0% found this document useful (0 votes)
30 views21 pages

DebugTrace 1a31.Ec87.79ef

The document logs a series of events related to a client device with MAC address 1a31.ec87.79ef attempting to associate with a wireless network. It details the association process, including failures to decode certain information elements, successful state transitions, and the initiation of L2 authentication. The client ultimately completes the authentication process and triggers mobility discovery, indicating successful connection to the network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views21 pages

DebugTrace 1a31.Ec87.79ef

The document logs a series of events related to a client device with MAC address 1a31.ec87.79ef attempting to associate with a wireless network. It details the association process, including failures to decode certain information elements, successful state transitions, and the initiation of L2 authentication. The client ultimately completes the authentication process and triggers mobility discovery, indicating successful connection to the network.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 21

2024/10/11 01:52:46.

435828 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): Failed to


dot11 map external to internal ie type. Unsupported IE received, skip decode . IE
Type :199
2024/10/11 01:52:46.435829 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): Failed to
dot11 map external to internal ie type. Unsupported IE received, skip decode . IE
Type :59
2024/10/11 01:52:46.435831 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): Failed to
dot11 get vendor specific id. Wrong vendor ie Type(1) received
2024/10/11 01:52:46.436023 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (note): MAC:
1a31.ec87.79ef Association received. BSSID 1006.ed9d.894b, WLAN AHST-STD, Slot 1
AP 1006.ed9d.8940, AP1006.ED4B.0F7C
2024/10/11 01:52:46.436065 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Received Dot11 association request. Processing started,SSID:
AHST-STD, Policy profile: NMU-AHST-STD, AP Name: AP1006.ED4B.0F7C, Ap Mac Address:
1006.ed9d.8940 BSSID MAC0000.0000.0000 wlan ID: 2RSSI: -35, SNR: 0
2024/10/11 01:52:46.436180 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_INIT -> S_CO_ASSOCIATING
2024/10/11 01:52:46.436374 {wncd_x_R0-7}{1}: [dot11-validate] [20886]: (info): MAC:
1a31.ec87.79ef WiFi direct: Dot11 validate P2P IE. P2P IE not present.
2024/10/11 01:52:46.436510 {wncd_x_R0-7}{1}: [dot11] [20886]: (debug): MAC:
1a31.ec87.79ef dot11 send association response. Sending association response with
resp_status_code: 0
2024/10/11 01:52:46.436513 {wncd_x_R0-7}{1}: [dot11] [20886]: (debug): MAC:
1a31.ec87.79ef Dot11 Capability info byte1 1, byte2: 11
2024/10/11 01:52:46.436534 {wncd_x_R0-7}{1}: [dot11-frame] [20886]: (info): MAC:
1a31.ec87.79ef WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy
disabled
2024/10/11 01:52:46.436551 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef dot11 send association response. Sending assoc response of length:
137 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS
2024/10/11 01:52:46.436628 {wncd_x_R0-7}{1}: [dot11] [20886]: (note): MAC:
1a31.ec87.79ef Association success. AID 1, Roaming = False, WGB = False, 11r =
False, 11w = False
2024/10/11 01:52:46.436641 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef DOT11 state transition: S_DOT11_INIT -> S_DOT11_ASSOCIATED
2024/10/11 01:52:46.436698 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Station Dot11 association is successful.
2024/10/11 01:52:46.436757 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Starting L2 authentication. Bssid in state
machine:1006.ed9d.894b Bssid in request is:1006.ed9d.894b
2024/10/11 01:52:46.436773 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_ASSOCIATING ->
S_CO_L2_AUTH_IN_PROGRESS
2024/10/11 01:52:46.436814 {wncd_x_R0-7}{1}: [client-auth] [20886]: (note): MAC:
1a31.ec87.79ef L2 Authentication initiated. method WEBAUTH, Policy VLAN 1716,AAA
override = 0
2024/10/11 01:52:46.436831 {wncd_x_R0-7}{1}: [sanet-shim-translate] [20886]: (ERR):
1a31.ec87.79ef wlan_profile Not Found : Device information attributes not
populated
2024/10/11 01:52:46.436874 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Session Start event called from SANET-SHIM with
conn_hdl 14, vlan: 0
2024/10/11 01:52:46.436967 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Wireless session sequence, create context with
method WebAuth
2024/10/11 01:52:46.437191 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [1a31.ec87.79ef:capwap_91c00072] - authc_list: LDAP-Auth
2024/10/11 01:52:46.437193 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [1a31.ec87.79ef:capwap_91c00072] - authz_list: Not present under wlan
configuration
2024/10/11 01:52:46.437222 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_INIT ->
S_AUTHIF_AWAIT_L2_WEBAUTH_START_RESP
2024/10/11 01:52:46.437338 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:unknown] auth mgr attr change notification is received for attr
(952)
2024/10/11 01:52:46.437370 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (1263)
2024/10/11 01:52:46.437429 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (220)
2024/10/11 01:52:46.437445 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (952)
2024/10/11 01:52:46.437453 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Retrieved Client IIF ID 0xe0010f21
2024/10/11 01:52:46.437482 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Allocated audit session id
000000000005C65A79474365
2024/10/11 01:52:46.437965 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Applying policy for WlanId: 2, bssid :
1006.ed9d.894b, slotid: 1 bssid hdl : 12364632845799459223
2024/10/11 01:52:46.437967 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Wlan vlan-id from bssid hdl 1716
2024/10/11 01:52:46.438482 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] SM Reauth Plugin: Received valid timeout = 1800
2024/10/11 01:52:46.438818 {wncd_x_R0-7}{1}: [webauth-sm] [20886]: (info): [
0.0.0.0]Starting Webauth, mac [1a:31:ec:87:79:ef],IIF 0 , audit-ID
000000000005C65A79474365
