol CDPv1 disabled
  555. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol CDPv2 disabled
  556. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol SONMP disabled
  557. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol EDP disabled
  558. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: protocol FDP disabled
  559. Tue Oct 8 08:51:02 2019 daemon.info lldpd[14862]: libevent 2.0.22-stable initialized with epoll method
  560. Tue Oct 8 08:51:02 2019 daemon.info lldpcli[14863]: lldpd should resume operations
  561. Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa1.cfg iterface=ath0 nas_ip=192.168.178.150 res=
  562. Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa2.cfg iterface=vwire1 nas_ip=192.168.178.150 res=
  563. Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa3.cfg iterface=ath2 nas_ip=192.168.178.150 res=
  564. Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa4.cfg iterface=ath3 nas_ip=192.168.178.150 res=
  565. Tue Oct 8 08:51:03 2019 user.notice syswrapper: hostapd update: conf=/etc/aaa5.cfg iterface=vwire4 nas_ip=192.168.178.150 res=
  566. Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.303095] console [netcon_ext0] disabled
  567. Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.303136] console [netcon0] disabled
  568. Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.313255] console [netcon0] enabled
  569. Tue Oct 8 08:51:21 2019 kern.info kernel: [45043.313459] netconsole: network logging started
  570. Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116268] cac_timeout cac expired, chan 5500 curr time 44746
  571. Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116394] wmi_unified_vdev_up_send for vap 0 (849b0000)
  572. Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116469] wmi_unified_vdev_up_send for vap 1 (849b0000)
  573. Tue Oct 8 08:51:24 2019 kern.warn kernel: [45046.116533] wmi_unified_vdev_up_send for vap 2 (849b0000)
  574. Tue Oct 8 08:53:50 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=28:c2:dd:e5:12:e5 status_code=0
  575. Tue Oct 8 08:53:50 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 28:c2:dd:e5:12:e5 / 1
  576. Tue Oct 8 08:53:50 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: associated
  577. Tue Oct 8 08:53:50 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: pairwise key handshake completed (RSN)
  578. Tue Oct 8 08:53:51 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 28:c2:dd:e5:12:e5 / 192.168.178.108
  579. Tue Oct 8 08:54:00 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"70000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"10000","ip_assign_type":"roamed","event_id":"1","auth_ts":"45192.209004"}
  580. Tue Oct 8 08:54:00 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 RADIUS: starting accounting session 0ED6F388262D3DAD
  581. Tue Oct 8 09:02:53 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  582. Tue Oct 8 09:02:53 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  583. Tue Oct 8 09:02:53 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  584. Tue Oct 8 09:02:53 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  585. Tue Oct 8 09:02:53 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  586. Tue Oct 8 09:02:54 2019 kern.warn kernel: [45735.501791] [wifi1] FWLOG: [46850936] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x2cae385
  587. Tue Oct 8 09:02:54 2019 kern.warn kernel: [45735.501869] [wifi1] FWLOG: [46850949] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x434e04 )
  588. Tue Oct 8 09:02:54 2019 kern.warn kernel: [45735.501909] [wifi1] FWLOG: [46850975] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  589. Tue Oct 8 09:03:03 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 8CD163651E24F603
  590. Tue Oct 8 09:03:03 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1520000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"45735.143618"}
  591. Tue Oct 8 09:13:29 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1168600000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"70000","auth_delta":"0","event_type":"fixup","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"0.0"}
  592. Tue Oct 8 09:50:19 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: group key handshake completed (RSN)
  593. Tue Oct 8 09:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  594. Tue Oct 8 09:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  595. Tue Oct 8 09:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  596. Tue Oct 8 09:50:28 2019 kern.warn kernel: [45737.502175] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [49773255] WAL_DBGID_SET_HW_FILTER ( 0x434e04 )
  597. Tue Oct 8 09:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  598. Tue Oct 8 09:57:01 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  599. Tue Oct 8 09:57:01 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  600. Tue Oct 8 09:57:01 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  601. Tue Oct 8 09:57:01 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  602. Tue Oct 8 09:57:01 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  603. Tue Oct 8 09:57:02 2019 kern.warn kernel: [48983.754458] [wifi1] FWLOG: [50176785] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x2fda31d
  604. Tue Oct 8 09:57:02 2019 kern.warn kernel: [48983.754535] [wifi1] FWLOG: [50176797] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x434eec )
  605. Tue Oct 8 09:57:02 2019 kern.warn kernel: [48983.754576] [wifi1] FWLOG: [50176820] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x8000204
  606. Tue Oct 8 09:57:11 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 3445879784BF3334
  607. Tue Oct 8 09:57:11 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1920000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"48983.63917"}
  608. Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"87940e62-c3da-4513-8b8d-86073eb3e89c", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
  609. Tue Oct 8 10:00:42 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<87940e62-c3da-4513-8b8d-86073eb3e89c>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<dd2ac0a7e000e4edb9f5bd3bc110bb0e0c487fdb1d9e873f5b67156140b96464>
  610. Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" offer start creating
  611. Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" (1,1) offer sent, now waiting for answer
  612. Tue Oct 8 10:00:42 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 3873579965 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:zZi80JwLyZuR9q9c a=ice-pwd:85wEhhCRKIrNok3NipDYCQdx a=fingerprint:sha-256 85:6C:C1:AE:99:D9:F7:E9:86:0B:EC:91:77:7F:F6:36:85:2F:C1:4D:92:2A:7D:FA:55:06:57:04:C2:4B:F4:5F a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130701311 192.168.178.150 59108 typ host generation 0 ufrag zZi80JwLyZuR9q9c a=candidate:2317678234 1 udp 1694493695 213.46.59.215 59108 typ srflx raddr 192.168.178.150 rport 59108 generation 0 ufrag zZi80JwLyZuR9q9c ===
  613. Tue Oct 8 10:00:44 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" recving answer
  614. Tue Oct 8 10:00:44 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" answer parsed successfully, going to build up connection
