I have a issue with disassociation with AP330

  • 1
  • Question
  • Updated 10 months ago
I have a issues where some HP laptops are disassociated from the AP when authenticating 




2017-09-28 11:25:09 info    ah_cli: admin:<show logging buffered tail 500>
2017-09-28 11:25:09 warn    ah_dcd: wifi0 interface Tx retry rate alarm threshold:40 current:41
2017-09-28 11:25:09 debug   last message repeated 5 times
2017-09-28 11:25:07 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:07 info    ah_auth: station_new_status_trap_force: ah_dcd_get_radio_one_sta(4c57:cade:c2ae) failed
2017-09-28 11:25:07 info    amrp2: receive event STA leave: 4c57:cade:c2ae de-associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:25:07 info    ah_auth: ah_rt_sta_del: 4c57:cade:c2ae
2017-09-28 11:25:07 warn    ah_auth: event 2 notification
2017-09-28 11:25:07 info    ah_auth: sta 4c57:cade:c2ae is disassociated from 08ea:4495:e16b(wifi1.4) in driver
2017-09-28 11:25:07 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:25:06 debug   last message repeated 3 times
2017-09-28 11:25:05 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:04 info    ah_auth: Station 4c57:cade:c2ae ip 10.82.84.5 username n/a hostname iPhone OS Apple iOS, flag = DHCP
2017-09-28 11:25:04 notice  ah_auth: Station 4c57:cade:c2ae is authenticated to 08ea:4495:e16b thru SSID N-Mobile vid 62
2017-09-28 11:25:04 info    kernel: [qos]: add qos user 4c57:cade:c2ae idx 158 uppid 3
2017-09-28 11:25:04 info    ah_auth: detect station(4c57:cade:c2ae) os(Apple iOS) via DHCP fingerprint
2017-09-28 11:25:04 info    amrp2: set proxy route: 4c57:cade:c2ae -> 08ea:4495:e140 ifp wifi1.4 upid 62 flag 0x1c03 monitor(0/0) pkt/sec ok
2017-09-28 11:25:04 info    kernel: [mesh]: set proxy : 4c57:cade:c2ae 08ea:4495:e140 wifi1.4 flag 0x1c03
2017-09-28 11:25:04 info    amrp2: receive event <STA join>: 4c57:cade:c2ae (ip 10.82.84.5) associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:25:04 info    ah_auth: add new RT sta: MAC=4c57:cade:c2ae, IP=10.82.84.5, hostname=iPhone, username= on wifi1.4
2017-09-28 11:25:04 info    ah_auth: [Auth]STA(4c57:cade:c2ae) login to SSID(wifi1.4) by user_name=
2017-09-28 11:25:04 warn    ah_auth: received EAPOL-Key frame (4/4 Pairwise)
2017-09-28 11:25:04 warn    ah_auth: sending 3/4 msg of 4-Way Handshake
2017-09-28 11:25:04 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:25:04 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:25:04 warn    ah_auth: start authentication
2017-09-28 11:25:04 warn    ah_auth: event 1 notification
2017-09-28 11:25:04 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269998544, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:25:04 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:25:04 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:04 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:03 info    ah_auth: station_new_status_trap_force: ah_dcd_get_radio_one_sta(4c57:cade:c2ae) failed
2017-09-28 11:25:03 info    amrp2: receive event STA leave: 4c57:cade:c2ae de-associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:25:03 info    ah_auth: ah_rt_sta_del: 4c57:cade:c2ae
2017-09-28 11:25:03 warn    ah_auth: event 2 notification
2017-09-28 11:25:03 info    ah_auth: sta 4c57:cade:c2ae is disassociated from 08ea:4495:e16b(wifi1.4) in driver
2017-09-28 11:25:03 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:25:03 debug   last message repeated 5 times
2017-09-28 11:25:01 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:00 info    ah_auth: sta b85a:73c5:db8a is disassociated from 08ea:4495:e154(wifi0.1) in driver
2017-09-28 11:25:00 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:25:00 info    amrp2: receive event STA leave: b85a:73c5:db8a de-associate wifi0.1 upid 62 vlan 0 flag 0x00000000
2017-09-28 11:25:00 info    ah_auth: Notify driver to disassoc b85a:73c5:db8a from wifi0.1
2017-09-28 11:25:00 info    ah_auth: Try to disassoc b85a:73c5:db8a from 08ea:4495:e154(wifi0.1) for ssid N-Guest because of 4way handshake failure
2017-09-28 11:25:00 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:25:00 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:00 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:25:00 info    kernel: [mesh]: set proxy : 286a:ba85:549f 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:25:00 info    amrp2: set proxy route: 286a:ba85:549f -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:24:59 debug   last message repeated 5 times
2017-09-28 11:24:57 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:57 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:56 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:56 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:24:56 debug   last message repeated 7 times
2017-09-28 11:24:53 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:52 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:52 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:52 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:24:52 debug   last message repeated 5 times
2017-09-28 11:24:50 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:49 info    ah_auth: Station 4c57:cade:c2ae ip 10.82.84.5 username n/a hostname iPhone OS Apple iOS, flag = DHCP
2017-09-28 11:24:49 notice  ah_auth: Station 4c57:cade:c2ae is authenticated to 08ea:4495:e16b thru SSID N-Mobile vid 62