2024/10/11 01:52:46.438868 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [0000.0000.0000:unknown] Retrieved zone id 0x0 for bssid
12364632845799459223
2024/10/11 01:52:46.438936 {wncd_x_R0-7}{1}: [webauth-acl] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 0.0.0.0]Applying IPv4 intercept ACL via
SVM, name: IP-Adm-V4-Int-ACL-global, priority: 50, IIF-ID: 0
2024/10/11 01:52:46.439268 {wncd_x_R0-7}{1}: [epm-redirect] [20886]: (info):
[0000.0000.0000:unknown] URL-Redirect-ACL = IP-Adm-V4-Int-ACL-global
2024/10/11 01:52:46.440074 {wncd_x_R0-7}{1}: [webauth-acl] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 0.0.0.0]Applying IPv6 intercept ACL via
SVM, name: IP-Adm-V6-Int-ACL-global, priority: 52, IIF-ID: 0
2024/10/11 01:52:46.440340 {wncd_x_R0-7}{1}: [epm-redirect] [20886]: (info):
[0000.0000.0000:unknown] URL-Redirect-ACL = IP-Adm-V6-Int-ACL-global
2024/10/11 01:52:46.441322 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition:
S_AUTHIF_AWAIT_L2_WEBAUTH_START_RESP -> S_AUTHIF_L2_WEBAUTH_PENDING
2024/10/11 01:52:46.441329 {wncd_x_R0-7}{1}: [ewlc-infra-evq] [20886]: (note):
Authentication Success. Resolved Policy bitmap:11 for client 1a31.ec87.79ef
2024/10/11 01:52:46.441333 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_PENDING
-> S_AUTHIF_L2_WEBAUTH_PENDING
2024/10/11 01:52:46.441367 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_PENDING
-> S_AUTHIF_L2_WEBAUTH_DONE
2024/10/11 01:52:46.441380 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef L2 Authentication of station is successful., L3 Authentication
: 1
2024/10/11 01:52:46.441447 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (note): MAC:
1a31.ec87.79ef Mobility discovery triggered. Client mode: Local
2024/10/11 01:52:46.441450 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_L2_AUTH_IN_PROGRESS ->
S_CO_MOBILITY_DISCOVERY_IN_PROGRESS
2024/10/11 01:52:46.441468 {wncd_x_R0-7}{1}: [mm-transition] [20886]: (info): MAC:
1a31.ec87.79ef MMIF FSM transition: S_MA_INIT ->
S_MA_MOBILITY_DISCOVERY_PROCESSED_TR on E_MA_MOBILITY_DISCOVERY
2024/10/11 01:52:46.441524 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Invalid transmitter ip in build client context
2024/10/11 01:52:46.441666 {wncd_x_R0-7}{1}: [mm-client] [20886]: (debug): MAC:
1a31.ec87.79ef Sending mobile_announce of XID (0) to (MobilityD[0])
2024/10/11 01:52:46.441776 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Received mobile_announce, sub type: 0 of XID (0) from (WNCD[7])
2024/10/11 01:52:46.442270 {mobilityd_R0-0}{1}: [mm-transition] [21854]: (info):
MAC: 1a31.ec87.79ef MMFSM transition: S_MC_INIT ->
S_MC_ANNOUNCE_PROCESSED_NEW_CLIENT_TR on E_MC_ANNOUNCE_RCVD from WNCD[7]
2024/10/11 01:52:46.442374 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Add MCC by tdl mac: client_ifid 0xa00004ba is assigned to client
2024/10/11 01:52:46.442392 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Sending capwap_msg_unknown (100) of XID (3688350) to (WNCD[7])
2024/10/11 01:52:46.442434 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
0000.0000.0000 Sending mobile_announce_nak of XID (3688350) to (WNCD[7])
2024/10/11 01:52:46.442761 {wncd_x_R0-7}{1}: [mm-client] [20886]: (debug): MAC:
1a31.ec87.79ef Received mobile_announce_nak, sub type: 1 of XID (3688350) from
(MobilityD[0])
2024/10/11 01:52:46.442810 {wncd_x_R0-7}{1}: [mm-transition] [20886]: (info): MAC:
1a31.ec87.79ef MMIF FSM transition: S_MA_INIT_WAIT_ANNOUNCE_RSP ->
S_MA_NAK_PROCESSED_TR on E_MA_NAK_RCVD
2024/10/11 01:52:46.442815 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Roam type changed - None -> None
2024/10/11 01:52:46.442833 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Mobility role changed - Unassoc -> Local
2024/10/11 01:52:46.442935 {wncd_x_R0-7}{1}: [mm-client] [20886]: (note): MAC:
1a31.ec87.79ef Mobility Successful. Roam Type None, Sub Roam Type
MM_SUB_ROAM_TYPE_NONE, Client IFID: 0xa00004ba, Client Role: Local PoA: 0x91c00072
PoP: 0x0
2024/10/11 01:52:46.442957 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Processing mobility response from MMIF. Client ifid:
0xa00004ba, roam type: None, client role: Local
2024/10/11 01:52:46.443054 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef Client QoS add mobile cb
2024/10/11 01:52:46.443117 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:0.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:52:46.443128 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:1.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:52:46.443156 {wncd_x_R0-7}{1}: [client-auth] [20886]: (note): MAC:
1a31.ec87.79ef ADD MOBILE sent. Client state flags: 0x72 BSSID: MAC:
1006.ed9d.894b capwap IFID: 0x91c00072
2024/10/11 01:52:46.443198 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_MOBILITY_DISCOVERY_IN_PROGRESS -
> S_CO_DPATH_PLUMB_IN_PROGRESS
2024/10/11 01:52:46.450919 {wncd_x_R0-7}{1}: [dot11] [20886]: (note): MAC:
1a31.ec87.79ef Client datapath entry params - ssid:AHST-STD,slot_id:1 bssid ifid:
0x0, radio_ifid: 0x91c00073, wlan_ifid: 0xf0400002
2024/10/11 01:52:46.450997 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef Client QoS dpath create params
2024/10/11 01:52:46.451062 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:0.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:52:46.451066 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:1.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:52:46.451075 {wncd_x_R0-7}{1}: [avc-afc] [20886]: (debug): AVC
enabled for client 1a31.ec87.79ef
2024/10/11 01:52:46.451278 {wncd_x_R0-7}{1}: [dpath_svc] [20886]: (note): MAC:
1a31.ec87.79ef Client datapath entry created for ifid 0xa00004ba
2024/10/11 01:52:46.451516 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS ->
S_CO_IP_LEARN_IN_PROGRESS
2024/10/11 01:52:46.451746 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_INIT -> S_IPLEARN_IN_PROGRESS
2024/10/11 01:52:46.453962 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE ->
S_AUTHIF_L2_WEBAUTH_DONE
2024/10/11 01:52:46.783211 {wncd_x_R0-7}{1}: [auth-mgr-feat_dsensor] [20886]:
(info): [1a31.ec87.79ef:capwap_91c00072] Skipping DHCP TLVs for further processing.