  615. Tue Oct 8 10:00:44 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<87940e62-c3da-4513-8 a=candidate:854292265 1 udp 2113937151 5b1b47bd-c2d0-479a-af53-0eb9966bc893.local 59059 typ host generation 0 network-c a=candidate:2377513972 1 udp 2113932031 665615d0-2b65-446d-98c1-229de69a6e8a.local 59060 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 176.74.237.161 59059 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 9 a=candidate:2686458394 1 udp 33562367 18.195.48.247 59228 typ relay raddr 176.74.237.161 rport 59059 generation 0 netwo a=scd:datativesha-256 98:6B:CF:37:23:CD:8F:BE:85:18:43:31:DA:EC:CF:7D:BD:73:A4:47:A7:53:7F:5D:AC:65:63:F2:49:E4:6F:64
  616. Tue Oct 8 10:00:44 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<87940e62-c3da-4513-8b8d-86073eb3e89c>
  617. Tue Oct 8 10:01:31 2019 user.info : utermd[14402]: utermd.SignalConnectionTerminated(): Disconnected: 0x80060017/WebRTC connection interrupted from far side
  618. Tue Oct 8 10:01:31 2019 user.warn : utermd[14402]: utermd.house_keeper(): Pulse failed, turns to garbage. ret:0x80060017/WebRTC connection interrupted from far side
  619. Tue Oct 8 10:01:31 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "87940e62-c3da-4513-8b8d-86073eb3e89c" clean up
  620. Tue Oct 8 10:01:31 2019 user.info : mcad[14609]: libubnt_webrtc.close_sdp_session(): SDP close: uuid<87940e62-c3da-4513-8b8d-86073eb3e89c>
  621. Tue Oct 8 10:02:41 2019 user.info : mcad[14609]: ace_reporter.reporter_handle_response(): cfgversion: 9022292276f25a08-> 303581d4f7e1e192
  622. Tue Oct 8 10:02:45 2019 user.info : mcad[14609]: ace_reporter.reporter_handle_response(): [setparam] applying new system.cfg
  623. Tue Oct 8 10:02:50 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.setparam in progress, elapsed=5(max=300)
  624. Tue Oct 8 10:02:53 2019 user.notice syswrapper: [apply-config] using fast apply
  625. Tue Oct 8 10:02:53 2019 kern.warn kernel: [48985.754556] [wifi1] [wifi1]
  626. Tue Oct 8 10:02:53 2019 kern.warn kernel: [49334.581319] Enabling Channel and channel width Switch Announcement on current channel
  627. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.639062] set channel freq 5640
  628. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.639153] DCS previous state is restored
  629. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647695] ol_ath_vap_join: join operation is only for STA/IBSS mode
  630. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647751] ol_if_dfs_configure: called
  631. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647771] ol_if_dfs_configure: ETSI domain
  632. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.647788] ol_if_dfs_disable: called
  633. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648133] ol_if_dfs_enable: called
  634. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648261] wmi_unified_vdev_up_send for vap 0 (849b0000)
  635. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648324] ol_ath_vap_join: join operation is only for STA/IBSS mode
  636. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648347] ol_if_dfs_configure: called
  637. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648364] ol_if_dfs_configure: ETSI domain
  638. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648380] ol_if_dfs_disable: called
  639. DirkACLR-BZ.v4.0.60#
  640.  
  641. Device Dirk_ACLR: Connected
  642.  
  643.  
  644. BusyBox v1.25.1 () built-in shell (ash)
  645.  
  646.  
  647. ___ ___ .__________.__
  648. | | |____ |__\_ ____/__|
  649. | | / \| || __) | | (c) 2010-2019
  650. | | | | \ || \ | | Ubiquiti Networks, Inc.
  651. |______|___| /__||__/ |__|
  652. |_/ https://www.ui.com/
  653.  
  654. Welcome to UniFi UAP-AC-LR!
  655.  
  656. DirkACLR-BZ.v4.0.60# cat /var/log/messages
  657. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648719] ol_if_dfs_enable: called
  658. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648805] wmi_unified_vdev_up_send for vap 1 (849b0000)
  659. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648870] ol_ath_vap_join: join operation is only for STA/IBSS mode
  660. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648893] ol_if_dfs_configure: called
  661. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648909] ol_if_dfs_configure: ETSI domain
  662. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.648926] ol_if_dfs_disable: called
  663. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.649256] ol_if_dfs_enable: called
  664. Tue Oct 8 10:02:54 2019 kern.warn kernel: [49335.649342] wmi_unified_vdev_up_send for vap 2 (849b0000)
  665. Tue Oct 8 10:03:10 2019 user.info : mca-monitor[14400]: mca-monitor.do_monitor(): mcad.checkin is 10 ago (max=200)
  666. Tue Oct 8 10:03:13 2019 user.info : mca-ctrl[15986]: mca-client.service_json(): failed to contact mcad
  667. Tue Oct 8 10:03:13 2019 user.info : mcad[14609]: ace_reporter.reporter_set_managed(): [STATE] enter MANAGED
  668. Tue Oct 8 10:04:44 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: disassociated
  669. Tue Oct 8 10:04:44 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 28:c2:dd:e5:12:e5/ 1
  670. Tue Oct 8 10:04:44 2019 kern.warn kernel: [49335.782698] [wifi1]
  671. Tue Oct 8 10:04:44 2019 kern.warn kernel: [49446.237465] ieee80211_ioctl_kickmac[15026]
  672. Tue Oct 8 10:04:44 2019 kern.warn kernel: [49446.272375] ieee80211_ioctl_kickmac[15026]
  673. Tue Oct 8 10:04:44 2019 kern.warn kernel: [49446.298781] ieee80211_ioctl_kickmac[15026]
  674. Tue Oct 8 10:04:44 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
  675. Tue Oct 8 10:04:47 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=28:c2:dd:e5:12:e5 status_code=0
  676. Tue Oct 8 10:04:47 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 28:c2:dd:e5:12:e5 / 1
  677. Tue Oct 8 10:04:47 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: associated
  678. Tue Oct 8 10:04:47 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: pairwise key handshake completed (RSN)
  679. Tue Oct 8 10:04:49 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 28:c2:dd:e5:12:e5 / 192.168.178.108
  680. Tue Oct 8 10:04:57 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 RADIUS: starting accounting session 06DF8C7B3151C277
  681. Tue Oct 8 10:04:57 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"60000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"2","auth_ts":"49449.310489"}
  682. Tue Oct 8 10:07:51 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
  683. Tue Oct 8 10:07:51 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
  684. Tue Oct 8 10:07:51 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
  685. Tue Oct 8 10:07:51 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  686. Tue Oct 8 10:07:51 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  687. Tue Oct 8 10:07:51 2019 kern.warn kernel: [49632.806259] [wifi1] [wifi1] FWLOG: [50841929] WAL_DBGID_SET_HW_FILTER ( 0x434eec )
  688. Tue Oct 8 10:13:29 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","ip_delta":"511490000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","wpa_auth_delta":"60000","auth_delta":"0","event_type":"fixup","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"0.0"}
  689. Tue Oct 8 10:50:19 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 WPA: group key handshake completed (RSN)
  690. Tue Oct 8 10:51:10 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  691. Tue Oct 8 10:51:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  692. Tue Oct 8 10:51:10 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  693. Tue Oct 8 10:51:10 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  694. Tue Oct 8 10:51:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  695. Tue Oct 8 10:51:11 2019 kern.warn kernel: [52233.015137] [wifi1] FWLOG: [53504060] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3306846