2017-09-28 11:24:49 info    kernel: [qos]: add qos user 4c57:cade:c2ae idx 158 uppid 3
2017-09-28 11:24:49 info    ah_auth: detect station(4c57:cade:c2ae) os(Apple iOS) via DHCP fingerprint
2017-09-28 11:24:49 info    amrp2: set proxy route: 4c57:cade:c2ae -> 08ea:4495:e140 ifp wifi1.4 upid 62 flag 0x1c03 monitor(0/0) pkt/sec ok
2017-09-28 11:24:49 info    kernel: [mesh]: set proxy : 4c57:cade:c2ae 08ea:4495:e140 wifi1.4 flag 0x1c03
2017-09-28 11:24:49 info    amrp2: receive event <STA join>: 4c57:cade:c2ae (ip 10.82.84.5) associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:24:49 info    ah_auth: add new RT sta: MAC=4c57:cade:c2ae, IP=10.82.84.5, hostname=iPhone, username= on wifi1.4
2017-09-28 11:24:49 info    ah_auth: [Auth]STA(4c57:cade:c2ae) login to SSID(wifi1.4) by user_name=
2017-09-28 11:24:49 warn    ah_auth: received EAPOL-Key frame (4/4 Pairwise)
2017-09-28 11:24:49 warn    ah_auth: sending 3/4 msg of 4-Way Handshake
2017-09-28 11:24:49 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:49 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:49 warn    ah_auth: start authentication
2017-09-28 11:24:49 warn    ah_auth: event 1 notification
2017-09-28 11:24:49 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269998544, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:24:49 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:24:49 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:49 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:49 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:48 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:48 warn    ah_auth: start authentication
2017-09-28 11:24:48 warn    ah_auth: event 1 notification
2017-09-28 11:24:48 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269906536, sm 270207856, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:24:48 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:24:48 info    ah_auth: sta b85a:73c5:db8a is disassociated from 08ea:4495:e154(wifi0.1) in driver
2017-09-28 11:24:48 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:24:48 debug   last message repeated 37 times
2017-09-28 11:24:28 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:27 info    kernel: [mesh]: set proxy : cc29:f57c:95cf 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:24:27 info    amrp2: set proxy route: cc29:f57c:95cf -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:24:27 debug   last message repeated 13 times
2017-09-28 11:24:21 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:20 info    kernel: [mesh]: set proxy : 787e:616b:b0ec 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:24:20 info    amrp2: set proxy route: 787e:616b:b0ec -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:24:20 debug   last message repeated 7 times
2017-09-28 11:24:17 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:16 info    amrp2: receive event STA leave: b85a:73c5:db8a de-associate wifi0.1 upid 62 vlan 0 flag 0x00000000
2017-09-28 11:24:16 warn    ah_auth: event 2 notification
2017-09-28 11:24:16 info    ah_auth: sta b85a:73c5:db8a is disassociated from 08ea:4495:e154(wifi0.1) in driver
2017-09-28 11:24:16 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:24:16 debug   last message repeated 3 times
2017-09-28 11:24:15 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:14 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:14 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:14 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:24:14 debug   last message repeated 7 times
2017-09-28 11:24:11 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:10 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:10 info    amrp2: set proxy route: 9494:268d:9708 -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:24:10 info    kernel: [mesh]: set proxy : 9494:268d:9708 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:24:10 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:10 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:24:10 debug   last message repeated 7 times
2017-09-28 11:24:07 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:06 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:24:06 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:24:06 warn    ah_auth: start authentication
2017-09-28 11:24:06 warn    ah_auth: event 1 notification
2017-09-28 11:24:06 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269906536, sm 270207856, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:24:06 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:24:06 debug   last message repeated 7 times
2017-09-28 11:24:03 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:24:02 info    kernel: [mesh]: set proxy : f863:3f21:a3d1 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:24:02 info    amrp2: set proxy route: f863:3f21:a3d1 -> 08ea:4495:e000 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:24:02 debug   last message repeated 42 times
2017-09-28 11:23:41 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:647
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 647
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:41 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:1308
2017-09-28 11:23:41 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 1308
2017-09-28 11:23:40 debug   last message repeated 9 times
