Сообщения без ответов | Активные темы Текущее время: 20 апр 2024, 00:50



Ответить на тему  [ Сообщений: 4 ] 
Неопознанная сеть по WiFi AP2802I только у одного клиента 
Автор Сообщение

Зарегистрирован: 18 май 2020, 02:07
Сообщения: 25
Здравствуйте.

Один ноутбук не может нормально подключиться в общую сеть через AP2802I. После подключения и отображения в Win7 - что всё нормально, через 5...10 с. появляется "Неопознанная сеть. Без доступа к интернету."

По проводу - подсоединяется и работает в сети хорошо.


Причём, при подключении на гостевую (без пароля) SSID - подключается без вопросов (на этой же точке).

Сделал Debug.

Прошу посмотреть, кто знает - о чём говорят устройства и что им не нравится.

Заранее благодарю.


Сеть:

1. Рутер 921-4P
2. Четыре Влана: 1 - по умолчанию; 2 - гости WiFi; 3 - домашняя сеть; 4 - для management встроенного контроллера точки доступа.
3. Точка 2802 сидит на trunk с native4. Раздаёт всё хорошо - на указанные Vlan_ы.
4. DHCP есть на 921-4P.




*apfReceiveTask: Dec 09 19:36:22.297: 20:68:9d:3d:85:f0 Received management frame ASSOCIATION REQUEST on BSSID 4c:e1:76:dd:26:02 destination addr 4c:e1:76:dd:26:02 slotid 0
*apfMsConnTask_0: Dec 09 19:36:22.297: 20:68:9d:3d:85:f0 Updating the client capabiility as 2
*apfMsConnTask_0: Dec 09 19:36:22.297: 20:68:9d:3d:85:f0 Processing assoc-req station:20:68:9d:3d:85:f0 AP:4c:e1:76:dd:26:00-00 ssid : Serpantin thread:5d8746b0
*apfMsConnTask_0: Dec 09 19:36:22.297: 20:68:9d:3d:85:f0 Station: 20:68:9D:3D:85:F0 trying to join WLAN with RSSI -41. Checking for XOR roam conditions on AP: 4C:E1:76:DD:26:00 Slot: 0
*apfMsConnTask_0: Dec 09 19:36:22.297: 20:68:9d:3d:85:f0 Station: 20:68:9D:3D:85:F0 is associating to AP 4C:E1:76:DD:26:00 which is not XOR roam capable
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Updating location for mobile on same AP 4c:e1:76:dd:26:00-0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Client AVC Roaming context transfer needed? NO
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Setting RTTS enabled to 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Association received from mobile on BSSID 4c:e1:76:dd:26:02 AP 2802
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Station: 20:68:9D:3D:85:F0 trying to join WLAN with RSSI -41. Checking for XOR roam conditions on AP: 4C:E1:76:DD:26:00 Slot: 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Station: 20:68:9D:3D:85:F0 is associating to AP 4C:E1:76:DD:26:00 which is not XOR roam capable
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Global 200 Clients are allowed to AP radio

*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Max Client Trap Threshold: 0 cur: 2

*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Rf profile 600 Clients are allowed to AP wlan

*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Updated local bridging VLAN to 0 while applying WLAN policy
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Updated session timeout to 0 and Sleep timeout to 720 while applying WLAN policy
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 override for default ap group, marking intgrp NULL
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type, Tunnel User - 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Check before Setting the NAS Id to WLAN specific Id ''
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 In processSsidIE:7640 setting Central switched to FALSE
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Disabling flexconnect central association for the client
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Applying site-specific Local Bridging override for station 20:68:9d:3d:85:f0 - vapId 3, site 'default-group', interface 'management'
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Applying Local Bridging Interface Policy for station 20:68:9d:3d:85:f0 - vlan 0, interface id 0, interface 'management', nasId:''
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Set Client Non AP specific WLAN apfMsAccessVlan = 3
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 This apfMsAccessVlan may be changed later from AAA after L2 Auth
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Cleared localSwitchingVlan, may be assigned later based on AAA override
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 processSsidIE statusCode is 0 and status is 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 processSsidIE ssid_done_flag is 0 finish_flag is 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 STA - rates (8): 130 4 11 22 12 18 24 36 48 72 96 108 0 0 0 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 suppRates statusCode is 0 and gotSuppRatesElement is 1
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 STA - rates (12): 130 4 11 22 12 18 24 36 48 72 96 108 0 0 0 0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 extSuppRates statusCode is 0 and gotExtSuppRatesElement is 1
*apfMsConnTask_0: Dec 09 19:36:22.298: RSNIE in Assoc. Req.: (20)