  696. Tue Oct 8 10:51:11 2019 kern.warn kernel: [52233.015216] [wifi1] FWLOG: [53504070] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x434fd4 )
  697. Tue Oct 8 10:51:11 2019 kern.warn kernel: [52233.015259] [wifi1] FWLOG: [53504101] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3306952
  698. Tue Oct 8 10:51:20 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session D15B75A5035F2F91
  699. Tue Oct 8 10:51:21 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1720000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"52232.371122"}
  700. Tue Oct 8 11:31:15 2019 kern.warn kernel: [52233.015298] [wifi1] [wifi1] [wifi1]
  701. Tue Oct 8 11:31:15 2019 kern.warn kernel: [54637.345467] ieee80211_ioctl_kickmac[15026]
  702. Tue Oct 8 11:31:15 2019 daemon.info hostapd: ath0: STA 28:c2:dd:e5:12:e5 IEEE 802.11: disassociated
  703. Tue Oct 8 11:31:15 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 28:c2:dd:e5:12:e5/ 1
  704. Tue Oct 8 11:31:15 2019 kern.warn kernel: [54637.384957] ieee80211_ioctl_kickmac[15026]
  705. Tue Oct 8 11:31:15 2019 kern.warn kernel: [54637.403771] ieee80211_ioctl_kickmac[15026]
  706. Tue Oct 8 11:31:16 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","message_type":"STA_ASSOC_TRACKER","mac":"28:c2:dd:e5:12:e5","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
  707. Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
  708. Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
  709. Tue Oct 8 11:45:19 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  710. Tue Oct 8 11:45:19 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  711. Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  712. Tue Oct 8 11:45:19 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  713. Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  714. Tue Oct 8 11:45:19 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  715. Tue Oct 8 11:45:19 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  716. Tue Oct 8 11:45:19 2019 kern.warn kernel: [55481.288550] [wifi1] [wifi1] FWLOG: [56830604] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3632a98
  717. Tue Oct 8 11:45:19 2019 kern.warn kernel: [55481.288640] [wifi1] FWLOG: [56830616] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4350bc )
  718. Tue Oct 8 11:45:19 2019 kern.warn kernel: [55481.288680] [wifi1] FWLOG: [56830639] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  719. Tue Oct 8 11:45:29 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 556FF12FE51200F5
  720. Tue Oct 8 11:45:29 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","ip_delta":"1940000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"55480.981535"}
  721. Tue Oct 8 11:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  722. Tue Oct 8 11:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  723. Tue Oct 8 11:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  724. Tue Oct 8 11:50:27 2019 kern.warn kernel: [55483.288687] [wifi1] [wifi1] [wifi1]
  725. Tue Oct 8 11:50:27 2019 kern.warn kernel: [55789.311785] [wifi1] [wifi1] FWLOG: [57146004] WAL_DBGID_SET_HW_FILTER ( 0x4350bc )
  726. Tue Oct 8 11:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  727. Tue Oct 8 12:39:28 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  728. Tue Oct 8 12:39:28 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  729. Tue Oct 8 12:39:28 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  730. Tue Oct 8 12:39:28 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  731. Tue Oct 8 12:39:28 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  732. Tue Oct 8 12:39:29 2019 kern.warn kernel: [58730.559925] [wifi1] FWLOG: [60157516] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x395ee56
  733. Tue Oct 8 12:39:29 2019 kern.warn kernel: [58730.560005] [wifi1] FWLOG: [60157526] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4351a4 )
  734. Tue Oct 8 12:39:29 2019 kern.warn kernel: [58730.560047] [wifi1] FWLOG: [60157553] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x395ef00
  735. Tue Oct 8 12:39:38 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session F01D7ED03FC95269
  736. Tue Oct 8 12:39:38 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1380000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"58729.951678"}
  737. Tue Oct 8 12:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  738. Tue Oct 8 12:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  739. Tue Oct 8 12:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  740. Tue Oct 8 12:50:28 2019 kern.warn kernel: [58730.560087] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [60832366] WAL_DBGID_SET_HW_FILTER ( 0x4351a4 )
  741. Tue Oct 8 12:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  742. Tue Oct 8 13:33:36 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  743. Tue Oct 8 13:33:36 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  744. Tue Oct 8 13:33:36 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  745. Tue Oct 8 13:33:36 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  746. Tue Oct 8 13:33:36 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  747. Tue Oct 8 13:33:37 2019 kern.warn kernel: [61978.843372] [wifi1] FWLOG: [63483398] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3c8ae11
  748. Tue Oct 8 13:33:37 2019 kern.warn kernel: [61978.843451] [wifi1] FWLOG: [63483409] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43528c )
  749. Tue Oct 8 13:33:37 2019 kern.warn kernel: [61978.843492] [wifi1] [wifi1] FWLOG: [63483538] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  750. Tue Oct 8 13:33:46 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 696653F28D4C1BBA
  751. Tue Oct 8 13:33:46 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1180000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"61977.923440"}
  752. Tue Oct 8 13:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  753. Tue Oct 8 13:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  754. Tue Oct 8 13:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  755. Tue Oct 8 13:50:28 2019 kern.warn kernel: [61987.844504] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [64518726] WAL_DBGID_SET_HW_FILTER ( 0x43528c )
  756. Tue Oct 8 13:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  757. Tue Oct 8 14:06:05 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
  758. Tue Oct 8 14:06:05 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
  759. Tue Oct 8 14:06:05 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
  760. Tue Oct 8 14:06:05 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
  761. Tue Oct 8 14:06:06 2019 kern.warn kernel: [63928.012677] [wifi1] FWLOG: [65479328] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e722ac
  762. Tue Oct 8 14:06:06 2019 kern.warn kernel: [63928.012757] [wifi1] FWLOG: [65479340] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435374 )
  763. Tue Oct 8 14:06:09 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
  764. Tue Oct 8 14:06:10 2019 kern.warn kernel: [63932.012967] [wifi1] FWLOG: [65483648] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x220401
  765. Tue Oct 8 14:06:15 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
  766. Tue Oct 8 14:06:15 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"20000","dns_resp_seen":"yes","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"10000","ip_assign_type":"roamed","event_id":"1","auth_ts":"63927.96364"}