2017-09-28 11:23:35 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:34 info    ah_auth: Remove entry from sync timer list: instance-id(284), src-ip(172.17.4.9), sta(9c4f:da67:5198)
2017-09-28 11:23:34 debug   last message repeated 15 times
2017-09-28 11:23:26 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:25 info    kernel: [qos]: add qos user 9c4f:da67:5198 idx 8 uppid 3
2017-09-28 11:23:25 info    ah_auth: Try to disassoc 9c4f:da67:5198 from 08ea:4495:e154 for ssid N-Guest because the sta is associated with other AP
2017-09-28 11:23:25 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:25 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:24 info    ah_auth: Add entry to sync timer list: instance-id(284), src-ip(172.17.4.9), sta(9c4f:da67:5198)
2017-09-28 11:23:24 info    kernel: [mesh]: set proxy : 9c4f:da67:5198 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:23:24 info    amrp2: receive event STA leave: 9c4f:da67:5198 de-associate wifi0.1 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:23:24 info    amrp2: set proxy route: 9c4f:da67:5198 -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:23:24 info    ah_auth: Receive event [STA roam away] for 9c4f:da67:5198(at ifmac=08ea:4495:e154)
2017-09-28 11:23:24 info    ah_auth: sta 9c4f:da67:5198 is disassociated from 08ea:4495:e154(wifi0.1) in driver
2017-09-28 11:23:24 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[9c4f:da67:5198] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:23:24 info    ah_auth: ah_rt_sta_del: 9c4f:da67:5198
2017-09-28 11:23:24 info    ah_auth: Notify driver to disassoc 9c4f:da67:5198 from wifi0.1
2017-09-28 11:23:24 info    ah_auth: Notify driver to disassoc 9c4f:da67:5198 from wifi0.1
2017-09-28 11:23:24 info    ah_auth: Receive event [STA roam away] for 9c4f:da67:5198(at ifmac=08ea:4495:e154)
2017-09-28 11:23:24 info    amrp2: STA 9c4f:da67:5198 roaming away to 172.17.4.9
2017-09-28 11:23:24 debug   last message repeated 11 times
2017-09-28 11:23:19 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:18 info    kernel: [mesh]: set proxy : f863:3f21:99a9 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:23:18 info    amrp2: set proxy route: f863:3f21:99a9 -> 08ea:4495:df00 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:23:18 debug   last message repeated 3 times
2017-09-28 11:23:17 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:16 info    kernel: [mesh]: set proxy : f863:3f21:a4b2 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:23:16 info    amrp2: set proxy route: f863:3f21:a4b2 -> 08ea:4495:df00 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:23:16 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:16 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:15 info    kernel: [mesh]: set proxy : f863:3f21:9562 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:23:15 info    amrp2: set proxy route: f863:3f21:9562 -> 08ea:4495:df00 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:23:15 debug   last message repeated 5 times
2017-09-28 11:23:13 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:13 info    amrp2: receive event STA leave: c81e:e706:2025 de-associate wifi1.1 upid 62 vlan 0 flag 0x00000000
2017-09-28 11:23:13 warn    ah_auth: event 2 notification
2017-09-28 11:23:13 info    ah_auth: sta c81e:e706:2025 is disassociated from 08ea:4495:e168(wifi1.1) in driver
2017-09-28 11:23:13 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[c81e:e706:2025] at Hapd[08ea:4495:e168, wifi1.1]
2017-09-28 11:23:12 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:12 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:12 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:23:12 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:23:12 info    ah_auth: STA(c81e:e706:2025) at 08ea:4495:e168(wifi1.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:23:11 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:11 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:11 info    kernel: [mesh]: set proxy : f863:3f21:a3d1 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:23:11 info    amrp2: set proxy route: f863:3f21:a3d1 -> 08ea:4495:e000 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:23:10 debug   last message repeated 5 times
2017-09-28 11:23:08 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:08 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:23:08 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:23:08 warn    ah_auth: start authentication
2017-09-28 11:23:08 warn    ah_auth: event 1 notification
2017-09-28 11:23:08 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269951320, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:23:08 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[c81e:e706:2025] at Hapd[08ea:4495:e168, wifi1.1]
2017-09-28 11:23:07 debug   last message repeated 3 times
2017-09-28 11:23:06 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:05 info    amrp2: set proxy route: f863:3f21:ba60 -> 08ea:4495:df00 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:23:05 info    kernel: [mesh]: set proxy : f863:3f21:ba60 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:23:05 info    capwap: CAPWAP: receive RedSec get proxy info response event!, length:29
2017-09-28 11:23:05 info    capwap: receive event RedSec get proxy info response: eventid = 241: length = 29
2017-09-28 11:23:05 info    ah_scd: response to HM successfully, self isn't a elected Radsec proxy server.