*apfMsConnTask_0: Dec 09 19:36:22.298: [0000] 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f

*apfMsConnTask_0: Dec 09 19:36:22.298: [0016] ac 02 3c 00

*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Processing RSN IE type 48, length 20 for mobile 20:68:9d:3d:85:f0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Selected Unicast cipher CCMP128 for client device
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Received 802.11i PSK key management suite, enabling Authentication
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 RSN Capabilities: 60
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 non-11w Capable mobile
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Received RSN IE(AKM:2) with 0 PMKIDs
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Making Group Mgmt Cipher Suite default for mobile 20:68:9d:3d:85:f0
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 apfValidateDot11wGroupMgmtCipher:2514, 11w Group Mgmt Cipher Suite 6 validation succeeded for STA

*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Assigning flex webauth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 3
*apfMsConnTask_0: Dec 09 19:36:22.298: 20:68:9d:3d:85:f0 Assigned flex post-auth IPv4-ACL ID :65535, IPv6-ACL ID:65535 for AP WLAN ID : 3
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 AID 3 in Assoc Req from flex AP 4c:e1:76:dd:26:00 is same as in mscb 20:68:9d:3d:85:f0
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Assoc Req BSSID 4c:e1:76:dd:26:02 AP(2802) slot 0 ssid (Serpantin) Tmstmp 62751 AID 3 stCode 0/0 apChngd 0 oldAp 4C:E1:76:DD:26:00
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 apfMsRunStateDec
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 apfMs1xStateDec
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 192.168.20.18 RUN (20) Change state to START (0) last state RUN (20)

*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 the value of url acl preserve flag is 0 for mobile 20:68:9d:3d:85:f0 (caller pem_api.c:3816)
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 192.168.20.18 START (0) Initializing policy
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 192.168.20.18 START (0) Change state to AUTHCHECK (2) last state START (0)

*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 apfVapSecurity=0x40004000 L2=16384 SkipWeb=0
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 AuthenticationRequired = 1
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 192.168.20.18 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)

*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Encryption policy is set to 0x80000001
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Flex Central Auth Client
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Setting the action to initiate 1x 4 way handshake upon Add_Mobile_Ack for station with encrypt policy:[80000001]
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 192.168.20.18 8021X_REQD (3) Client already has IP 192.168.20.18, DHCP Not required on AP 4c:e1:76:dd:26:00 vapId 3 apVapId 3
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Not Using WMM Compliance code qosCap 00
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Vlan while overriding the policy = -1
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 192.168.20.18 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 4c:e1:76:dd:26:00 vapId 3 apVapId 3 flex acl-name: v6acl-name
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 apfPemAddUser2 (apf_policy.c:465) Changing state for mobile 20:68:9d:3d:85:f0 on AP 4c:e1:76:dd:26:00 from Associated to Associated

*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 apfPemAddUser2:session timeout forstation 20:68:9d:3d:85:f0 - Session Tout 0, apfMsTimeOut '0' and sessionTimerRunning flag is 0
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Stopping deletion of Mobile Station: (callerId: 48)
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Func: apfPemAddUser2, Ms Timeout = 0, Session Timeout = 0

*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Sending assoc-resp with status 0 station:20:68:9d:3d:85:f0 AP:4c:e1:76:dd:26:02-00 on apVapId 3
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 Sending Assoc Response (status: '0') to station on AP 2802 on BSSID 4c:e1:76:dd:26:02 ApVapId 3 Slot 0, mobility role 1
*apfMsConnTask_0: Dec 09 19:36:22.299: 20:68:9d:3d:85:f0 apfProcessAssocReq (apf_80211.c:12920) Changing state for mobile 20:68:9d:3d:85:f0 on AP 4c:e1:76:dd:26:00 from Associated to Associated