  767. Tue Oct 8 14:07:10 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
  768. Tue Oct 8 14:07:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
  769. Tue Oct 8 14:07:10 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
  770. Tue Oct 8 14:07:10 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
  771. Tue Oct 8 14:07:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
  772. Tue Oct 8 14:07:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
  773. Tue Oct 8 14:07:11 2019 kern.warn kernel: [63993.018343] [wifi1] FWLOG: [65546057] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e82754
  774. Tue Oct 8 14:07:11 2019 kern.warn kernel: [63993.018423] [wifi1] FWLOG: [65546068] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43545c )
  775. Tue Oct 8 14:07:11 2019 kern.warn kernel: [63993.018465] [wifi1] FWLOG: [65546108] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x220401
  776. Tue Oct 8 14:07:20 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
  777. Tue Oct 8 14:07:20 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"10000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"2","auth_ts":"63992.265111"}
  778. Tue Oct 8 14:07:22 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
  779. Tue Oct 8 14:07:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
  780. Tue Oct 8 14:07:22 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
  781. Tue Oct 8 14:07:22 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
  782. Tue Oct 8 14:07:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
  783. Tue Oct 8 14:07:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
  784. Tue Oct 8 14:07:22 2019 kern.warn kernel: [64004.019156] [wifi1] FWLOG: [65557420] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e853b6
  785. Tue Oct 8 14:07:22 2019 kern.warn kernel: [64004.019235] [wifi1] FWLOG: [65557430] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435544 )
  786. Tue Oct 8 14:07:22 2019 kern.warn kernel: [64004.019275] [wifi1] FWLOG: [65557469] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x220401
  787. Tue Oct 8 14:07:32 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
  788. Tue Oct 8 14:07:32 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"10000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"3","auth_ts":"64003.361574"}
  789. Tue Oct 8 14:08:58 2019 daemon.info hostapd: ath3: STA b6:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=fc:b6:d8:a7:ad:5e status_code=0
  790. Tue Oct 8 14:08:58 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
  791. Tue Oct 8 14:08:58 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: associated
  792. Tue Oct 8 14:08:58 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e WPA: pairwise key handshake completed (RSN)
  793. Tue Oct 8 14:08:58 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath3: fc:b6:d8:a7:ad:5e / 1
  794. Tue Oct 8 14:08:58 2019 kern.warn kernel: [64100.027036] [wifi1] FWLOG: [65656166] RATE: ChainMask 3, phymode 1044489,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e9d570
  795. Tue Oct 8 14:08:58 2019 kern.warn kernel: [64100.027116] [wifi1] FWLOG: [65656176] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x43562c )
  796. Tue Oct 8 14:09:08 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e RADIUS: starting accounting session B8091D3E821E34C7
  797. Tue Oct 8 14:09:08 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","wpa_auth_delta":"10000","auth_delta":"0","event_type":"soft failure","assoc_status":"0","assoc_delta":"0","ip_assign_type":"roamed","event_id":"4","auth_ts":"64099.794924"}
  798. Tue Oct 8 14:09:20 2019 kern.warn kernel: [64122.028869] [wifi1] FWLOG: [65678867] RATE: ChainMask 3, phymode 1044490,ni_flags 0x02233006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x3e80401
  799. Tue Oct 8 14:09:31 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"4","message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","dns_resp_seen":"yes","event_type":"fixup","auth_ts":"0.0","assoc_status":"0"}
  800. Tue Oct 8 14:10:13 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath3: fc:b6:d8:a7:ad:5e / 192.168.178.122
  801. Tue Oct 8 14:14:10 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=d0:c6:37:65:6b:c5 status_code=0
  802. Tue Oct 8 14:14:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: d0:c6:37:65:6b:c5 / 1
  803. Tue Oct 8 14:14:10 2019 daemon.info hostapd: ath0: STA d0:c6:37:65:6b:c5 IEEE 802.11: associated
  804. Tue Oct 8 14:14:14 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: d0:c6:37:65:6b:c5/ 1
  805. Tue Oct 8 14:14:19 2019 daemon.info hostapd: ath0: STA d0:c6:37:65:6b:c5 IEEE 802.11: deauthenticated due to local deauth request
  806. Tue Oct 8 14:14:20 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"message_type":"STA_ASSOC_TRACKER","mac":"d0:c6:37:65:6b:c5","vap":"ath0","event_type":"failure","auth_delta":"0","assoc_status":"0","wpa_auth_failures":"1","assoc_delta":"10000","event_id":"1","auth_ts":"64412.183336"}
  807. Tue Oct 8 14:15:36 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: sta_stats
  808. Tue Oct 8 14:15:36 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: disassociated
  809. Tue Oct 8 14:15:36 2019 daemon.info hostapd: ath3: STA fc:b6:d8:a7:ad:5e IEEE 802.11: disassociated
  810. Tue Oct 8 14:15:36 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath3: fc:b6:d8:a7:ad:5e/ 1
  811. Tue Oct 8 14:15:37 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"4","message_type":"STA_ASSOC_TRACKER","mac":"fc:b6:d8:a7:ad:5e","vap":"ath3","event_type":"sta_leave","assoc_status":"0"}
  812. Tue Oct 8 14:15:37 2019 kern.warn kernel: [64499.063128] [wifi1] FWLOG: [66064174] WAL_DBGID_SET_HW_FILTER ( 0x43562c )
  813. Tue Oct 8 14:18:26 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
  814. Tue Oct 8 14:18:26 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 / 1
  815. Tue Oct 8 14:18:26 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
  816. Tue Oct 8 14:18:26 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
  817. Tue Oct 8 14:18:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
  818. Tue Oct 8 14:18:36 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session 4E898792027F7241
  819. Tue Oct 8 14:18:36 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1170000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","wpa_auth_delta":"30000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"20000","auth_ts":"64667.437607"}
  820. Tue Oct 8 14:25:58 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: sta_stats
  821. Tue Oct 8 14:25:58 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: disassociated
  822. Tue Oct 8 14:25:58 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1/ 1
  823. Tue Oct 8 14:25:58 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
  824. Tue Oct 8 14:27:44 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  825. Tue Oct 8 14:27:44 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  826. Tue Oct 8 14:27:44 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  827. Tue Oct 8 14:27:44 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  828. Tue Oct 8 14:27:44 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  829. Tue Oct 8 14:27:44 2019 kern.warn kernel: [65226.124924] [wifi1] FWLOG: [66809273] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x3fb6dc3
  830. Tue Oct 8 14:27:44 2019 kern.warn kernel: [65226.125004] [wifi1] FWLOG: [66809283] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435714 )