2017-09-28 11:23:05 debug   ah_scd: Get proxy server info success, 1 totally.
2017-09-28 11:23:05 debug   last message repeated 9 times
2017-09-28 11:23:01 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:23:01 info    ah_auth: station_new_status_trap_force: ah_dcd_get_radio_one_sta(4c57:cade:c2ae) failed
2017-09-28 11:23:01 info    amrp2: receive event STA leave: 4c57:cade:c2ae de-associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:23:01 info    ah_auth: ah_rt_sta_del: 4c57:cade:c2ae
2017-09-28 11:23:01 warn    ah_auth: event 2 notification
2017-09-28 11:23:01 info    ah_auth: sta 4c57:cade:c2ae is disassociated from 08ea:4495:e16b(wifi1.4) in driver
2017-09-28 11:23:01 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:23:00 debug   last message repeated 3 times
2017-09-28 11:22:59 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:58 debug   kernel: skip bg-scan on dev(wifi0)
2017-09-28 11:22:58 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:58 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:57 debug   kernel: wifi0: Failed to start bg-scan
2017-09-28 11:22:57 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 153, cont periodic scan 
2017-09-28 11:22:57 debug   last message repeated 7 times
2017-09-28 11:22:53 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:52 info    kernel: [mesh]: set proxy : f863:3f21:a3d1 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:22:52 info    amrp2: set proxy route: f863:3f21:a3d1 -> 08ea:4495:e000 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:22:52 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:52 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:52 info    kernel: [mesh]: set proxy : f863:3f21:a35e 08ea:4495:e100 n/a flag 0x1402
2017-09-28 11:22:52 info    amrp2: set proxy route: f863:3f21:a35e -> 08ea:4495:e100 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:22:51 debug   last message repeated 9 times
2017-09-28 11:22:47 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:46 info    ah_auth: Station 4c57:cade:c2ae ip 10.82.84.5 username n/a hostname iPhone OS Apple iOS, flag = DHCP
2017-09-28 11:22:46 notice  ah_auth: Station 4c57:cade:c2ae is authenticated to 08ea:4495:e16b thru SSID N-Mobile vid 62
2017-09-28 11:22:46 info    ah_auth: detect station(4c57:cade:c2ae) os(Apple iOS) via DHCP fingerprint
2017-09-28 11:22:46 info    kernel: [qos]: add qos user 4c57:cade:c2ae idx 158 uppid 3
2017-09-28 11:22:46 info    kernel: [mesh]: set proxy : 4c57:cade:c2ae 08ea:4495:e140 wifi1.4 flag 0x1c03
2017-09-28 11:22:46 info    amrp2: set proxy route: 4c57:cade:c2ae -> 08ea:4495:e140 ifp wifi1.4 upid 62 flag 0x1c03 monitor(0/0) pkt/sec ok
2017-09-28 11:22:46 info    amrp2: receive event <STA join>: 4c57:cade:c2ae (ip 10.82.84.5) associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:22:46 info    ah_auth: add new RT sta: MAC=4c57:cade:c2ae, IP=10.82.84.5, hostname=iPhone, username= on wifi1.4
2017-09-28 11:22:46 info    ah_auth: [Auth]STA(4c57:cade:c2ae) login to SSID(wifi1.4) by user_name=
2017-09-28 11:22:46 warn    ah_auth: received EAPOL-Key frame (4/4 Pairwise)
2017-09-28 11:22:46 warn    ah_auth: sending 3/4 msg of 4-Way Handshake
2017-09-28 11:22:46 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:22:46 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:22:46 warn    ah_auth: start authentication
2017-09-28 11:22:46 warn    ah_auth: event 1 notification
2017-09-28 11:22:46 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269998544, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:22:46 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:22:46 debug   last message repeated 3 times
2017-09-28 11:22:45 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:45 info    ah_auth: station_new_status_trap_force: ah_dcd_get_radio_one_sta(4c57:cade:c2ae) failed
2017-09-28 11:22:45 info    ah_auth: station_new_status_trap_force: ah_dcd_get_radio_one_sta(4c57:cade:c2ae) failed
2017-09-28 11:22:45 info    amrp2: receive event STA leave: 4c57:cade:c2ae de-associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:22:45 info    ah_auth: ah_rt_sta_del: 4c57:cade:c2ae
2017-09-28 11:22:45 warn    ah_auth: event 2 notification
2017-09-28 11:22:45 info    ah_auth: sta 4c57:cade:c2ae is disassociated from 08ea:4495:e16b(wifi1.4) in driver
2017-09-28 11:22:45 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:22:44 debug   last message repeated 13 times
2017-09-28 11:22:38 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:37 info    capwap: CAPWAP: receive capwap_idp_push event!, length:41
2017-09-28 11:22:37 info    capwap: receive event capwap_idp_push: eventid = 120: length = 41