DHCP based classification isn't enabled
2024/10/11 01:52:46.783517 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): RX:
DHCPv4 from interface capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst
MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST,
SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: 1a31.ec87.79ef
2024/10/11 01:52:46.783638 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): TX:
DHCPv4 from interface capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst
MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST,
SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: 1a31.ec87.79ef
2024/10/11 01:52:46.784398 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): RX:
DHCPv4 from interface Te0/0/6 on vlan 1716 Src MAC: cc90.706c.dcbf Dst MAC:
1a31.ec87.79ef src_ip: 172.16.0.1, dst_ip: 172.16.0.6, BOOTPREPLY, SISF_DHCPACK,
giaddr: 0.0.0.0, yiaddr: 172.16.0.6, CMAC: 1a31.ec87.79ef
2024/10/11 01:52:46.784620 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): TX:
DHCPv4 from interface Te0/0/6 on vlan 1716 Src MAC: cc90.706c.dcbf Dst MAC:
1a31.ec87.79ef src_ip: 172.16.0.1, dst_ip: 172.16.0.6, BOOTPREPLY, SISF_DHCPACK,
giaddr: 0.0.0.0, yiaddr: 172.16.0.6, CMAC: 1a31.ec87.79ef
2024/10/11 01:52:46.784780 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (note): MAC:
1a31.ec87.79ef Client IP learn successful. Method: DHCP IP: 172.16.0.6
2024/10/11 01:52:46.784828 {wncd_x_R0-7}{1}: [epm] [20886]: (info):
[0000.0000.0000:unknown] HDL = 0x0 vlan 1716 fail count 0 dirty_counter 0 is_dirty
0
2024/10/11 01:52:46.785019 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (8)
2024/10/11 01:52:46.785216 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [0000.0000.0000:unknown] Retrieved zone id 0x0 for bssid
12364632845799459223
2024/10/11 01:52:46.785272 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_IN_PROGRESS ->
S_IPLEARN_COMPLETE
2024/10/11 01:52:46.785346 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Received ip learn response. method: IPLEARN_METHOD_DHCP
2024/10/11 01:52:46.785374 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Triggered L3 authentication. status = 0x0, Success
2024/10/11 01:52:46.785377 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_IP_LEARN_IN_PROGRESS ->
S_CO_L3_AUTH_IN_PROGRESS
2024/10/11 01:52:46.785458 {wncd_x_R0-7}{1}: [client-auth] [20886]: (note): MAC:
1a31.ec87.79ef L3 Authentication initiated. LWA
2024/10/11 01:52:46.785470 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE ->
S_AUTHIF_WEBAUTH_PENDING
2024/10/11 01:52:46.946209 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:52:46.946299 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:52:46.946929 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:52:46.946979 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:52:47.106054 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:52:47.106066 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:47.106087 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[172.16.0.1] url [http://172.16.0.1/]
2024/10/11 01:52:47.126055 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:52:47.126061 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:47.126079 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:52:47.519185 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.ff87.79ef Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff87:79ef, type:
ND_NEIGHBOR_SOLICIT
2024/10/11 01:52:47.519396 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.ff87.79ef Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff87:79ef, type:
ND_NEIGHBOR_SOLICIT
2024/10/11 01:52:48.193990 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:52:48.194006 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:48.194057 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:52:48.249290 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:52:48.249295 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:48.249316 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:52:48.272962 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:52:48.272978 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:48.273022 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:52:48.327144 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef Client IP learn successful. Method: IPv6 NDP IP:
fe80::1831:ecff:fe87:79ef
2024/10/11 01:52:48.327187 {wncd_x_R0-7}{1}: [epm] [20886]: (info):
[0000.0000.0000:unknown] HDL = 0x0 vlan 1716 fail count 0 dirty_counter 0 is_dirty
0
2024/10/11 01:52:48.327242 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (10)
2024/10/11 01:52:48.327588 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE
2024/10/11 01:52:48.333006 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:52:48.333086 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:52:48.361742 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef Client IP learn successful. Method: IPv6 NDP IP:
fe80::1831:ecff:fe87:79ef
2024/10/11 01:52:48.361828 {wncd_x_R0-7}{1}: [epm] [20886]: (info):
[0000.0000.0000:unknown] HDL = 0x0 vlan 1716 fail count 0 dirty_counter 0 is_dirty
0
2024/10/11 01:52:48.362141 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (10)
2024/10/11 01:52:48.362218 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE
2024/10/11 01:52:51.227784 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:52:51.227790 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:51.227812 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url
[https://192.0.2.1:443/login.html?redirect=http://connectivitycheck.gstatic.com/
generate_204]
2024/10/11 01:52:51.227900 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Sending Webauth login form, len
8077
2024/10/11 01:52:51.360819 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:52:51.360835 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:51.360883 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:52:51.360924 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:52:51.413610 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:52:51.413616 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:52:51.413633 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:52:51.413675 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:52:52.158896 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:52:52.158978 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:52:59.608534 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:52:59.608615 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:53:07.180311 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:53:07.180365 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]49044 Sending "400 Bad Request"
error page
2024/10/11 01:53:09.366358 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:53:09.366776 {wncd_x_R0-7}{1}: [sadb-attr] [20886]: (info): Removing
ipv6 addresses from the attr list 1593841931,sm_ctx = 0x808206b0d8, num_ipv6 = 1
2024/10/11 01:53:09.366862 {wncd_x_R0-7}{1}: [caaa-authen] [20886]: (info):
[CAAA:AUTHEN:3e0008c9] DEBUG: mlist=LDAP-Auth for type=0
2024/10/11 01:53:09.430284 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:53:09.430291 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:09.430310 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:53:09.430359 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:53:14.323800 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:53:14.323888 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:53:14.471679 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:53:14.471693 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:14.471713 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:53:14.629703 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:53:14.629719 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:14.629775 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/favicon.ico]
2024/10/11 01:53:15.646657 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:53:15.646672 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:15.646737 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url
[https://192.0.2.1:443/login.html?redirect=http://connectivitycheck.gstatic.com/
generate_204]
2024/10/11 01:53:15.646822 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Sending Webauth login form, len
8077
2024/10/11 01:53:15.842952 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:53:15.842958 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:15.842978 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:53:15.843019 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:53:15.858795 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:53:15.858811 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:15.858866 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:53:15.858933 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:53:17.361478 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:53:17.361519 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]38974 Sending "400 Bad Request"
