Smart Phones disconnecting freequenlty..

Unanswered Question
Jun 19th, 2014
User Badges:

hi,

one of my customer complaining some of their users smart phones ( both Apple IOS and Android ) are freequnlety de-associating from WLAN. this was reported only with 2 users now, but there are many users with both Apple and Androids are working properly.

attached debug client for one of the user..pls let me know if we can ind anything wrong...

 

 

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.06.19 10:55:51 =~=~=~=~=~=~=~=~=~=~=~=
 
 
(Cisco Controller) >debug client D0:22:BE:A3:41:45
 
(Cisco Controller) >*DHCP Socket Task: Jun 19 10:55:11.524: d0:22:be:a3:41:45 DHCP successfully bridged packet to STA
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Association received from mobile on BSSID 00:3a:9a:aa:ab:d0
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Global 200 Clients are allowed to AP radio
 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Max Client Trap Threshold: 0  cur: 17
 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Rf profile 600 Clients are allowed to AP wlan
 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 27
 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Re-applying interface policy for client 
 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2018)
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2246)
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 apfApplyWlanPolicy: Retaining the ACL recieved in AAA attributes 255 on mobile 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 In processSsidIE:4210 setting Central switched to TRUE
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 In processSsidIE:4213 apVapId = 1 and Split Acl Id = 65535
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Applying site-specific Local Bridging override for station d0:22:be:a3:41:45 - vapId 1, site 'NADEC-FF', interface 'nadec-ff'
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Applying Local Bridging Interface Policy for station d0:22:be:a3:41:45 - vlan 26, interface id 14, interface 'nadec-ff'
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Applying site-specific override for station d0:22:be:a3:41:45 - vapId 1, site 'NADEC-FF', interface 'nadec-ff'
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0
 
*apfMsConnTask_1: Jun 19 10:58:28.418: d0:22:be:a3:41:45 Re-applying interface policy for client 
 
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2018)
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2246)
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 processSsidIE  statusCode is 0 and status is 0 
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 processSsidIE  ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 STA - rates (8): 130 4 11 22 36 48 72 108 12 18 24 96 0 0 0 0
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 suppRates  statusCode is 0 and gotSuppRatesElement is 1 
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 STA - rates (12): 130 4 11 22 36 48 72 108 12 18 24 96 0 0 0 0
*apfMsConnTask_1: Jun 19 10:58:28.419: d0:22:be:a3:41:45 extSuppRates  statusCode is 0 and gotExtSuppRatesElement is 1 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Processing RSN IE type 48, length 20 for mobile d0:22:be:a3:41:45
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Received RSN IE with 0 PMKIDs from mobile d0:22:be:a3:41:45
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Found an cache entry for BSSID 00:3a:9a:aa:ab:d0 in PMKID cache at index 0 of station d0:22:be:a3:41:45
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Removing BSSID 00:3a:9a:aa:ab:d0 from PMKID cache of station d0:22:be:a3:41:45
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Resetting MSCB PMK Cache Entry 0 for station d0:22:be:a3:41:45
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Setting active key cache index 0 ---> 8
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 unsetting PmkIdValidatedByAp
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 apfMsRunStateDec
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 apfMs1xStateDec
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Change state to START (0) last state RUN (20)
 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 10.10.27.46 START (0) Initializing policy
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 10.10.27.46 START (0) Change state to AUTHCHECK (2) last state START (0)
 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 10.10.27.46 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Not Using WMM Compliance code qosCap 00
*pemReceiveTask: Jun 19 10:58:28.420: d0:22:be:a3:41:45 10.10.27.46 Removed NPU entry.
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:3a:9a:aa:ab:d0 vapId 1 apVapId 1 flex-acl-name: 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 apfPemAddUser2 (apf_policy.c:276) Changing state for mobile d0:22:be:a3:41:45 on AP 00:3a:9a:aa:ab:d0 from Associated to Associated
 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 apfPemAddUser2:session timeout forstation d0:22:be:a3:41:45 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is  0 
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_1: Jun 19 10:58:28.420: d0:22:be:a3:41:45 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0
 
*apfMsConnTask_1: Jun 19 10:58:28.421: d0:22:be:a3:41:45 Sending Assoc Response to station on BSSID 00:3a:9a:aa:ab:d0 (status 0) ApVapId 1 Slot 0
*apfMsConnTask_1: Jun 19 10:58:28.421: d0:22:be:a3:41:45 apfProcessAssocReq (apf_80211.c:7399) Changing state for mobile d0:22:be:a3:41:45 on AP 00:3a:9a:aa:ab:d0 from Associated to Associated
 