*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Add SGT:0 to AP 4c:e1:76:dd:26:00
*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Dec 09 19:36:22.300: IP context - srcApMac: 4C:E1:76:DD:26:00 msMac: 20:68:9D:3D:85:F0 msIpAddr: 192.168.20.18 msIpv6Cnt: 0
*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Sending client IP( 192.168.20.18 ) context in AddMobile
*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Successful transmission of LWAPP Add-Mobile to AP 4c:e1:76:dd:26:00 slotId 0 idx@18
*spamApTask0: Dec 09 19:36:22.300: 20:68:9d:3d:85:f0 Setting ADD_MOBILE (idx 18, seqno 7, action 1, count 7, last count 7) ack state for STA on AP 4c:e1:76:dd:26:00
*spamApTask0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Received add/del ack packet with sequence number: got 7 expected 7 action = 1
*spamApTask0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Received ADD_MOBILE ack - Initiating 1x to STA 20:68:9d:3d:85:f0 (idx 18)
*spamApTask0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 APF Initiating 1x to STA 20:68:9d:3d:85:f0
*spamApTask0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Sent dot1x auth initiate message for mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 dot1xProcessInitiate1XtoMobile to mobile station 20:68:9d:3d:85:f0 (mscb 11, msg 11)
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 reauth_sm state transition 0 ---> 0 for mobile 20:68:9d:3d:85:f0 at 1x_reauth_sm.c:53
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Normal psk client, full auth
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Creating a PKC PMKID Cache entry for station 20:68:9d:3d:85:f0 (RSN 2)
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Resetting MSCB PMK Cache Entry @index 0 for station 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Removing BSSID 4c:e1:76:dd:26:02 from PMKID cache of station 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Setting active key cache index 0 ---> 8
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Setting active key cache index 8 ---> 0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Created PMKID PMK Cache for BSSID 4c:e1:76:dd:26:02 at index 0 for station 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: New PMKID: (16)

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: [0000] d1 19 e1 1b c1 fe 91 55 40 9b 3c ea 5d 70 a3 2d

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 sendPmkIdinM1 0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Initiating RSN PSK to mobile 20:68:9d:3d:85:f0keyMgmtType : 0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 unsetting PmkIdValidatedByAp
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Not WPA3 OWE client, no creation of OWE pmkcache entry
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 EAP-PARAM Debug - eap-params for Wlan-Id :3 is disabled - applying Global eap timers and retries
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Disable re-auth, use PMK lifetime.
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 dot1x - moving mobile 20:68:9d:3d:85:f0 into Force Auth state
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Skipping EAP-Success to mobile 20:68:9d:3d:85:f0 (encryptBit:0)
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 key Desc Version FT - 0

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 skipping PMKID inclusion in M1.
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Starting key exchange to mobile 20:68:9d:3d:85:f0, data packets will be dropped
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Sending EAPOL-Key Message to mobile 20:68:9d:3d:85:f0
state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.304: 20:68:9d:3d:85:f0 Allocating EAP Pkt for retransmission to mobile 20:68:9d:3d:85:f0
*CAPWAP DATA: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Received EAPOL-Key from mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 key Desc Version FT - 0

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Received EAPOL-key in PTK_START state (message 2) from mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Encryption Policy: 4, PTK Key Length: 48
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Successfully computed PTK from PMK!!!
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Received valid MIC in EAPOL Key Message M2!!!!!
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Compare RSN IE in association and EAPOL-M2 frame(rsnie_len :20, and grpMgmtCipherLen:0)
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 rsnieCapabilty = 3c rsnie_len =20
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Dumping RSNIE received in Association request(len = 22):
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 00000000: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 0...............
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 00000010: 00 0f ac 02 3c 00 ....<.
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Dumping RSNIE received in EAPOL M2 (len = 20):
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 00000000: 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ................
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 00000010: ac 02 3c 00 ..<.
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Stopping retransmission timer for mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 key Desc Version FT - 0

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 key Desc Version FT - 0

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Sending EAPOL-Key Message to mobile 20:68:9d:3d:85:f0
state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.308: 20:68:9d:3d:85:f0 Reusing allocated memory for EAP Pkt for retransmission to mobile 20:68:9d:3d:85:f0
*CAPWAP DATA: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 validating eapol pkt: key version = 2
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Received EAPOL-Key from mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 key Desc Version FT - 0

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Stopping retransmission timer for mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Freeing EAP Retransmit Bufer for mobile 20:68:9d:3d:85:f0
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 apfMs1xStateInc
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 192.168.20.18 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Flex Central Auth Client
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 192.168.20.18 L2AUTHCOMPLETE (4) Client already has IP 192.168.20.18, DHCP Not required on AP 4c:e1:76:dd:26:00 vapId 3 apVapId 3
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Not Using WMM Compliance code qosCap 00
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 flex webauth acl id to be sent :65535 name : client acl id :65535 name :
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 flex webauth ipv6 acl id to be sent :65535 name : client acl id :65535 name :
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 Vlan while overriding the policy = -1
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 192.168.20.18 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 4c:e1:76:dd:26:00 vapId 3 apVapId 3 flex acl-name: v6acl-name
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 apfMsRunStateInc
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.313: 20:68:9d:3d:85:f0 192.168.20.18 L2AUTHCOMPLETE (4) Change state to RUN (20) last state L2AUTHCOMPLETE (4)