error page
2024/10/11 01:53:30.497293 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:53:30.497420 {wncd_x_R0-7}{1}: [sadb-attr] [20886]: (info): Removing
ipv6 addresses from the attr list -838856119,sm_ctx = 0x808206b0d8, num_ipv6 = 1
2024/10/11 01:53:30.497498 {wncd_x_R0-7}{1}: [caaa-authen] [20886]: (info):
[CAAA:AUTHEN:3e0008c9] DEBUG: mlist=LDAP-Auth for type=0
2024/10/11 01:53:30.561068 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:53:30.561074 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:30.561092 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:53:30.561139 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:53:33.416008 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:53:33.416014 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:33.416034 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:53:33.604085 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:53:33.604100 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:33.604143 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/favicon.ico]
2024/10/11 01:53:34.651920 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:53:34.651926 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:34.651947 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url
[https://192.0.2.1:443/login.html?redirect=http://connectivitycheck.gstatic.com/
generate_204]
2024/10/11 01:53:34.652024 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Sending Webauth login form, len
8077
2024/10/11 01:53:34.866031 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:53:34.866047 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:34.866092 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:53:34.866200 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:53:34.881992 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:53:34.881998 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:53:34.882015 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:53:34.882051 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:53:43.125933 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:53:43.126029 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:53:47.267162 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:53:47.267212 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]38334 Sending "400 Bad Request"
error page
2024/10/11 01:53:47.630763 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:53:47.630800 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]41972 Sending "400 Bad Request"
error page
2024/10/11 01:54:04.244639 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: cc90.706c.dcbf ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:54:04.244748 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: cc90.706c.dcbf ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:54:04.245107 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:54:04.245161 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:54:06.927171 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:54:06.927292 {wncd_x_R0-7}{1}: [sadb-attr] [20886]: (info): Removing
ipv6 addresses from the attr list -1476387744,sm_ctx = 0x808206b0d8, num_ipv6 = 1
2024/10/11 01:54:06.927372 {wncd_x_R0-7}{1}: [caaa-authen] [20886]: (info):
[CAAA:AUTHEN:3e0008c9] DEBUG: mlist=LDAP-Auth for type=0
2024/10/11 01:54:06.988226 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:54:06.988241 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:54:06.988285 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:54:06.988383 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:54:07.323192 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in INIT state
2024/10/11 01:54:07.323236 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]38376 Sending Webauth expired page
2024/10/11 01:54:12.347753 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:54:12.347768 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:54:12.347813 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:54:12.606362 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:54:12.606368 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:54:12.606386 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/favicon.ico]
2024/10/11 01:54:13.655587 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:54:13.655594 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:54:13.655614 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url
[https://192.0.2.1:443/login.html?redirect=http://connectivitycheck.gstatic.com/
generate_204]
2024/10/11 01:54:13.655708 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Sending Webauth login form, len
8077
2024/10/11 01:54:13.975042 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:54:13.975059 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:54:13.975104 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:54:13.975202 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:54:13.996636 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:54:13.996642 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:54:13.996659 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:54:13.996702 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:54:22.177768 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:54:22.177904 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]41692 Sending "400 Bad Request"
error page
2024/10/11 01:54:25.781547 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:54:25.781624 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]45662 Sending "400 Bad Request"
error page
2024/10/11 01:54:38.799733 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:54:38.799818 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:54:41.922697 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: cc90.706c.dcbf ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:54:41.922802 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: cc90.706c.dcbf ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:54:41.923145 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:54:41.923198 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:56:13.655422 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Authc failure from WebAuth, Auth event no-response
2024/10/11 01:56:13.655517 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] AUTHC_FAIL - unauthorize by default
2024/10/11 01:56:13.655521 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Signalling Authc fail for client 1a31.ec87.79ef
2024/10/11 01:56:13.655553 {wncd_x_R0-7}{1}: [ewlc-infra-evq] [20886]: (ERR):
SANET_AUTHC_FAILURE - No Response from Client username , audit session id
000000000005C65A79474365,
2024/10/11 01:56:13.655910 {wncd_x_R0-7}{1}: [errmsg] [20886]: (note):
%SESSION_MGR-5-FAIL: Authorization failed or unapplied for client (1a31.ec87.79ef)
on Interface capwap_91c00072 AuditSessionID 000000000005C65A79474365. Failure
reason: Authc fail. Authc failure reason: No Response from Client.
2024/10/11 01:56:13.655914 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Authz failed/unapplied for 0x3E0008C9
(1a31.ec87.79ef), method: webauth. Signal switch PI.
2024/10/11 01:56:13.655985 {wncd_x_R0-7}{1}: [webauth-acl] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Unapply IPv4 intecept ACL via SVM,
name "IP-Adm-V4-Int-ACL-global", pri 50, IIF 0
2024/10/11 01:56:13.656917 {wncd_x_R0-7}{1}: [webauth-acl] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Unapply IPv6 intecept ACL via SVM,
name "IP-Adm-V6-Int-ACL-global", pri 52, IIF 0
2024/10/11 01:56:13.657911 {wncd_x_R0-7}{1}: [aaa-attr-inf] [20886]: (info):
<< method 0 1 [webauth]>>
2024/10/11 01:56:13.657915 {wncd_x_R0-7}{1}: [aaa-attr-inf] [20886]: (info):
<< clid-mac-addr 0 1a 31 ec 87 79 ef >>
2024/10/11 01:56:13.657917 {wncd_x_R0-7}{1}: [aaa-attr-inf] [20886]: (info):
<< intf-id 0 2445279346 (0x91c00072)>>
2024/10/11 01:56:13.657922 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] No user profile to unapply
2024/10/11 01:56:13.657928 {wncd_x_R0-7}{1}: [ewlc-infra-evq] [20886]: (note):
Authentication Success. Resolved Policy bitmap:0 for client 1a31.ec87.79ef
2024/10/11 01:56:13.657934 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_WEBAUTH_PENDING ->
S_AUTHIF_WEBAUTH_PENDING
2024/10/11 01:56:13.657966 {wncd_x_R0-7}{1}: [client-auth] [20886]: (ERR): MAC:
1a31.ec87.79ef L3 Authentication FAIL.