  831. Tue Oct 8 14:27:44 2019 kern.warn kernel: [65226.125045] [wifi1] FWLOG: [66809311] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x220401
  832. Tue Oct 8 14:27:54 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 6DF86A4A01DF7787
  833. Tue Oct 8 14:27:54 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1420000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"65225.892080"}
  834. Tue Oct 8 14:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  835. Tue Oct 8 14:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  836. Tue Oct 8 14:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  837. Tue Oct 8 14:50:27 2019 kern.warn kernel: [65228.125099] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [68205081] WAL_DBGID_SET_HW_FILTER ( 0x435714 )
  838. Tue Oct 8 14:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  839. Tue Oct 8 15:21:52 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  840. Tue Oct 8 15:21:52 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  841. Tue Oct 8 15:21:52 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  842. Tue Oct 8 15:21:52 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  843. Tue Oct 8 15:21:52 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  844. Tue Oct 8 15:21:53 2019 kern.warn kernel: [68474.418658] [wifi1] FWLOG: [70135172] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x42e2d8e
  845. Tue Oct 8 15:21:53 2019 kern.warn kernel: [68474.418735] [wifi1] FWLOG: [70135182] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4357fc )
  846. Tue Oct 8 15:21:53 2019 kern.warn kernel: [68474.418776] [wifi1] FWLOG: [70135218] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x42e2e1e
  847. Tue Oct 8 15:22:02 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session F88081E9F9DD3F05
  848. Tue Oct 8 15:22:02 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1520000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"68473.881383"}
  849. Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
  850. Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
  851. Tue Oct 8 15:27:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  852. Tue Oct 8 15:27:22 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  853. Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  854. Tue Oct 8 15:27:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  855. Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  856. Tue Oct 8 15:27:22 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  857. Tue Oct 8 15:27:22 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  858. Tue Oct 8 15:27:23 2019 kern.warn kernel: [68474.418821] [wifi1] [wifi1] [wifi1] FWLOG: [70473060] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x433556f
  859. Tue Oct 8 15:27:23 2019 kern.warn kernel: [68804.447043] [wifi1] FWLOG: [70473071] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4358e4 )
  860. Tue Oct 8 15:27:23 2019 kern.warn kernel: [68804.447084] [wifi1] [wifi1] FWLOG: [70473277] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  861. Tue Oct 8 15:27:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 7547625C239A2D27
  862. Tue Oct 8 15:27:32 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","ip_delta":"1720000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"68803.856193"}
  863. Tue Oct 8 15:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  864. Tue Oct 8 15:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  865. Tue Oct 8 15:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"2","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  866. Tue Oct 8 15:50:28 2019 kern.warn kernel: [68805.447063] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [71891430] WAL_DBGID_SET_HW_FILTER ( 0x4358e4 )
  867. Tue Oct 8 15:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  868. Tue Oct 8 16:21:29 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  869. Tue Oct 8 16:21:29 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  870. Tue Oct 8 16:21:29 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  871. Tue Oct 8 16:21:29 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  872. Tue Oct 8 16:21:29 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  873. Tue Oct 8 16:21:30 2019 kern.warn kernel: [72051.757455] [wifi1] FWLOG: [73797896] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4661112
  874. Tue Oct 8 16:21:30 2019 kern.warn kernel: [72051.757536] [wifi1] FWLOG: [73797906] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x4359cc )
  875. Tue Oct 8 16:21:30 2019 kern.warn kernel: [72051.757577] [wifi1] FWLOG: [73797929] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x46611b5
  876. Tue Oct 8 16:21:39 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session D32A3DFCB16E035E
  877. Tue Oct 8 16:21:39 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1180000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","dns_resp_seen":"yes","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"72050.827383"}
  878. Tue Oct 8 16:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  879. Tue Oct 8 16:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  880. Tue Oct 8 16:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  881. Tue Oct 8 16:50:28 2019 kern.warn kernel: [72051.757616] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [75577761] WAL_DBGID_SET_HW_FILTER ( 0x4359cc )
  882. Tue Oct 8 16:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  883. Tue Oct 8 16:53:41 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
  884. Tue Oct 8 16:53:41 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): inform failed #1 (last inform: 60 seconds ago), rc=11
  885. Tue Oct 8 16:54:26 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): Unknown[11] (http://178.85.165.24:8080/inform)
  886. Tue Oct 8 16:54:26 2019 user.err : mcad[14609]: ace_reporter.reporter_fail(): inform failed #2 (last inform: 105 seconds ago), rc=11
  887. Tue Oct 8 17:15:38 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  888. Tue Oct 8 17:15:38 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  889. Tue Oct 8 17:15:38 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  890. Tue Oct 8 17:15:38 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  891. Tue Oct 8 17:15:38 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  892. Tue Oct 8 17:15:38 2019 kern.warn kernel: [75300.063590] [wifi1] FWLOG: [77124775] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x498d4b2
  893. Tue Oct 8 17:15:38 2019 kern.warn kernel: [75300.063669] [wifi1] FWLOG: [77124786] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435ab4 )
  894. Tue Oct 8 17:15:38 2019 kern.warn kernel: [75300.063711] [wifi1] FWLOG: [77124819] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x498d55f
  895. Tue Oct 8 17:15:48 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session D387A3CED47543C9
  896. Tue Oct 8 17:15:48 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1830000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"75299.797488"}
  897. Tue Oct 8 17:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  898. Tue Oct 8 17:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  899. Tue Oct 8 17:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  900. Tue Oct 8 17:50:27 2019 kern.warn kernel: [75300.063750] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [79264098] WAL_DBGID_SET_HW_FILTER ( 0x435ab4 )