*dot1xMsgTask: Jun 19 10:58:28.422: d0:22:be:a3:41:45 Disable re-auth, use PMK lifetime.
*dot1xMsgTask: Jun 19 10:58:28.422: d0:22:be:a3:41:45 dot1x - moving mobile d0:22:be:a3:41:45 into Connecting state
*dot1xMsgTask: Jun 19 10:58:28.422: d0:22:be:a3:41:45 Sending EAP-Request/Identity to mobile d0:22:be:a3:41:45 (EAP Id 1)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.433: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.434: d0:22:be:a3:41:45 Received Identity Response (count=1) from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.434: d0:22:be:a3:41:45 EAP State update from Connecting to Authenticating for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.434: d0:22:be:a3:41:45 dot1x - moving mobile d0:22:be:a3:41:45 into Authenticating state
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.434: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.442: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.442: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=141) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.442: d0:22:be:a3:41:45 WARNING: updated EAP-Identifier 1 ===> 141 for STA d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.442: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 141)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.446: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.446: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 141, EAP Type 3)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.446: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.452: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.452: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=142) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.452: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 142)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.458: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.458: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 142, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.458: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.465: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.465: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=143) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.465: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 143)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.479: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.479: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 143, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.479: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.485: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.485: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=144) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.485: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 144)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.502: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.502: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 144, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.502: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.507: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.507: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=145) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.507: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 145)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.524: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.524: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 145, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.524: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.543: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.543: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=146) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.543: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 146)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.550: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.550: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 146, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.550: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.556: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.556: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=147) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.556: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 147)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.560: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.560: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 147, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.560: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.566: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.566: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=148) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.567: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 148)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.573: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.573: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 148, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.573: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.586: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.586: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=149) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.586: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 149)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.595: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.595: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 149, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.595: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.602: d0:22:be:a3:41:45 Processing Access-Challenge for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.602: d0:22:be:a3:41:45 Entering Backend Auth Req state (id=150) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.602: d0:22:be:a3:41:45 Sending EAP Request from AAA to mobile d0:22:be:a3:41:45 (EAP Id 150)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.608: d0:22:be:a3:41:45 Received EAPOL EAPPKT from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.608: d0:22:be:a3:41:45 Received EAP Response from mobile d0:22:be:a3:41:45 (EAP Id 150, EAP Type 25)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.608: d0:22:be:a3:41:45 Entering Backend Auth Response state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.626: d0:22:be:a3:41:45 Processing Access-Accept for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.626: d0:22:be:a3:41:45 Resetting web IPv4 acl from 255 to 255
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.626: d0:22:be:a3:41:45 Resetting web IPv4 Flex acl from 65535 to 65535
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 26
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 Re-applying interface policy for client 
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2018)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2246)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 apfApplyWlanPolicy: Retaining the ACL recieved in AAA attributes 255 on mobile 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 Applying site-specific override for station d0:22:be:a3:41:45 - vapId 1, site 'NADEC-FF', interface 'nadec-ff'
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 0
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.628: d0:22:be:a3:41:45 Re-applying interface policy for client 
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.629: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2018)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.629: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2246)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.629: d0:22:be:a3:41:45 Inserting AAA Override struct for mobile
MAC: d0:22:be:a3:41:45, source 4
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.629: d0:22:be:a3:41:45 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 26
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.629: d0:22:be:a3:41:45 Re-applying interface policy for client 
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2018)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2246)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Applying Local Bridging Interface Policy for station d0:22:be:a3:41:45 - vlan 27, interface id 15, interface 'nadec-sf'
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Setting re-auth timeout to 0 seconds, got from WLAN config.
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Station d0:22:be:a3:41:45 setting dot1x reauth timeout = 0
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Stopping reauth timeout for d0:22:be:a3:41:45 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Creating a PKC PMKID Cache entry for station d0:22:be:a3:41:45 (RSN 2)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Resetting MSCB PMK Cache Entry 0 for station d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Setting active key cache index 8 ---> 8
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Adding BSSID 00:3a:9a:aa:ab:d0 to PMKID cache at index 0 for station d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: New PMKID: (16)
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630:      [0000] dd 0e f0 da 73 3f 12 e4 2a 28 9e 2b 9d 19 e9 3f
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 Disabling re-auth since PMK lifetime can take care of same.
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.630: d0:22:be:a3:41:45 PMK sent to mobility group
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Sending EAP-Success to mobile d0:22:be:a3:41:45 (EAP Id 150)
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Freeing AAACB from Dot1xCB as AAA auth is done for  mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Found an cache entry for BSSID 00:3a:9a:aa:ab:d0 in PMKID cache at index 0 of station d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Found an cache entry for BSSID 00:3a:9a:aa:ab:d0 in PMKID cache at index 0 of station d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: Including PMKID in M1  (16)
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631:      [0000] dd 0e f0 da 73 3f 12 e4 2a 28 9e 2b 9d 19 e9 3f
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Starting key exchange to mobile d0:22:be:a3:41:45, data packets will be dropped
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Sending EAPOL-Key Message to mobile d0:22:be:a3:41:45
   state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Entering Backend Auth Success state (id=150) for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 Received Auth Success while in Authenticating state for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.631: d0:22:be:a3:41:45 dot1x - moving mobile d0:22:be:a3:41:45 into Authenticated state
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.639: d0:22:be:a3:41:45 Received EAPOL-Key from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.640: d0:22:be:a3:41:45 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.640: d0:22:be:a3:41:45 Received EAPOL-key in PTK_START state (message 2) from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.640: d0:22:be:a3:41:45 PMK: Sending cache add
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.640: d0:22:be:a3:41:45 Stopping retransmission timer for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.640: d0:22:be:a3:41:45 Sending EAPOL-Key Message to mobile d0:22:be:a3:41:45
   state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.647: d0:22:be:a3:41:45 Received EAPOL-Key from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.647: d0:22:be:a3:41:45 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.647: d0:22:be:a3:41:45 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.647: d0:22:be:a3:41:45 Stopping retransmission timer for mobile d0:22:be:a3:41:45
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.647: d0:22:be:a3:41:45 apfMs1xStateInc
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.648: d0:22:be:a3:41:45 10.10.27.46 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.648: d0:22:be:a3:41:45 Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.648: d0:22:be:a3:41:45 10.10.27.46 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:9a:aa:ab:d0 vapId 1 apVapId 1 flex-acl-name: 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.648: d0:22:be:a3:41:45 apfMsRunStateInc
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.648: d0:22:be:a3:41:45 10.10.27.46 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)
 