2024/10/11 01:56:13.657968 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_WEBAUTH_PENDING ->
S_WAIT_FOR_CO_DELETE
2024/10/11 01:56:13.658001 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (info): MAC:
1a31.ec87.79ef Deleting the client, reason: 4,
CO_CLIENT_DELETE_REASON_L3AUTH_FAIL, Client state S_CO_L3_AUTH_IN_PROGRESS
2024/10/11 01:56:13.658136 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (note): MAC:
1a31.ec87.79ef Client delete initiated. Reason:
CO_CLIENT_DELETE_REASON_L3AUTH_FAIL, fsm-state transition 00|00|00|00|00|00|00|00|
00|00|00|00|00|00|00|00|01|07|13|17|18|28|33|42|44|46|48|4d|5c|5d|65|10|
2024/10/11 01:56:13.658255 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (note): MAC:
1a31.ec87.79ef Delete mobile payload sent forbssid: 1006.ed9d.894b WTP mac:
1006.ed9d.8940 slot id: 1
2024/10/11 01:56:13.658266 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_L3_AUTH_IN_PROGRESS ->
S_CO_DELETE_IN_PROGRESS
2024/10/11 01:56:13.658353 {wncd_x_R0-7}{1}: [multicast-main] [20886]: (info): MAC:
1a31.ec87.79ef No Flex/Fabric main record exists for client
2024/10/11 01:56:13.658531 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_COMPLETE ->
S_IPLEARN_DELETE_IN_PROGRESS
2024/10/11 01:56:13.658642 {wncd_x_R0-7}{1}: [dpath_svc] [20886]: (note): MAC:
1a31.ec87.79ef Client datapath entry deleted for ifid 0xa00004ba
2024/10/11 01:56:13.658650 {wncd_x_R0-7}{1}: [mm-transition] [20886]: (info): MAC:
1a31.ec87.79ef MMIF FSM transition: S_MA_LOCAL -> S_MA_DELETE_PROCESSED_TR on
E_MA_CO_DELETE_RCVD
2024/10/11 01:56:13.658698 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Invalid transmitter ip in build client context
2024/10/11 01:56:13.658748 {wncd_x_R0-7}{1}: [mm-client] [20886]: (debug): MAC:
1a31.ec87.79ef Sending handoff_end of XID (0) to (MobilityD[0])
2024/10/11 01:56:13.658837 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Received handoff_end, sub type: 0 of XID (0) from (WNCD[7])
2024/10/11 01:56:13.658918 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Disconnect request from SANET-SHIM (14) for
1a31.ec87.79ef / 0x3e0008c9 - term: supplicant-restart, abort: Unknown, disc:
authorization failure
2024/10/11 01:56:13.658918 {wncd_x_R0-7}{1}: [sanet-shim-translate] [20886]:
(note): MAC: 1a31.ec87.79ef Session manager disconnect event called, session
label: 0x3e0008c9
2024/10/11 01:56:13.658939 {wncd_x_R0-7}{1}: [aaa-attr-inf] [20886]: (info):
[ Applied attribute :bsn-vlan-interface-name 0 "VLAN1716" ]
2024/10/11 01:56:13.658941 {wncd_x_R0-7}{1}: [aaa-attr-inf] [20886]: (info):
[ Applied attribute : timeout 0 1800 (0x708) ]
2024/10/11 01:56:13.658950 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_WAIT_FOR_CO_DELETE ->
S_SANET_DELETE_IN_PROGRESS
2024/10/11 01:56:13.658962 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef Total length of Deauth/Disassoc: 2
2024/10/11 01:56:13.659030 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef Sent disassoc to client, disassoc reason: 252,
CLIENT_DEAUTH_REASON_ADMIN_RESET delete reason: 4,
CO_CLIENT_DELETE_REASON_L3AUTH_FAIL.
2024/10/11 01:56:13.659032 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef Total length of Deauth/Disassoc: 2
2024/10/11 01:56:13.659043 {mobilityd_R0-0}{1}: [mm-transition] [21854]: (info):
MAC: 1a31.ec87.79ef MMFSM transition: S_MC_RUN -> S_MC_HANDOFF_END_RCVD_TR on
E_MC_HANDOFF_END_RCVD from WNCD[7]
2024/10/11 01:56:13.659075 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef Sent deauth to client, deauth reason: 252,
CLIENT_DEAUTH_REASON_ADMIN_RESET delete reason: 4,
CO_CLIENT_DELETE_REASON_L3AUTH_FAIL.
2024/10/11 01:56:13.659163 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef DOT11 state transition: S_DOT11_ASSOCIATED -> S_DOT11_DELETED
2024/10/11 01:56:13.659537 {wncd_x_R0-7}{1}: [caaa-acct] [20886]: (info):
[CAAA:ACCT] Username not available in acct info
2024/10/11 01:56:13.659968 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_SANET_DELETE_IN_PROGRESS
-> S_AUTHIF_DELETED
2024/10/11 01:56:13.660018 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_DELETE_IN_PROGRESS ->
S_CO_DELETED
2024/10/11 01:56:24.185511 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (ERR): MAC:
1a31.ec87.79ef Iplearn receive client ip down. Client not waiting for IP. no FSM
context
2024/10/11 01:56:24.185898 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (ERR): MAC:
1a31.ec87.79ef Iplearn receive client ip down. Client not waiting for IP. no FSM
context
2024/10/11 01:59:05.743197 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): Failed to
dot11 map external to internal ie type. Unsupported IE received, skip decode . IE
Type :59
2024/10/11 01:59:05.743202 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): Failed to
dot11 get vendor specific id. Wrong vendor ie Type(1) received
2024/10/11 01:59:05.743524 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (note): MAC:
1a31.ec87.79ef Association received. BSSID 1006.ed9d.8944, WLAN AHST-STD, Slot 0
AP 1006.ed9d.8940, AP1006.ED4B.0F7C
2024/10/11 01:59:05.743562 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Received Dot11 association request. Processing started,SSID:
AHST-STD, Policy profile: NMU-AHST-STD, AP Name: AP1006.ED4B.0F7C, Ap Mac Address:
1006.ed9d.8940 BSSID MAC0000.0000.0000 wlan ID: 2RSSI: -39, SNR: 0
2024/10/11 01:59:05.743673 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_INIT -> S_CO_ASSOCIATING
2024/10/11 01:59:05.743895 {wncd_x_R0-7}{1}: [dot11-validate] [20886]: (info): MAC:
1a31.ec87.79ef WiFi direct: Dot11 validate P2P IE. P2P IE not present.
2024/10/11 01:59:05.744032 {wncd_x_R0-7}{1}: [dot11] [20886]: (debug): MAC:
1a31.ec87.79ef dot11 send association response. Sending association response with
resp_status_code: 0
2024/10/11 01:59:05.744035 {wncd_x_R0-7}{1}: [dot11] [20886]: (debug): MAC:
1a31.ec87.79ef Dot11 Capability info byte1 1, byte2: 14
2024/10/11 01:59:05.744055 {wncd_x_R0-7}{1}: [dot11-frame] [20886]: (info): MAC:
1a31.ec87.79ef WiFi direct: skip build Assoc Resp with P2P IE: Wifi direct policy
disabled
2024/10/11 01:59:05.744065 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef dot11 send association response. Sending assoc response of length:
122 with resp_status_code: 0, DOT11_STATUS: DOT11_STATUS_SUCCESS
2024/10/11 01:59:05.744136 {wncd_x_R0-7}{1}: [dot11] [20886]: (note): MAC:
1a31.ec87.79ef Association success. AID 2, Roaming = False, WGB = False, 11r =
False, 11w = False
2024/10/11 01:59:05.744150 {wncd_x_R0-7}{1}: [dot11] [20886]: (info): MAC:
1a31.ec87.79ef DOT11 state transition: S_DOT11_INIT -> S_DOT11_ASSOCIATED
2024/10/11 01:59:05.744198 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Station Dot11 association is successful.