2017-09-28 11:22:37 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:37 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:37 info    kernel: [qos]: add qos user 4c57:cade:c2ae idx 158 uppid 3
2017-09-28 11:22:36 info    ah_auth: Recieve sync reply for station(4c57:cade:c2ae) from (172.17.4.9) buf-size (232) time sec(1506594156) usec(746913) len (248)
2017-09-28 11:22:36 info    ah_auth: Recieve sync reply for station(4c57:cade:c2ae) from (172.17.4.9) buf-size (1376) time sec(1506594156) usec(745573) len (1392)
2017-09-28 11:22:36 info    ah_auth: Send station (4c57:cade:c2ae) session sync query count (0) to old ap (08ea:4495:e017) (172.17.4.9) time sec(1506594156) usec(728765)
2017-09-28 11:22:36 info    kernel: [mesh]: set proxy : 4c57:cade:c2ae 08ea:4495:e140 wifi1.4 flag 0x1c03
2017-09-28 11:22:36 info    amrp2: set proxy route: 4c57:cade:c2ae -> 08ea:4495:e140 ifp wifi1.4 upid 62 flag 0x1c03 monitor(0/0) pkt/sec ok
2017-09-28 11:22:36 info    amrp2: receive event <STA join>: 4c57:cade:c2ae (ip 10.82.84.5) associate wifi1.4 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:22:36 info    ah_auth: add new RT sta: MAC=4c57:cade:c2ae, IP=10.82.84.5, hostname=iPhone, username= on wifi1.4
2017-09-28 11:22:36 info    ah_auth: [Auth]STA(4c57:cade:c2ae) login to SSID(wifi1.4) by user_name=
2017-09-28 11:22:36 warn    ah_auth: received EAPOL-Key frame (4/4 Pairwise)
2017-09-28 11:22:36 warn    ah_auth: sending 3/4 msg of 4-Way Handshake
2017-09-28 11:22:36 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:22:36 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:22:36 warn    ah_auth: start authentication
2017-09-28 11:22:36 warn    ah_auth: event 1 notification
2017-09-28 11:22:36 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269998544, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:22:36 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e16b, wifi1.4]
2017-09-28 11:22:36 debug   last message repeated 11 times
2017-09-28 11:22:31 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:31 info    kernel: [mesh]: set proxy : 4c57:cade:c2ae 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:22:31 info    amrp2: set proxy route: 4c57:cade:c2ae -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:22:30 debug   last message repeated 5 times
2017-09-28 11:22:28 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:28 warn    ah_dcd: IDP: AP 0618:d6e1:f6e4 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 1, RSSI -84, SSID sapele, ENC open, Reason ( oui )
2017-09-28 11:22:27 debug   last message repeated 3 times
2017-09-28 11:22:26 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:25 info    capwap: CAPWAP: receive capwap_idp_push event!, length:98
2017-09-28 11:22:25 info    capwap: receive event capwap_idp_push: eventid = 120: length = 98
2017-09-28 11:22:25 debug   last message repeated 4 times
2017-09-28 11:22:23 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:23 warn    ah_dcd: IDP: AP 0418:d6e1:f6e4 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 1, RSSI -85, SSID dolmain1, ENC wpa, Reason ( oui )
2017-09-28 11:22:22 debug   last message repeated 4 times
2017-09-28 11:22:20 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:19 warn    ah_dcd: IDP: AP 0418:d6e1:f2d0 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 1, RSSI -70, SSID dolmain1, ENC wpa, Reason ( oui )
2017-09-28 11:22:19 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:19 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:18 info    kernel: [mesh]: set proxy : f863:3f21:9828 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:22:18 info    amrp2: set proxy route: f863:3f21:9828 -> 08ea:4495:e000 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:22:18 debug   last message repeated 4 times
2017-09-28 11:22:16 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:15 warn    ah_dcd: IDP: AP 0291:f950:1f24 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 1, RSSI -83, SSID BTWi-fi, ENC open, Reason ( oui )
2017-09-28 11:22:15 info    kernel: [mesh]: set proxy : 4c57:cade:c2ae 08ea:4495:e000 n/a flag 0x1402
2017-09-28 11:22:15 info    amrp2: set proxy route: 4c57:cade:c2ae -> 08ea:4495:e000 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:22:15 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:15 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:14 info    capwap: CAPWAP: receive capwap_idp_push event!, length:41
2017-09-28 11:22:14 info    capwap: receive event capwap_idp_push: eventid = 120: length = 41
2017-09-28 11:22:14 debug   last message repeated 9 times