*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 192.168.20.18 RUN (20) Reached PLUMBFASTPATH: from line 7506, null
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 192.168.20.18 RUN (20) Not adding NPU. L3-auth not required on this local switching local DHCP client.
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Initiating Accounting request(1) update for mobile
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 PemLocationConfigured [1]Adding VSA with NAS update and Role[1] with state[0]
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 192.168.20.18 RUN (20) No 11v BTM
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 192.168.20.18 RUN (20) NO release MSCB
*Dot1x_NW_MsgTask_0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Successfully Plumbed PTK session Keysfor mobile 20:68:9d:3d:85:f0
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Add SGT:0 to AP 4c:e1:76:dd:26:00
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Add CTS mobile SGT - Encoded the capwap payload for the mobile with SGT 0
*spamApTask0: Dec 09 19:36:22.314: IP context - srcApMac: 4C:E1:76:DD:26:00 msMac: 20:68:9D:3D:85:F0 msIpAddr: 192.168.20.18 msIpv6Cnt: 0
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Sending client IP( 192.168.20.18 ) context in AddMobile
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Flex Ipv6 pre-auth acl is not present, not Encoding Flex Ipv6 acl for add mobile Payload
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Flex Ipv6 post auth acl is not present, not updating add mobile Payload
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Successful transmission of LWAPP Add-Mobile to AP 4c:e1:76:dd:26:00 slotId 0 idx@19
*spamApTask0: Dec 09 19:36:22.314: 20:68:9d:3d:85:f0 Setting ADD_MOBILE (idx 20, action 0, last count 7) ack state for STA on AP 4c:e1:76:dd:26:00
*apfReceiveTask: Dec 09 19:36:22.520: 20:68:9d:3d:85:f0 WcdbClientUpdate: IP Binding from WCDB ip_learn_type 1, add_or_delete 1
*apfReceiveTask: Dec 09 19:36:22.520: 20:68:9d:3d:85:f0 IPv4 Addr: 0:0:0:0

*apfReceiveTask: Dec 09 19:36:22.520: 20:68:9d:3d:85:f0 WcdbClientUpdate: IP Binding from WCDB ip_learn_type 1, add_or_delete 1
*apfReceiveTask: Dec 09 19:36:22.520: 20:68:9d:3d:85:f0 IPv4 Addr: 0:0:0:0

*CAPWAP DATA: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 IAPP-IP-UPDATE(0):891 Bytes received for client
*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 Recieved MS IPv4 Addr= 192.168.20.18
*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 Recieved IPv6 addresses count: 0
*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 WcdbClientUpdate: IP Binding from WCDB ip_learn_type 1, add_or_delete 1
*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 IPv4 Addr: 192:168:20:18

*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 DHCP success event for client. Clearing dhcp failure count for interface management.
*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 DHCP success event for client. Clearing dhcp failure count for interface management.
*apfReceiveTask: Dec 09 19:36:22.521: 20:68:9d:3d:85:f0 No DHCP scope for IP scope name none.


09 дек 2020, 20:12
Профиль

Зарегистрирован: 18 май 2020, 02:07
Сообщения: 25
Добавление:

если убрать "пароль" в WiFi на основной SSID - тоже подключается и работает нормально.

Адаптер на ноуте: любимый всеми Atheros. :twisted:


10 дек 2020, 00:52
Профиль

Зарегистрирован: 18 май 2020, 02:07
Сообщения: 25
Ау, ребята, помогайте.

Есть тут головастые?

Или мне опять циско - документы читать....

зачем тогда форум?


16 дек 2020, 23:23
Профиль

Зарегистрирован: 29 май 2017, 21:19
Сообщения: 1404
Это исключительно проблема клиента потратьте 10$ и купите нормальную карту Intel


17 дек 2020, 02:24
Профиль
Показать сообщения за:  Поле сортировки  
Ответить на тему   [ Сообщений: 4 ] 

Кто сейчас на конференции

Сейчас этот форум просматривают: Google [Bot] и гости: 53


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Найти:
Перейти:  
Создано на основе phpBB® Forum Software © phpBB Group
Designed by ST Software for PTF.
Русская поддержка phpBB