2024/10/11 01:59:05.744252 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Starting L2 authentication. Bssid in state
machine:1006.ed9d.8944 Bssid in request is:1006.ed9d.8944
2024/10/11 01:59:05.744269 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_ASSOCIATING ->
S_CO_L2_AUTH_IN_PROGRESS
2024/10/11 01:59:05.744306 {wncd_x_R0-7}{1}: [client-auth] [20886]: (note): MAC:
1a31.ec87.79ef L2 Authentication initiated. method WEBAUTH, Policy VLAN 1716,AAA
override = 0
2024/10/11 01:59:05.744321 {wncd_x_R0-7}{1}: [sanet-shim-translate] [20886]: (ERR):
1a31.ec87.79ef wlan_profile Not Found : Device information attributes not
populated
2024/10/11 01:59:05.744364 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Session Start event called from SANET-SHIM with
conn_hdl 14, vlan: 0
2024/10/11 01:59:05.744379 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Wireless session sequence, create context with
method WebAuth
2024/10/11 01:59:05.744396 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [1a31.ec87.79ef:capwap_91c00072] - authc_list: LDAP-Auth
2024/10/11 01:59:05.744398 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [1a31.ec87.79ef:capwap_91c00072] - authz_list: Not present under wlan
configuration
2024/10/11 01:59:05.744421 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_INIT ->
S_AUTHIF_AWAIT_L2_WEBAUTH_START_RESP
2024/10/11 01:59:05.744520 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:unknown] auth mgr attr change notification is received for attr
(952)
2024/10/11 01:59:05.744550 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (1263)
2024/10/11 01:59:05.744570 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (220)
2024/10/11 01:59:05.744588 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (952)
2024/10/11 01:59:05.744596 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Retrieved Client IIF ID 0x8010833
2024/10/11 01:59:05.744623 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Allocated audit session id
000000000005C65E794D0D10
2024/10/11 01:59:05.744846 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Applying policy for WlanId: 2, bssid :
1006.ed9d.8944, slotid: 0 bssid hdl : 12364632846436927274
2024/10/11 01:59:05.744849 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] Wlan vlan-id from bssid hdl 1716
2024/10/11 01:59:05.745280 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] SM Reauth Plugin: Received valid timeout = 1800
2024/10/11 01:59:05.745553 {wncd_x_R0-7}{1}: [webauth-sm] [20886]: (info): [
0.0.0.0]Starting Webauth, mac [1a:31:ec:87:79:ef],IIF 0 , audit-ID
000000000005C65E794D0D10
2024/10/11 01:59:05.745601 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [0000.0000.0000:unknown] Retrieved zone id 0x0 for bssid
12364632846436927274
2024/10/11 01:59:05.745669 {wncd_x_R0-7}{1}: [webauth-acl] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 0.0.0.0]Applying IPv4 intercept ACL via
SVM, name: IP-Adm-V4-Int-ACL-global, priority: 50, IIF-ID: 0
2024/10/11 01:59:05.745960 {wncd_x_R0-7}{1}: [epm-redirect] [20886]: (info):
[0000.0000.0000:unknown] URL-Redirect-ACL = IP-Adm-V4-Int-ACL-global
2024/10/11 01:59:05.746798 {wncd_x_R0-7}{1}: [webauth-acl] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 0.0.0.0]Applying IPv6 intercept ACL via
SVM, name: IP-Adm-V6-Int-ACL-global, priority: 52, IIF-ID: 0
2024/10/11 01:59:05.747058 {wncd_x_R0-7}{1}: [epm-redirect] [20886]: (info):
[0000.0000.0000:unknown] URL-Redirect-ACL = IP-Adm-V6-Int-ACL-global
2024/10/11 01:59:05.747998 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition:
S_AUTHIF_AWAIT_L2_WEBAUTH_START_RESP -> S_AUTHIF_L2_WEBAUTH_PENDING
2024/10/11 01:59:05.748002 {wncd_x_R0-7}{1}: [ewlc-infra-evq] [20886]: (note):
Authentication Success. Resolved Policy bitmap:11 for client 1a31.ec87.79ef
2024/10/11 01:59:05.748006 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_PENDING
-> S_AUTHIF_L2_WEBAUTH_PENDING
2024/10/11 01:59:05.748039 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_PENDING
-> S_AUTHIF_L2_WEBAUTH_DONE
2024/10/11 01:59:05.748053 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef L2 Authentication of station is successful., L3 Authentication
: 1
2024/10/11 01:59:05.748114 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (note): MAC:
1a31.ec87.79ef Mobility discovery triggered. Client mode: Local
2024/10/11 01:59:05.748116 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_L2_AUTH_IN_PROGRESS ->
S_CO_MOBILITY_DISCOVERY_IN_PROGRESS
2024/10/11 01:59:05.748134 {wncd_x_R0-7}{1}: [mm-transition] [20886]: (info): MAC:
1a31.ec87.79ef MMIF FSM transition: S_MA_INIT ->
S_MA_MOBILITY_DISCOVERY_PROCESSED_TR on E_MA_MOBILITY_DISCOVERY
2024/10/11 01:59:05.748192 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Invalid transmitter ip in build client context
2024/10/11 01:59:05.748319 {wncd_x_R0-7}{1}: [mm-client] [20886]: (debug): MAC:
1a31.ec87.79ef Sending mobile_announce of XID (0) to (MobilityD[0])
2024/10/11 01:59:05.748417 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Received mobile_announce, sub type: 0 of XID (0) from (WNCD[7])
2024/10/11 01:59:05.748885 {mobilityd_R0-0}{1}: [mm-transition] [21854]: (info):
MAC: 1a31.ec87.79ef MMFSM transition: S_MC_INIT ->
S_MC_ANNOUNCE_PROCESSED_NEW_CLIENT_TR on E_MC_ANNOUNCE_RCVD from WNCD[7]
2024/10/11 01:59:05.748953 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Add MCC by tdl mac: client_ifid 0xa00004ba is assigned to client
2024/10/11 01:59:05.748973 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
1a31.ec87.79ef Sending capwap_msg_unknown (100) of XID (3688364) to (WNCD[7])
2024/10/11 01:59:05.749014 {mobilityd_R0-0}{1}: [mm-client] [21854]: (debug): MAC:
0000.0000.0000 Sending mobile_announce_nak of XID (3688364) to (WNCD[7])
2024/10/11 01:59:05.749314 {wncd_x_R0-7}{1}: [mm-client] [20886]: (debug): MAC:
1a31.ec87.79ef Received mobile_announce_nak, sub type: 1 of XID (3688364) from
(MobilityD[0])
2024/10/11 01:59:05.749363 {wncd_x_R0-7}{1}: [mm-transition] [20886]: (info): MAC:
1a31.ec87.79ef MMIF FSM transition: S_MA_INIT_WAIT_ANNOUNCE_RSP ->
S_MA_NAK_PROCESSED_TR on E_MA_NAK_RCVD
2024/10/11 01:59:05.749367 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Roam type changed - None -> None
2024/10/11 01:59:05.749385 {wncd_x_R0-7}{1}: [mm-client] [20886]: (info): MAC:
1a31.ec87.79ef Mobility role changed - Unassoc -> Local
2024/10/11 01:59:05.749476 {wncd_x_R0-7}{1}: [mm-client] [20886]: (note): MAC:
1a31.ec87.79ef Mobility Successful. Roam Type None, Sub Roam Type
MM_SUB_ROAM_TYPE_NONE, Client IFID: 0xa00004ba, Client Role: Local PoA: 0x91c00072