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.650: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Reached PLUMBFASTPATH: from line 6076
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.650: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Adding Fast Path rule
  type = Airespace AP Client
  on AP 00:3a:9a:aa:ab:d0, slot 0, interface = 13, QOS = 2
  IPv4 ACL ID = 255, IPv6 ACL ID = 2
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.650: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Fast Path rule (contd...) 802.1P = 6, DSCP = 0, TokenID = 15206  Local Bridging Vlan = 27, Local Bridging intf id = 15
*Dot1x_NW_MsgTask_5: Jun 19 10:58:28.650: d0:22:be:a3:41:45 10.10.27.46 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255)
*pemReceiveTask: Jun 19 10:58:28.650: d0:22:be:a3:41:45 10.10.27.46 Added NPU entry of type 1, dtlFlags 0x0
*pemReceiveTask: Jun 19 10:58:28.650: d0:22:be:a3:41:45 Pushing IPv6: fe80:0000:0000:0000: d222:beff:fea3:4145 , and MAC: D0:22:BE:A3:41:45 , Binding to Data Plane. SUCCESS !!
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP received op BOOTREQUEST (1) (len 323,vlan 0, port 13, encap 0xec03)
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP processing DHCP REQUEST (3)
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP   op: BOOTREQUEST, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP   xid: 0x8ecc8114 (2395767060), secs: 0, flags: 0
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP   chaddr: d0:22:be:a3:41:45
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP   ciaddr: 0.0.0.0,  yiaddr: 0.0.0.0
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP   siaddr: 0.0.0.0,  giaddr: 0.0.0.0
*DHCP Socket Task: Jun 19 10:58:29.133: d0:22:be:a3:41:45 DHCP   requested ip: 10.10.27.46
*DHCP Socket Task: Jun 19 10:58:29.134: d0:22:be:a3:41:45 DHCP successfully bridged packet to DS
*DHCP Socket Task: Jun 19 10:58:29.135: d0:22:be:a3:41:45 DHCP received op BOOTREPLY (2) (len 313,vlan 27, port 13, encap 0xec00)
*DHCP Socket Task: Jun 19 10:58:29.135: d0:22:be:a3:41:45 DHCP processing DHCP ACK (5)
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   xid: 0x8ecc8114 (2395767060), secs: 0, flags: 0
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   chaddr: d0:22:be:a3:41:45
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   ciaddr: 0.0.0.0,  yiaddr: 10.10.27.46
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   siaddr: 0.0.0.0,  giaddr: 10.10.27.252
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   server id: 10.10.8.3  rcvd server id: 10.10.8.3
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP successfully bridged packet to STA
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP received op BOOTREPLY (2) (len 313,vlan 27, port 13, encap 0xec00)
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP processing DHCP ACK (5)
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   xid: 0x8ecc8114 (2395767060), secs: 0, flags: 0
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   chaddr: d0:22:be:a3:41:45
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   ciaddr: 0.0.0.0,  yiaddr: 10.10.27.46
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   siaddr: 0.0.0.0,  giaddr: 10.10.27.253
*DHCP Socket Task: Jun 19 10:58:29.136: d0:22:be:a3:41:45 DHCP   server id: 10.10.8.3  rcvd server id: 10.10.8.3
 
(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >

 

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
Sandeep Choudhary Thu, 06/19/2014 - 10:01
User Badges:
  • Purple, 4500 points or more
  • Cisco Designated VIP,

    2017 Wireless

also paste the output of this command: sh wlan <wlan id>

 

Regards

Actions

This Discussion

 

 

Trending Topics - Security & Network