  901. Tue Oct 8 17:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  902. Tue Oct 8 18:09:46 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  903. Tue Oct 8 18:09:46 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  904. Tue Oct 8 18:09:46 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  905. Tue Oct 8 18:09:46 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  906. Tue Oct 8 18:09:46 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  907. Tue Oct 8 18:09:47 2019 kern.warn kernel: [78548.374001] [wifi1] FWLOG: [80450641] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4cb945a
  908. Tue Oct 8 18:09:47 2019 kern.warn kernel: [78548.374079] [wifi1] FWLOG: [80450650] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435b9c )
  909. Tue Oct 8 18:09:47 2019 kern.warn kernel: [78548.374121] [wifi1] FWLOG: [80450673] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4cb94ef
  910. Tue Oct 8 18:09:56 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 0963D13E9C93376C
  911. Tue Oct 8 18:09:56 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1930000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"78547.769115"}
  912. Tue Oct 8 18:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  913. Tue Oct 8 18:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  914. Tue Oct 8 18:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  915. Tue Oct 8 18:50:28 2019 kern.warn kernel: [78548.374160] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [82950433] WAL_DBGID_SET_HW_FILTER ( 0x435b9c )
  916. Tue Oct 8 18:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  917. Tue Oct 8 19:03:55 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  918. Tue Oct 8 19:03:55 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  919. Tue Oct 8 19:03:55 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  920. Tue Oct 8 19:03:55 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  921. Tue Oct 8 19:03:55 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  922. Tue Oct 8 19:03:56 2019 kern.warn kernel: [81797.684720] [wifi1] FWLOG: [83777522] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4fe57fc
  923. Tue Oct 8 19:03:56 2019 kern.warn kernel: [81797.684800] [wifi1] FWLOG: [83777532] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435c84 )
  924. Tue Oct 8 19:03:56 2019 kern.warn kernel: [81797.684841] [wifi1] FWLOG: [83777555] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4fe5902
  925. Tue Oct 8 19:04:05 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session E7675029453204C9
  926. Tue Oct 8 19:04:05 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1560000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"81796.740072"}
  927. Tue Oct 8 19:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  928. Tue Oct 8 19:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  929. Tue Oct 8 19:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  930. Tue Oct 8 19:50:28 2019 kern.warn kernel: [81797.684880] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [86636766] WAL_DBGID_SET_HW_FILTER ( 0x435c84 )
  931. Tue Oct 8 19:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  932. Tue Oct 8 19:58:03 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  933. Tue Oct 8 19:58:03 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  934. Tue Oct 8 19:58:03 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  935. Tue Oct 8 19:58:03 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  936. Tue Oct 8 19:58:03 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  937. Tue Oct 8 19:58:03 2019 kern.warn kernel: [85044.979922] [wifi1] FWLOG: [87103378] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x531179e
  938. Tue Oct 8 19:58:03 2019 kern.warn kernel: [85044.980002] [wifi1] FWLOG: [87103390] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435d6c )
  939. Tue Oct 8 19:58:03 2019 kern.warn kernel: [85044.980043] [wifi1] FWLOG: [87103419] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x4fe0401
  940. Tue Oct 8 19:58:13 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 1D764183BCB8FF57
  941. Tue Oct 8 19:58:13 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1290000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"85044.707506"}
  942. Tue Oct 8 20:18:51 2019 daemon.info hostapd: ath0: STA b4:fb:e4:f4:9a:c2 DRIVER: Sead AUTH addr=14:9d:99:67:b8:e1 status_code=0
  943. Tue Oct 8 20:18:51 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath0: 14:9d:99:67:b8:e1 / 1
  944. Tue Oct 8 20:18:51 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: associated
  945. Tue Oct 8 20:18:51 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 WPA: pairwise key handshake completed (RSN)
  946. Tue Oct 8 20:18:52 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath0: 14:9d:99:67:b8:e1 / 192.168.178.31
  947. Tue Oct 8 20:19:01 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 RADIUS: starting accounting session F8935E4AEDCF3D93
  948. Tue Oct 8 20:19:01 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1160000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","wpa_auth_delta":"30000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"86292.664702"}
  949. Tue Oct 8 20:19:10 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: sta_stats
  950. Tue Oct 8 20:19:10 2019 daemon.info hostapd: ath0: STA 14:9d:99:67:b8:e1 IEEE 802.11: disassociated
  951. Tue Oct 8 20:19:10 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath0: 14:9d:99:67:b8:e1/ 1
  952. Tue Oct 8 20:19:10 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"14:9d:99:67:b8:e1","vap":"ath0","event_type":"sta_leave","assoc_status":"0"}
  953. Tue Oct 8 20:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  954. Tue Oct 8 20:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  955. Tue Oct 8 20:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  956. Tue Oct 8 20:50:27 2019 kern.warn kernel: [85047.980167] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [90323101] WAL_DBGID_SET_HW_FILTER ( 0x435d6c )
  957. Tue Oct 8 20:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  958. Tue Oct 8 20:52:11 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  959. Tue Oct 8 20:52:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  960. Tue Oct 8 20:52:11 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  961. Tue Oct 8 20:52:11 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  962. Tue Oct 8 20:52:11 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  963. Tue Oct 8 20:52:11 2019 kern.warn kernel: [88293.274280] [wifi1] FWLOG: [90429244] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x563d748
  964. Tue Oct 8 20:52:11 2019 kern.warn kernel: [88293.274357] [wifi1] FWLOG: [90429256] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x435f3c )
  965. Tue Oct 8 20:52:11 2019 kern.warn kernel: [88293.274398] [wifi1] [wifi1] FWLOG: [90429477] RATE: ChainMask 3, phymode 1044486, ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x0401
  966. Tue Oct 8 20:52:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session 24087224E9139F44
  967. Tue Oct 8 20:52:21 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1870000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"20000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"10000","auth_ts":"88292.687005"}
  968. Tue Oct 8 21:26:26 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVT_AP_RadarDetected ath2: radar found on channel 128 (5640 MHz)
  969. Tue Oct 8 21:26:26 2019 kern.warn kernel: [88302.275208] [wifi1] [wifi1] dfs_process_radarevent: FILTER 38 - MATCH FOUND.