PoP: 0x0
2024/10/11 01:59:05.749493 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Processing mobility response from MMIF. Client ifid:
0xa00004ba, roam type: None, client role: Local
2024/10/11 01:59:05.749586 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef Client QoS add mobile cb
2024/10/11 01:59:05.749652 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:0.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:59:05.749660 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:1.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:59:05.749695 {wncd_x_R0-7}{1}: [client-auth] [20886]: (note): MAC:
1a31.ec87.79ef ADD MOBILE sent. Client state flags: 0x72 BSSID: MAC:
1006.ed9d.8944 capwap IFID: 0x91c00072
2024/10/11 01:59:05.749735 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_MOBILITY_DISCOVERY_IN_PROGRESS -
> S_CO_DPATH_PLUMB_IN_PROGRESS
2024/10/11 01:59:05.749828 {wncd_x_R0-7}{1}: [dot11] [20886]: (note): MAC:
1a31.ec87.79ef Client datapath entry params - ssid:AHST-STD,slot_id:0 bssid ifid:
0x0, radio_ifid: 0x91c00054, wlan_ifid: 0xf0400002
2024/10/11 01:59:05.749901 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef Client QoS dpath create params
2024/10/11 01:59:05.749957 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:0.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:59:05.749964 {wncd_x_R0-7}{1}: [ewlc-qos-client] [20886]: (info):
MAC: 1a31.ec87.79ef No QoS PM Name or QoS Level received from SANet for pm_dir:1.
Check client is fastlane, otherwise set pm name to none
2024/10/11 01:59:05.749972 {wncd_x_R0-7}{1}: [avc-afc] [20886]: (debug): AVC
enabled for client 1a31.ec87.79ef
2024/10/11 01:59:05.750169 {wncd_x_R0-7}{1}: [dpath_svc] [20886]: (note): MAC:
1a31.ec87.79ef Client datapath entry created for ifid 0xa00004ba
2024/10/11 01:59:05.750399 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_DPATH_PLUMB_IN_PROGRESS ->
S_CO_IP_LEARN_IN_PROGRESS
2024/10/11 01:59:05.750574 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_INIT -> S_IPLEARN_IN_PROGRESS
2024/10/11 01:59:05.752746 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE ->
S_AUTHIF_L2_WEBAUTH_DONE
2024/10/11 01:59:06.041433 {wncd_x_R0-7}{1}: [auth-mgr-feat_dsensor] [20886]:
(info): [1a31.ec87.79ef:capwap_91c00072] Skipping DHCP TLVs for further processing.
DHCP based classification isn't enabled
2024/10/11 01:59:06.041715 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): RX:
DHCPv4 from interface capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst
MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST,
SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: 1a31.ec87.79ef
2024/10/11 01:59:06.041808 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): TX:
DHCPv4 from interface capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst
MAC: ffff.ffff.ffff src_ip: 0.0.0.0, dst_ip: 255.255.255.255, BOOTPREQUEST,
SISF_DHCPREQUEST, giaddr: 0.0.0.0, yiaddr: 0.0.0.0, CMAC: 1a31.ec87.79ef
2024/10/11 01:59:06.042560 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): RX:
DHCPv4 from interface Te0/0/6 on vlan 1716 Src MAC: cc90.706c.dcbf Dst MAC:
1a31.ec87.79ef src_ip: 172.16.0.1, dst_ip: 172.16.0.6, BOOTPREPLY, SISF_DHCPACK,
giaddr: 0.0.0.0, yiaddr: 172.16.0.6, CMAC: 1a31.ec87.79ef
2024/10/11 01:59:06.042784 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): TX:
DHCPv4 from interface Te0/0/6 on vlan 1716 Src MAC: cc90.706c.dcbf Dst MAC:
1a31.ec87.79ef src_ip: 172.16.0.1, dst_ip: 172.16.0.6, BOOTPREPLY, SISF_DHCPACK,
giaddr: 0.0.0.0, yiaddr: 172.16.0.6, CMAC: 1a31.ec87.79ef
2024/10/11 01:59:06.042939 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (note): MAC:
1a31.ec87.79ef Client IP learn successful. Method: DHCP IP: 172.16.0.6
2024/10/11 01:59:06.042988 {wncd_x_R0-7}{1}: [epm] [20886]: (info):
[0000.0000.0000:unknown] HDL = 0x0 vlan 1716 fail count 0 dirty_counter 0 is_dirty
0
2024/10/11 01:59:06.043173 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (8)
2024/10/11 01:59:06.043317 {wncd_x_R0-7}{1}: [auth-mgr-feat_wireless] [20886]:
(info): [0000.0000.0000:unknown] Retrieved zone id 0x0 for bssid
12364632846436927274
2024/10/11 01:59:06.043368 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_IN_PROGRESS ->
S_IPLEARN_COMPLETE
2024/10/11 01:59:06.043445 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Received ip learn response. method: IPLEARN_METHOD_DHCP
2024/10/11 01:59:06.043469 {wncd_x_R0-7}{1}: [client-orch-sm] [20886]: (debug):
MAC: 1a31.ec87.79ef Triggered L3 authentication. status = 0x0, Success
2024/10/11 01:59:06.043471 {wncd_x_R0-7}{1}: [client-orch-state] [20886]: (note):
MAC: 1a31.ec87.79ef Client state transition: S_CO_IP_LEARN_IN_PROGRESS ->
S_CO_L3_AUTH_IN_PROGRESS
2024/10/11 01:59:06.043554 {wncd_x_R0-7}{1}: [client-auth] [20886]: (note): MAC:
1a31.ec87.79ef L3 Authentication initiated. LWA
2024/10/11 01:59:06.043565 {wncd_x_R0-7}{1}: [client-auth] [20886]: (info): MAC:
1a31.ec87.79ef Client auth-interface state transition: S_AUTHIF_L2_WEBAUTH_DONE ->
S_AUTHIF_WEBAUTH_PENDING
2024/10/11 01:59:06.243509 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:59:06.243606 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: ffff.ffff.ffff ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:59:06.244190 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:59:06.244326 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:59:06.392356 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:59:06.392372 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:06.392423 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:59:06.453638 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:59:06.453644 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:06.453662 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[172.16.0.1] url [http://172.16.0.1/]
2024/10/11 01:59:06.771680 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.ff87.79ef Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff87:79ef, type:
ND_NEIGHBOR_SOLICIT
2024/10/11 01:59:06.771888 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (info): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.ff87.79ef Ipv6 SRC: ::, Ipv6 DST: ff02::1:ff87:79ef, type:
ND_NEIGHBOR_SOLICIT
2024/10/11 01:59:07.580106 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:07.580190 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:07.580419 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef Client IP learn successful. Method: IPv6 NDP IP:
fe80::1831:ecff:fe87:79ef
2024/10/11 01:59:07.580460 {wncd_x_R0-7}{1}: [epm] [20886]: (info):
[0000.0000.0000:unknown] HDL = 0x0 vlan 1716 fail count 0 dirty_counter 0 is_dirty
0
2024/10/11 01:59:07.580513 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (10)
2024/10/11 01:59:07.580704 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE
2024/10/11 01:59:07.583350 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:59:07.583365 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:07.583414 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:59:07.609267 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:59:07.609282 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:07.609325 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:59:07.614916 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef Client IP learn successful. Method: IPv6 NDP IP:
fe80::1831:ecff:fe87:79ef
2024/10/11 01:59:07.615001 {wncd_x_R0-7}{1}: [epm] [20886]: (info):
[0000.0000.0000:unknown] HDL = 0x0 vlan 1716 fail count 0 dirty_counter 0 is_dirty
0
2024/10/11 01:59:07.615204 {wncd_x_R0-7}{1}: [auth-mgr] [20886]: (info):
[1a31.ec87.79ef:capwap_91c00072] auth mgr attr change notification is received for
attr (10)
2024/10/11 01:59:07.615285 {wncd_x_R0-7}{1}: [client-iplearn] [20886]: (info): MAC:
1a31.ec87.79ef IP-learn state transition: S_IPLEARN_COMPLETE -> S_IPLEARN_COMPLETE
2024/10/11 01:59:09.729974 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in GET_REDIRECT state
2024/10/11 01:59:09.729980 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:09.730002 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url
[https://192.0.2.1:443/login.html?redirect=http://connectivitycheck.gstatic.com/
generate_204]
2024/10/11 01:59:09.730079 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Sending Webauth login form, len
8077
2024/10/11 01:59:09.936074 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:59:09.936080 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:09.936098 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:59:09.936145 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:59:09.960019 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:59:09.960025 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:09.960043 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:59:09.960087 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:59:11.262613 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:11.262758 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:18.486104 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:18.486187 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:26.529551 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in LOGIN state
2024/10/11 01:59:26.529676 {wncd_x_R0-7}{1}: [sadb-attr] [20886]: (info): Removing
ipv6 addresses from the attr list -989848399,sm_ctx = 0x8081cb2a80, num_ipv6 = 1
2024/10/11 01:59:26.529769 {wncd_x_R0-7}{1}: [caaa-authen] [20886]: (info):
[CAAA:AUTHEN:2800066a] DEBUG: mlist=LDAP-Auth for type=0
2024/10/11 01:59:26.555613 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in INIT state
2024/10/11 01:59:26.555647 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]49638 Sending Webauth expired page
2024/10/11 01:59:26.631502 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:59:26.631509 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:26.631528 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:59:26.631569 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:59:32.459473 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:32.459562 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:36.755728 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:59:36.755735 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:36.755754 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[142.250.201.3] url [http://connectivitycheck.gstatic.com/generate_204]
2024/10/11 01:59:36.992749 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]POST rcvd when in GET_REDIRECT
state
2024/10/11 01:59:36.992796 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]45872 Sending Webauth expired page
2024/10/11 01:59:37.989523 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in INIT state
2024/10/11 01:59:37.989529 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:37.989550 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url
[https://192.0.2.1:443/login.html?redirect=http://connectivitycheck.gstatic.com/
generate_204]
2024/10/11 01:59:37.989637 {wncd_x_R0-7}{1}: [webauth-page] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Sending Webauth login form, len
8077
2024/10/11 01:59:38.408525 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:59:38.408532 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:38.408552 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:59:38.408594 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:59:38.432606 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]GET rcvd when in LOGIN state
2024/10/11 01:59:38.432621 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]HTTP GET request
2024/10/11 01:59:38.432663 {wncd_x_R0-7}{1}: [webauth-httpd] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse GET, src [172.16.0.6] dst
[192.0.2.1] url [https://192.0.2.1:443/favicon.ico]
2024/10/11 01:59:38.432772 {wncd_x_R0-7}{1}: [webauth-error] [20886]: (info):
capwap_91c00072[1a31.ec87.79ef][ 172.16.0.6]Parse logo GET, File "/favicon.ico"
not found
2024/10/11 01:59:58.699087 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:58.699174 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
IPv6 NDP from intf capwap_91c00072 on vlan 1716 Src MAC: 1a31.ec87.79ef Dst MAC:
3333.0000.0002 Ipv6 SRC: fe80::1831:ecff:fe87:79ef, Ipv6 DST: ff02::2, type:
ND_ROUTER_SOLICIT
2024/10/11 01:59:59.498997 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: cc90.706c.dcbf ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:59:59.499136 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface capwap_91c00072 on vlan 1716 Source MAC: 1a31.ec87.79ef Dest
MAC: cc90.706c.dcbf ARP REQUEST, ARP sender MAC: 1a31.ec87.79ef ARP target MAC:
0000.0000.0000 ARP sender IP: 172.16.0.6, ARP target IP: 172.16.0.1,
2024/10/11 01:59:59.499816 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): RX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,
2024/10/11 01:59:59.499962 {wncd_x_R0-7}{1}: [sisf-packet] [20886]: (debug): TX:
ARP from interface Te0/0/6 on vlan 1716 Source MAC: cc90.706c.dcbf Dest MAC:
1a31.ec87.79ef ARP REPLY, ARP sender MAC: cc90.706c.dcbf ARP target MAC:
1a31.ec87.79ef ARP sender IP: 172.16.0.1, ARP target IP: 172.16.0.6,

You might also like