2017-09-28 11:22:10 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:09 info    ah_dcd: wifi0 interface Tx retry rate restore threshold:40 current:17
2017-09-28 11:22:09 debug   last message repeated 8 times
2017-09-28 11:22:05 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:22:05 warn    ah_dcd: IDP: AP 0618:d6e1:f2d0 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 1, RSSI -84, SSID sapele, ENC open, Reason ( oui )
2017-09-28 11:22:04 debug   last message repeated 14 times
2017-09-28 11:21:57 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:56 info    capwap: CAPWAP: receive capwap_idp_push event!, length:123
2017-09-28 11:21:56 info    capwap: receive event capwap_idp_push: eventid = 120: length = 123
2017-09-28 11:21:56 debug   last message repeated 3 times
2017-09-28 11:21:55 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:54 warn    ah_dcd: IDP: AP 1618:d6e2:f6c8 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 36, RSSI -88, SSID sapele, ENC open, Reason ( oui )
2017-09-28 11:21:54 warn    ah_dcd: IDP: AP 0618:d6e2:f6c8 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 36, RSSI -89, SSID dolmain1, ENC wpa, Reason ( oui )
2017-09-28 11:21:54 debug   last message repeated 5 times
2017-09-28 11:21:52 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:51 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-09-28 11:21:51 debug   last message repeated 6 times
2017-09-28 11:21:48 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:47 warn    ah_dcd: IDP: AP 1618:d6e2:f2d0 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 36, RSSI -86, SSID sapele, ENC open, Reason ( oui )
2017-09-28 11:21:47 warn    ah_dcd: IDP: AP 0618:d6e2:f2d0 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 36, RSSI -87, SSID dolmain1, ENC wpa, Reason ( oui )
2017-09-28 11:21:47 debug   last message repeated 29 times
2017-09-28 11:21:30 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:30 info    kernel: [mesh]: set proxy : 787e:616b:b0ec 08ea:4495:e0c0 n/a flag 0x1402
2017-09-28 11:21:30 info    amrp2: set proxy route: 787e:616b:b0ec -> 08ea:4495:e0c0 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:21:30 info    kernel: [mesh]: set proxy : 4c57:cae4:2c82 08ea:4495:e100 n/a flag 0x1402
2017-09-28 11:21:30 info    amrp2: set proxy route: 4c57:cae4:2c82 -> 08ea:4495:e100 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:21:29 debug   last message repeated 24 times
2017-09-28 11:21:17 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:16 info    ah_auth: Remove entry from sync timer list: instance-id(283), src-ip(172.17.0.7), sta(4c66:41da:90f7)
2017-09-28 11:21:16 debug   last message repeated 6 times
2017-09-28 11:21:13 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:12 info    capwap: CAPWAP: receive capwap_idp_push event!, length:42
2017-09-28 11:21:12 info    capwap: receive event capwap_idp_push: eventid = 120: length = 42
2017-09-28 11:21:12 debug   last message repeated 5 times
2017-09-28 11:21:10 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:09 warn    ah_dcd: wifi0 interface Tx retry rate alarm threshold:40 current:59
2017-09-28 11:21:09 debug   last message repeated 5 times
2017-09-28 11:21:07 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:06 info    ah_auth: Add entry to sync timer list: instance-id(283), src-ip(172.17.0.7), sta(4c66:41da:90f7)
2017-09-28 11:21:06 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:06 debug   kernel: skip bg-scan on dev(wifi1)
2017-09-28 11:21:06 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:05 info    kernel: [qos]: add qos user 4c66:41da:90f7 idx 151 uppid 3
2017-09-28 11:21:05 info    ah_auth: Try to disassoc 4c66:41da:90f7 from 08ea:4495:e154 for ssid N-Guest because the sta is associated with other AP
2017-09-28 11:21:05 info    ah_auth: sta 4c66:41da:90f7 is disassociated from 08ea:4495:e154(wifi0.1) in driver
2017-09-28 11:21:05 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[4c66:41da:90f7] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:21:05 info    amrp2: receive event STA leave: 4c66:41da:90f7 de-associate wifi0.1 upid 62 vlan 62 flag 0x00000000
2017-09-28 11:21:05 info    ah_auth: ah_rt_sta_del: 4c66:41da:90f7
2017-09-28 11:21:05 info    amrp2: set proxy route: 4c66:41da:90f7 -> 08ea:4495:df00 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:21:05 info    kernel: [mesh]: set proxy : 4c66:41da:90f7 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:21:05 info    ah_auth: Notify driver to disassoc 4c66:41da:90f7 from wifi0.1
2017-09-28 11:21:05 info    ah_auth: Notify driver to disassoc 4c66:41da:90f7 from wifi0.1
2017-09-28 11:21:05 warn    ah_auth: wifi0.1: get sta 4c66:41da:90f7 stats ioctl failed!
2017-09-28 11:21:05 info    ah_auth: Receive event [STA roam away] for 4c66:41da:90f7(at ifmac=08ea:4495:e154)
2017-09-28 11:21:05 info    ah_dcd: wifi0 interface client 4c66:41da:90f7 Tx retry rate restore threshold:40 current:0
2017-09-28 11:21:05 warn    ah_dcd: wifi0 interface client 4c66:41da:90f7 Tx retry rate alarm threshold:40 current:99
2017-09-28 11:21:05 info    ah_auth: Notify driver to disassoc 4c66:41da:90f7 from wifi0.1
2017-09-28 11:21:05 info    ah_auth: Notify driver to disassoc 4c66:41da:90f7 from wifi0.1
2017-09-28 11:21:05 info    ah_auth: Receive event [STA roam away] for 4c66:41da:90f7(at ifmac=08ea:4495:e154)
2017-09-28 11:21:05 info    amrp2: STA 4c66:41da:90f7 roaming away to 172.17.4.5
2017-09-28 11:21:05 debug   last message repeated 5 times
2017-09-28 11:21:03 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:02 warn    ah_dcd: IDP: AP b45d:50b8:3940 detected, Detector AP(NEST_RH_FL7_AP04) 172.17.4.8, Type rogue, CH 1, RSSI -81, SSID PW-Wifi, ENC wpa, Reason ( oui )
2017-09-28 11:21:02 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:02 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:21:01 info    amrp2: receive event STA leave: c81e:e706:2025 de-associate wifi1.1 upid 62 vlan 0 flag 0x00000000
2017-09-28 11:21:01 warn    ah_auth: event 2 notification
2017-09-28 11:21:01 info    ah_auth: sta c81e:e706:2025 is disassociated from 08ea:4495:e168(wifi1.1) in driver
2017-09-28 11:21:01 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[c81e:e706:2025] at Hapd[08ea:4495:e168, wifi1.1]
2017-09-28 11:21:01 debug   last message repeated 3 times
2017-09-28 11:21:00 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:59 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:20:59 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:59 info    ah_auth: STA(c81e:e706:2025) at 08ea:4495:e168(wifi1.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:20:59 debug   last message repeated 6 times
2017-09-28 11:20:56 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:55 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:20:55 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:55 warn    ah_auth: start authentication
2017-09-28 11:20:55 warn    ah_auth: event 1 notification
2017-09-28 11:20:55 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269951320, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:20:55 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[c81e:e706:2025] at Hapd[08ea:4495:e168, wifi1.1]
2017-09-28 11:20:55 debug   last message repeated 52 times
2017-09-28 11:20:29 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:28 info    ah_auth: sta 4c57:cade:c2ae is disassociated from 08ea:4495:e157(wifi0.4) in driver
2017-09-28 11:20:28 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e157, wifi0.4]
2017-09-28 11:20:28 info    amrp2: receive event STA leave: 4c57:cade:c2ae de-associate wifi0.4 upid 62 vlan 0 flag 0x00000000
2017-09-28 11:20:28 info    ah_auth: Notify driver to disassoc 4c57:cade:c2ae from wifi0.4
2017-09-28 11:20:28 info    ah_auth: Try to disassoc 4c57:cade:c2ae from 08ea:4495:e157(wifi0.4) for ssid N-Mobile because of 4way handshake failure
2017-09-28 11:20:28 info    ah_auth: STA(4c57:cade:c2ae) at 08ea:4495:e157(wifi0.4, N-Mobile) EAPOL-Key timeout, wpa_ptk_state=7[WPA_PTK_PTKSTART(1/4)]
2017-09-28 11:20:28 debug   last message repeated 7 times
2017-09-28 11:20:25 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:25 info    kernel: [mesh]: set proxy : f863:3f21:a5c0 08ea:4495:e100 n/a flag 0x1402
2017-09-28 11:20:25 info    amrp2: set proxy route: f863:3f21:a5c0 -> 08ea:4495:e100 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:20:24 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:24 info    ah_auth: STA(4c57:cade:c2ae) at 08ea:4495:e157(wifi0.4, N-Mobile) EAPOL-Key timeout, wpa_ptk_state=7[WPA_PTK_PTKSTART(1/4)]
2017-09-28 11:20:24 info    amrp2: receive event STA leave: b85a:73c5:db8a de-associate wifi0.1 upid 62 vlan 0 flag 0x00000000
2017-09-28 11:20:24 warn    ah_auth: event 2 notification
2017-09-28 11:20:24 info    ah_auth: sta b85a:73c5:db8a is disassociated from 08ea:4495:e154(wifi0.1) in driver
2017-09-28 11:20:24 info    ah_auth: [Auth]: receive driver notification[0x8c04, IWEVEXPIRED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:20:24 debug   last message repeated 3 times
2017-09-28 11:20:23 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:22 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:20:22 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:22 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:20:22 debug   last message repeated 3 times
2017-09-28 11:20:21 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:20 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:20 info    ah_auth: STA(4c57:cade:c2ae) at 08ea:4495:e157(wifi0.4, N-Mobile) EAPOL-Key timeout, wpa_ptk_state=7[WPA_PTK_PTKSTART(1/4)]
2017-09-28 11:20:20 debug   last message repeated 3 times
2017-09-28 11:20:19 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:18 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:20:18 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:18 info    ah_auth: STA(b85a:73c5:db8a) at 08ea:4495:e154(wifi0.1, N-Guest) EAPOL-Key timeout, wpa_ptk_state=8[WPA_PTK_PTKCALCNEGOTIATING]
2017-09-28 11:20:18 debug   last message repeated 2 times
2017-09-28 11:20:17 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:16 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:16 warn    ah_auth: start authentication
2017-09-28 11:20:16 warn    ah_auth: event 1 notification
2017-09-28 11:20:16 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269974640, sm 270212456, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:20:16 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[4c57:cade:c2ae] at Hapd[08ea:4495:e157, wifi0.4]
2017-09-28 11:20:16 debug   last message repeated 3 times
2017-09-28 11:20:15 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:14 warn    ah_auth: received EAPOL-Key frame (2/4 Pairwise)
2017-09-28 11:20:14 warn    ah_auth: sending 1/4 msg of 4-Way Handshake
2017-09-28 11:20:14 warn    ah_auth: start authentication
2017-09-28 11:20:14 warn    ah_auth: event 1 notification
2017-09-28 11:20:14 warn    ah_auth: wpa_validate_wpa_ie: wpa_auth 269906536, sm 270151792, wpa_ie 1224922774, wpa_ie_len 22
2017-09-28 11:20:14 info    ah_auth: [Auth]: receive driver notification[0x8c03, IWEVREGISTERED] for Sta[b85a:73c5:db8a] at Hapd[08ea:4495:e154, wifi0.1]
2017-09-28 11:20:14 debug   last message repeated 11 times
2017-09-28 11:20:09 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:20:08 info    kernel: [mesh]: set proxy : 9cf4:8e73:dab1 08ea:4495:e100 n/a flag 0x1402
2017-09-28 11:20:08 info    amrp2: set proxy route: 9cf4:8e73:dab1 -> 08ea:4495:e100 ifp N/A upid 62 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:20:08 debug   last message repeated 53 times
2017-09-28 11:19:42 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:19:41 info    kernel: [mesh]: set proxy : f863:3f21:b86c 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:19:41 info    amrp2: set proxy route: f863:3f21:b86c -> 08ea:4495:df00 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:19:41 debug   last message repeated 3 times
2017-09-28 11:19:40 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:19:40 info    kernel: [mesh]: set proxy : f863:3f21:9837 08ea:4495:df00 n/a flag 0x1402
2017-09-28 11:19:40 info    amrp2: set proxy route: f863:3f21:9837 -> 08ea:4495:df00 ifp N/A upid 10 flag 0x1402 monitor(0/0) pkt/sec ok
2017-09-28 11:19:39 debug   last message repeated 7 times
2017-09-28 11:19:36 debug   kernel: Skip bg-scan since power-save client associated
2017-09-28 11:19:36 info    ah_auth: Station c038:960b:212f ip 10.82.84.75 username PeterHenry-2018 hostname ADV000482 OS Windows 7/Vista, flag = DHCP
2017-09-28 11:19:36 notice  ah_auth: Station c038:960b:212f is authenticated to 08ea:4495:e154 thru SSID N-Guest vid 62
2017-09-28 11:19:36 info    ah_auth: detect station(c038:960b:212f) os(Windows 7/Vista) via DHCP fingerprint
2017-09-28 11:19:35 info    kernel: [qos]: add qos user c038:960b:212f idx 95 uppid 3
Photo of Phil

Phil

  • 3 Posts
  • 0 Reply Likes

Posted 10 months ago

  • 1

There are no replies.