  970. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635082] dfs_process_radarevent: Radar found on channel 128 (5640 MHz)
  971. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635190] ol_if_dfs_clist_update: called, cmd=1, nollist=84a60b00, nentries=2
  972. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635350]
  973. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635350] Changing to channel 40 (5200 MHz) chanStart 2
  974. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90347.635350]
  975. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.163622] set channel freq 5200
  976. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.163709] DCS previous state is restored
  977. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.171790] ol_ath_vap_join: join operation is only for STA/IBSS mode
  978. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.171942] wmi_unified_vdev_up_send for vap 0 (849b0000)
  979. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172001] ol_ath_vap_join: join operation is only for STA/IBSS mode
  980. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172084] wmi_unified_vdev_up_send for vap 1 (849b0000)
  981. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172207] ol_ath_vap_join: join operation is only for STA/IBSS mode
  982. Tue Oct 8 21:26:26 2019 kern.warn kernel: [90348.172311] wmi_unified_vdev_up_send for vap 2 (849b0000)
  983. Tue Oct 8 21:27:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: sta_stats
  984. Tue Oct 8 21:27:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
  985. Tue Oct 8 21:27:21 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: disassociated
  986. Tue Oct 8 21:27:21 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  987. Tue Oct 8 21:27:21 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  988. Tue Oct 8 21:27:22 2019 kern.warn kernel: [90403.463106] [wifi1] [wifi1] FWLOG: [92590301] WAL_DBGID_SET_HW_FILTER ( 0x435f3c )
  989. Tue Oct 8 21:46:23 2019 daemon.info hostapd: ath2: STA b4:fb:e4:f5:9a:c2 DRIVER: Sead AUTH addr=ec:35:86:41:f6:5a status_code=0
  990. Tue Oct 8 21:46:23 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: associated
  991. Tue Oct 8 21:46:23 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_JOIN ath2: ec:35:86:41:f6:5a / 1
  992. Tue Oct 8 21:46:23 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: pairwise key handshake completed (RSN)
  993. Tue Oct 8 21:46:23 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_IP ath2: ec:35:86:41:f6:5a / 192.168.178.88
  994. Tue Oct 8 21:46:23 2019 kern.warn kernel: [91544.564975] [wifi1] FWLOG: [93758945] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x596a5ed
  995. Tue Oct 8 21:46:23 2019 kern.warn kernel: [91544.565054] [wifi1] FWLOG: [93758957] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x436024 )
  996. Tue Oct 8 21:46:23 2019 kern.warn kernel: [91544.565096] [wifi1] FWLOG: [93758981] RATE: ChainMask 3, phymode 1044486,ni_flags 0x00223006, vht_mcs_set 0x0000, ht_mcs_set 0xffff, legacy_rate_set 0x220401
  997. Tue Oct 8 21:46:33 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a RADIUS: starting accounting session C8EBFAD949E1265C
  998. Tue Oct 8 21:46:33 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","ip_delta":"1750000","arp_reply_gw_seen":"yes","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","wpa_auth_delta":"10000","auth_delta":"0","event_type":"success","assoc_status":"0","ip_assign_type":"dhcp","assoc_delta":"0","auth_ts":"91544.414463"}
  999. Tue Oct 8 21:50:27 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a WPA: group key handshake failed (RSN) after 4tries
  1000. Tue Oct 8 21:50:27 2019 user.info : wevent[14405]: wevent.ubnt_custom_event(): EVENT_STA_LEAVE ath2: ec:35:86:41:f6:5a/ 1
  1001. Tue Oct 8 21:50:27 2019 user.info : stahtd[14406]: [STA-TRACKER].stahtd_dump_event(): {"event_id":"1","message_type":"STA_ASSOC_TRACKER","mac":"ec:35:86:41:f6:5a","vap":"ath2","event_type":"sta_leave","assoc_status":"0"}
  1002. Tue Oct 8 21:50:28 2019 kern.warn kernel: [91546.565137] [wifi1] [wifi1] [wifi1] [wifi1] [wifi1] FWLOG: [94009430] WAL_DBGID_SET_HW_FILTER ( 0x436024 )
  1003. Tue Oct 8 21:50:32 2019 daemon.info hostapd: ath2: STA ec:35:86:41:f6:5a IEEE 802.11: deauthenticated due to local deauth request
  1004. Tue Oct 8 21:56:31 2019 kern.warn kernel: [92152.834857] ol_if_dfs_clist_update: called, cmd=1, nollist=855c8400, nentries=1
  1005. Tue Oct 8 21:56:31 2019 kern.warn kernel: [92152.834955] ol_if_dfs_clist_update: called, cmd=1, nollist= (null), nentries=0
  1006. Tue Oct 8 22:23:31 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"4b3114c4-bbe2-461f-ae74-01ebc159e392", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
  1007. Tue Oct 8 22:23:31 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<4b3114c4-bbe2-461f-ae74-01ebc159e392>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<ddf9d2cb0113ed6779fcff0ff0612407fc64e96778e0468160b19ad5681de6ac>
  1008. Tue Oct 8 22:23:32 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" offer start creating
  1009. Tue Oct 8 22:23:32 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" (1,1) offer sent, now waiting for answer
  1010. Tue Oct 8 22:23:32 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 1788317579 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:dUVFofvcqC//1Iel a=ice-pwd:RlhoyIzX8jCl/S4ObH1iqDM8 a=fingerprint:sha-256 0D:DD:EE:CE:F4:32:B5:61:8C:C2:C5:12:DA:6E:39:EC:87:75:99:9A:DD:2B:FE:C6:27:E2:CF:89:8D:76:18:AE a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130698751 192.168.178.150 45532 typ host generation 0 ufrag dUVFofvcqC//1Iel a=candidate:2317678234 1 udp 1694491135 213.46.59.215 45532 typ srflx raddr 192.168.178.150 rport 45532 generation 0 ufrag dUVFofvcqC//1Iel ===
  1011. Tue Oct 8 22:23:33 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" recving answer
  1012. Tue Oct 8 22:23:33 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" answer parsed successfully, going to build up connection
  1013. Tue Oct 8 22:23:33 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<4b3114c4-bbe2-461f-a a=candidate:3785192433 1 udp 2113937151 e63745ed-7e85-465b-9914-7eb7c163912f.local 49181 typ host generation 0 network- a=candidate:1312909686 1 udp 2113932031 da9e1da1-0caa-47c9-b39a-a1240d3cca5e.local 49182 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 178.85.165.24 49181 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 99 a=candidate:1703355540 1 udp 33562367 18.195.48.240 37736 typ relay raddr 178.85.165.24 rport 49181 generation 0 networ a=sct:datativesha-256 2F:42:9C:18:67:5E:FF:27:11:68:4F:C1:C2:6B:F6:55:3A:50:D4:36:B0:3E:B7:42:DB:AA:D2:B9:F3:67:B1:A8
  1014. Tue Oct 8 22:23:33 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<4b3114c4-bbe2-461f-ae74-01ebc159e392>
  1015. Tue Oct 8 22:25:25 2019 user.info : utermd[14402]: utermd.SignalConnectionTerminated(): Disconnected: 0x80060017/WebRTC connection interrupted from far side
  1016. Tue Oct 8 22:25:25 2019 user.warn : utermd[14402]: utermd.house_keeper(): Pulse failed, turns to garbage. ret:0x80060017/WebRTC connection interrupted from far side
  1017. Tue Oct 8 22:25:25 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "4b3114c4-bbe2-461f-ae74-01ebc159e392" clean up
  1018. Tue Oct 8 22:25:25 2019 user.info : mcad[14609]: libubnt_webrtc.close_sdp_session(): SDP close: uuid<4b3114c4-bbe2-461f-ae74-01ebc159e392>
  1019. Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"871fcd56-fa9a-4ac0-82dc-647af3d28d58", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
  1020. Tue Oct 8 22:35:57 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<871fcd56-fa9a-4ac0-82dc-647af3d28d58>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<e41e5ecd0c132d6d298fa33c554287ec768282e4e9e845dbb80063c89ebdfc1c>
  1021. Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" offer start creating
  1022. Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" (1,1) offer sent, now waiting for answer
  1023. Tue Oct 8 22:35:57 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 3945697865 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:hkbESkTzoCR+Kqsi a=ice-pwd:BKuO3W3tRQnFcJ2GYjib7pR8 a=fingerprint:sha-256 22:35:C6:B2:2F:53:98:32:B2:99:59:BE:D8:89:F2:D1:28:CD:5C:7F:71:68:FB:7A:D2:C3:9E:77:49:3A:F1:93 a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130701311 192.168.178.150 56907 typ host generation 0 ufrag hkbESkTzoCR+Kqsi a=candidate:2317678234 1 udp 1694493695 213.46.59.215 56907 typ srflx raddr 192.168.178.150 rport 56907 generation 0 ufrag hkbESkTzoCR+Kqsi ===
  1024. Tue Oct 8 22:35:58 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" recving answer
  1025. Tue Oct 8 22:35:58 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" answer parsed successfully, going to build up connection
  1026. Tue Oct 8 22:35:58 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<871fcd56-fa9a-4ac0-8 a=candidate:3785192433 1 udp 2113937151 e63745ed-7e85-465b-9914-7eb7c163912f.local 57107 typ host generation 0 network- a=candidate:1312909686 1 udp 2113932031 da9e1da1-0caa-47c9-b39a-a1240d3cca5e.local 57108 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 178.85.165.24 57107 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 99 a=candidate:2686458394 1 udp 33562367 18.195.48.247 40135 typ relay raddr 178.85.165.24 rport 57107 generation 0 networ a=sct:datativesha-256 44:32:97:71:EC:55:6B:79:EA:70:13:65:90:50:FF:47:0B:B2:87:0B:C5:33:58:EB:7F:6A:FD:D1:E0:65:60:47
  1027. Tue Oct 8 22:35:58 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<871fcd56-fa9a-4ac0-82dc-647af3d28d58>
  1028. Tue Oct 8 22:36:29 2019 user.info : utermd[14402]: utermd.SignalConnectionTerminated(): Disconnected: 0x80060017/WebRTC connection interrupted from far side
  1029. Tue Oct 8 22:36:29 2019 user.warn : utermd[14402]: utermd.house_keeper(): Pulse failed, turns to garbage. ret:0x80060017/WebRTC connection interrupted from far side
  1030. Tue Oct 8 22:36:29 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "871fcd56-fa9a-4ac0-82dc-647af3d28d58" clean up
  1031. Tue Oct 8 22:36:29 2019 user.info : mcad[14609]: libubnt_webrtc.close_sdp_session(): SDP close: uuid<871fcd56-fa9a-4ac0-82dc-647af3d28d58>
  1032. Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.session_request_handler(): Create new session node, channel name:"71439708-7ace-4ae8-87f8-bf474cd89d80", stun:"global.stun.twilio.com:3478", turn:"global.turn.twilio.com:3478"
  1033. Tue Oct 8 22:36:33 2019 user.info : mcad[14609]: libubnt_webrtc.get_next_sdp_offer(): SDP request: uuid<71439708-7ace-4ae8-87f8-bf474cd89d80>, stun<global.stun.twilio.com:3478>, turn<global.turn.twilio.com:3478>, username<4f11f5607ad5a82bc4d88f9927f141ec07b40012901f18d03c2d015461acc80a>
  1034. Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" offer start creating
  1035. Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" (1,1) offer sent, now waiting for answer
  1036. Tue Oct 8 22:36:33 2019 user.info : utermd[14402]: utermd.house_keeper(): === v=0 o=- 43072400 1 IN IP4 127.0.0.1 s=EvoStream_WebRTC t=0 0 a=tool:ubnt_webrtc version 2db50542-develop a=disable-sctp-checksum a=msid-semantic: WMS m=application 1 DTLS/SCTP 5000 c=IN IP4 0.0.0.0 a=ice-ufrag:y+ar8+dkBOIfxvUn a=ice-pwd:YlI1s8xwkz8CAPWQeRliF1/B a=fingerprint:sha-256 C2:C2:0A:42:0C:70:7E:B4:22:7F:45:94:D6:FE:72:07:59:92:E2:6B:5C:91:2F:5D:25:2E:22:AC:77:9F:09:4A a=setup:actpass a=mid:data a=sctpmap:5000 webrtc-datachannel 1024 a=candidate:3824073051 1 udp 2130698751 192.168.178.150 46875 typ host generation 0 ufrag y+ar8+dkBOIfxvUn a=candidate:2317678234 1 udp 1694491135 213.46.59.215 46875 typ srflx raddr 192.168.178.150 rport 46875 generation 0 ufrag y+ar8+dkBOIfxvUn ===
  1037. Tue Oct 8 22:36:34 2019 user.info : utermd[14402]: utermd.session_request_handler(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" recving answer
  1038. Tue Oct 8 22:36:34 2019 user.info : utermd[14402]: utermd.house_keeper(): Session "71439708-7ace-4ae8-87f8-bf474cd89d80" answer parsed successfully, going to build up connection
  1039. Tue Oct 8 22:36:34 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP answer: uuid<71439708-7ace-4ae8-8 a=candidate:3785192433 1 udp 2113937151 e63745ed-7e85-465b-9914-7eb7c163912f.local 55003 typ host generation 0 network- a=candidate:1312909686 1 udp 2113932031 da9e1da1-0caa-47c9-b39a-a1240d3cca5e.local 55004 typ host generation 0 network- a=candidate:842163049 1 udp 1677729535 178.85.165.24 55003 typ srflx raddr 0.0.0.0 rport 0 generation 0 network-cost 99 a=candidate:2686458394 1 udp 33562367 18.195.48.247 48860 typ relay raddr 178.85.165.24 rport 55003 generation 0 networ a=sctpdatativesha-256 20:BA:A3:70:89:AC:52:18:04:B1:03:73:96:DF:F8:06:26:A4:11:AE:0A:8C:D0:26:74:E8:D8:F8:CF:A4:4B:14
  1040. Tue Oct 8 22:36:34 2019 user.info : mcad[14609]: libubnt_webrtc.set_sdp_answer(): SDP success: uuid<71439708-7ace-4ae8-87f8-bf474cd89d80>
  1041. DirkACLR-BZ.v4.0.60#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement