Randomly getting CAPWAP errors in one of our buildings..

  • 1
  • Question
  • Updated 6 months ago
  • (Edited)
So it is summer time in our school district and all of a sudden every day, multiple times a day, I am getting alerted the the CAPWAP connection has been lost with pretty much every AP in one of our buildings. The weird thing is that nothing has been changed network-wise. I've wracked my brain trying to figure out what it could be, especially considering another one of our buildings has the same network setup and also runs off Aerohive boxes but isn't experiencing this issue. I've scoured the forums here and read through every post from one or two years ago and tried looking into some of the stuff other people have suggested and hit a brick wall. Here's our setup and what all I've tried. If anyone can point me in the right direction I would appreciate any input as I admittedly don't know how to really troubleshoot these.

40 Aerohive APs, 120s and 121s running HiveOS 6.5r7.160188. Not sure what OS they were running but I tried upgrading them all to the latest golden release to see if that helped but it didn't.

HiveManager was outdated, upgraded it yesterday but still having this issue.

 Changed the IP Multicast Conversion to Unicast setting to Always on all SSIDs.

I managed to get a log from one of the AP's that has been doing it most frequently, all I can see is that it's failing to start whatever "bg-scan" is and that it can't do something with some vpn_report file.

2017-08-09 06:32:17 info    ah_cli: admin:<show logging buffered tail 500>
2017-08-09 06:31:19 err     capwap: ERROR: execute cd /tmp/brd/high_res; tar czf vpn_report.tgz vpn_report_*.xml.gz failed.
2017-08-09 06:31:09 info    capwap: in ah_up_capture_local_cmd_callback
2017-08-09 06:31:09 info    ah_cli: admin:<save high-resolution-vpn-report local vpn_report.tgz scp://scpuser@34.230.196.102:/HiveManager/tomcat/webapps/hm/upload/interfacereport/00197737A680/high/vpn_report.tgz _password *** >
2017-08-09 06:31:08 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:6700 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:31:08 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:6700 n/a flag 0x1402
2017-08-09 06:31:03 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b14f:1880 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:31:03 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b14f:1880 n/a flag 0x1402
2017-08-09 06:30:59 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b152:9340 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:30:59 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b152:9340 n/a flag 0x1402
2017-08-09 06:30:59 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b14f:1880 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:30:59 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b14f:1880 n/a flag 0x1402
2017-08-09 06:30:58 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b152:9340 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:30:58 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b152:9340 n/a flag 0x1402
2017-08-09 06:30:52 info    amrp2: set proxy route: 483b:380d:72dd -> 0019:7733:da80 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:30:52 info    kernel: [mesh]: set proxy : 483b:380d:72dd 0019:7733:da80 n/a flag 0x1402
2017-08-09 06:30:46 info    amrp2: set proxy route: 483b:380d:72dd -> 0019:7733:da80 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:30:46 info    kernel: [mesh]: set proxy : 483b:380d:72dd 0019:7733:da80 n/a flag 0x1402
2017-08-09 06:30:33 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:66c0 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:30:33 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:66c0 n/a flag 0x1402
2017-08-09 06:29:59 warn    capwap: A rogue client 483b:380d:72dd connected to rogue AP 4018:b14e:ae17 is detected.
2017-08-09 06:29:59 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 144
2017-08-09 06:29:48 warn    capwap: A rogue client 483b:380d:72dd connected to rogue AP 4018:b14e:b797 is detected.
2017-08-09 06:29:48 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 144
2017-08-09 06:29:46 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b14e:ae00 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:46 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b14e:ae00 n/a flag 0x1402
2017-08-09 06:29:45 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b14e:ae00 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:45 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b14e:ae00 n/a flag 0x1402
2017-08-09 06:29:32 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b14e:b780 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:32 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b14e:b780 n/a flag 0x1402
2017-08-09 06:29:28 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b152:9e00 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:28 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b152:9e00 n/a flag 0x1402
2017-08-09 06:29:24 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b152:9e00 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:24 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b152:9e00 n/a flag 0x1402
2017-08-09 06:29:16 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 06:29:16 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 760
2017-08-09 06:29:15 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b14f:0a40 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:15 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b14f:0a40 n/a flag 0x1402
2017-08-09 06:29:05 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b152:8840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:29:05 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:27:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 06:26:54 info    capwap: CAPWAP: receive capwap_idp_push event!, length:43
2017-08-09 06:26:54 info    capwap: receive event capwap_idp_push: eventid = 120: length = 43
2017-08-09 06:26:44 info    ah_dcd: IDP: AP 0019:7733:da99 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 6, RSSI -94, SSID IDM-SSID, ENC wpa, Reason ()
2017-08-09 06:26:42 info    amrp2: set proxy route: b886:87f4:39fb -> 0019:7737:a780 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:26:42 info    kernel: [mesh]: set proxy : b886:87f4:39fb 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:26:38 info    capwap: CAPWAP: receive capwap_idp_push event!, length:73
2017-08-09 06:26:38 info    capwap: receive event capwap_idp_push: eventid = 120: length = 73
2017-08-09 06:26:32 info    ah_dcd: IDP: AP 0019:7733:da97 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 6, RSSI -93, SSID BWInternal, ENC wpa, Reason ()
2017-08-09 06:26:28 warn    ah_dcd: IDP: AP 4018:b14e:b799 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -90, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:26:22 info    capwap: CAPWAP: receive capwap_idp_push event!, length:75
2017-08-09 06:26:22 info    capwap: receive event capwap_idp_push: eventid = 120: length = 75
2017-08-09 06:26:17 warn    ah_dcd: IDP: AP 4018:b152:9e17 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 11, RSSI -94, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:26:12 warn    ah_dcd: IDP: AP 4018:b14e:b797 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -90, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:26:12 info    kernel: [wifi]: wifi1: background scan done, num_bgscans 110, num_req_bgscans 110
2017-08-09 06:26:07 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 109, cont periodic scan 
2017-08-09 06:26:06 debug   kernel: wifi1: Failed to start bg-scan
2017-08-09 06:26:06 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 109, cont periodic scan 
2017-08-09 06:26:05 info    kernel: [wifi]: wifi0: background scan done, num_bgscans 110, num_req_bgscans 110
2017-08-09 06:26:03 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 109, cont periodic scan 
2017-08-09 06:26:02 debug   kernel: wifi0: Failed to start bg-scan
2017-08-09 06:26:02 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 109, cont periodic scan 
2017-08-09 06:25:38 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 124
2017-08-09 06:25:38 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 124
2017-08-09 06:25:38 info    capwap: CAPWAP: receive capwap_idp_push event!, length:585
2017-08-09 06:25:38 info    capwap: receive event capwap_idp_push: eventid = 120: length = 585
2017-08-09 06:25:35 info    ah_dcd: IDP: AP 0019:7737:a517 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 1, RSSI -97, SSID BWInternal, ENC wpa, Reason ()
2017-08-09 06:25:32 warn    ah_dcd: IDP: AP 4018:b152:9e19 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 11, RSSI -95, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b14e:aaab detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 157, RSSI -86, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b14e:aaad detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 157, RSSI -86, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b128:6857 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -86, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b128:6859 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -86, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b14e:aa97 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -83, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b14e:aa99 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -81, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b14e:ae57 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -92, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:31 warn    ah_dcd: IDP: AP 4018:b14e:ae59 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -92, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:30 warn    ah_dcd: IDP: AP 4018:b14e:ae2b detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -77, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:30 warn    ah_dcd: IDP: AP 4018:b14e:ae2d detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -77, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:30 warn    ah_dcd: IDP: AP 4018:b14e:b7ab detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -87, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:30 warn    ah_dcd: IDP: AP 4018:b14e:b7ad detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -86, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:30 info    ah_dcd: IDP: AP 0019:7737:a519 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 1, RSSI -97, SSID IDM-SSID, ENC wpa, Reason ()
2017-08-09 06:25:29 warn    ah_dcd: IDP: AP 4018:b128:6717 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -88, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:29 warn    ah_dcd: IDP: AP 4018:b14e:ae17 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -67, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 06:25:29 warn    ah_dcd: IDP: AP 4018:b14e:ae19 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -67, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:29 warn    ah_dcd: IDP: AP 4018:b128:6719 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -89, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 06:25:29 warn    ah_dcd: IDP: AP 000d:677c:0350 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -95, SSID , ENC wpa, Reason ( oui )
2017-08-09 06:24:37 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:24:37 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 06:23:32 info    amrp2: set proxy route: 9cfc:01bd:3ef4 -> 4018:b128:9280 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:32 info    kernel: [mesh]: set proxy : 9cfc:01bd:3ef4 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:23:31 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:31 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 06:23:28 info    amrp2: set proxy route: 9cfc:01bd:3ef4 -> 0019:7737:a780 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:28 info    kernel: [mesh]: set proxy : 9cfc:01bd:3ef4 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:23:26 info    amrp2: set proxy route: 9cfc:01bd:3ef4 -> 4018:b152:8840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:26 info    kernel: [mesh]: set proxy : 9cfc:01bd:3ef4 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:23:25 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:9280 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:25 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:23:19 info    amrp2: set proxy route: 9cfc:01bd:3ef4 -> 0019:7737:a780 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:19 info    kernel: [mesh]: set proxy : 9cfc:01bd:3ef4 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:23:19 info    amrp2: set proxy route: 9cfc:01bd:3ef4 -> 4018:b152:8840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:19 info    kernel: [mesh]: set proxy : 9cfc:01bd:3ef4 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:23:18 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:9280 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:18 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:23:08 info    amrp2: set proxy route: 9cfc:01bd:3ef4 -> 4018:b152:94c0 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:23:08 info    kernel: [mesh]: set proxy : 9cfc:01bd:3ef4 4018:b152:94c0 n/a flag 0x1402
2017-08-09 06:22:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 06:21:01 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b152:8840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:21:01 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:20:45 info    amrp2: set proxy route: 483b:380d:72dd -> 0019:7737:b700 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:20:45 info    kernel: [mesh]: set proxy : 483b:380d:72dd 0019:7737:b700 n/a flag 0x1402
2017-08-09 06:20:37 info    amrp2: set proxy route: 483b:380d:72dd -> 0019:7737:b700 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:20:37 info    kernel: [mesh]: set proxy : 483b:380d:72dd 0019:7737:b700 n/a flag 0x1402
2017-08-09 06:20:16 info    amrp2: set proxy route: 483b:380d:72dd -> 0019:7733:dac0 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:20:16 info    kernel: [mesh]: set proxy : 483b:380d:72dd 0019:7733:dac0 n/a flag 0x1402
2017-08-09 06:19:19 info    amrp2: set proxy route: 7cc3:a1a8:60a1 -> 4018:b128:9280 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:19:19 info    kernel: [mesh]: set proxy : 7cc3:a1a8:60a1 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:19:02 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:19:02 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:19:00 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b152:94c0 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:19:00 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b152:94c0 n/a flag 0x1402
2017-08-09 06:18:55 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b152:8840 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:18:55 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:18:14 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:18:14 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:18:06 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7737:a780 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:18:06 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:17:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 06:17:37 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:17:37 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:17:25 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b152:8840 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:17:25 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:17:25 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:831
2017-08-09 06:17:25 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 831
2017-08-09 06:17:20 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7733:da40 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:17:20 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7733:da40 n/a flag 0x1402
2017-08-09 06:16:57 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7737:ab40 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:16:57 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7737:ab40 n/a flag 0x1402
2017-08-09 06:16:49 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7733:da40 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:16:49 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7733:da40 n/a flag 0x1402
2017-08-09 06:16:43 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7733:da40 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:16:43 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7733:da40 n/a flag 0x1402
2017-08-09 06:16:35 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7737:a780 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:16:35 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:16:11 info    kernel: [wifi]: wifi1: background scan done, num_bgscans 109, num_req_bgscans 109
2017-08-09 06:16:06 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 108, cont periodic scan 
2017-08-09 06:16:05 debug   kernel: wifi1: Failed to start bg-scan
2017-08-09 06:16:05 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 108, cont periodic scan 
2017-08-09 06:16:04 info    kernel: [wifi]: wifi0: background scan done, num_bgscans 109, num_req_bgscans 109
2017-08-09 06:16:02 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 108, cont periodic scan 
2017-08-09 06:16:01 debug   kernel: wifi0: Failed to start bg-scan
2017-08-09 06:16:01 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 108, cont periodic scan 
2017-08-09 06:15:28 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 06:15:28 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 760
2017-08-09 06:15:03 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:15:03 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:14:53 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:14:53 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:14:33 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b152:94c0 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:14:33 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b152:94c0 n/a flag 0x1402
2017-08-09 06:13:54 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:13:54 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:13:48 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:13:48 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 06:13:46 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:13:46 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:13:21 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7737:a780 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:13:21 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:13:09 info    capwap: CAPWAP: receive capwap_idp_push event!, length:44
2017-08-09 06:13:09 info    capwap: receive event capwap_idp_push: eventid = 120: length = 44
2017-08-09 06:12:59 warn    ah_dcd: IDP: AP 000d:677c:034b detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -95, SSID CableWiFi, ENC open, Reason ( oui )
2017-08-09 06:12:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 06:12:25 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:12:25 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:12:20 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:12:20 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:12:19 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7737:a780 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:12:19 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7737:a780 n/a flag 0x1402
2017-08-09 06:12:18 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b152:8840 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:12:18 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:11:46 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:11:46 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:11:41 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b128:9280 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:11:41 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b128:9280 n/a flag 0x1402
2017-08-09 06:10:23 info    ah_bgd: BGD process respond HM query capwap 14 bytes successfully
2017-08-09 06:10:23 info    capwap: CAPWAP: receive BGD respond to CAPWAP event!, length:32
2017-08-09 06:10:23 info    capwap: receive event BGD respond to CAPWAP: eventid = 350: length = 32
2017-08-09 06:10:23 info    ah_bgd: Bonjour Gateway restore event CAPWAP query BGD(349).
2017-08-09 06:10:22 info    capwap: receive event statistics recv event to auth: eventid = 129: length = 48
2017-08-09 06:10:22 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 06:10:22 info    ah_cli: admin:<report statistic period 10>
2017-08-09 06:10:22 info    capwap: CAPWAP: receive RedSec get proxy info response event!, length:29
2017-08-09 06:10:22 info    capwap: receive event RedSec get proxy info response: eventid = 241: length = 29
2017-08-09 06:10:22 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 16
2017-08-09 06:10:22 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 696
2017-08-09 06:10:22 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:20
2017-08-09 06:10:22 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 20
2017-08-09 06:10:22 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 06:10:22 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 06:10:22 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 731
2017-08-09 06:10:22 info    ah_scd: response to HM successfully, self isn't a elected Radsec proxy server.
2017-08-09 06:10:22 debug   ah_scd: Get proxy server info success, 1 totally.
2017-08-09 06:10:22 info    amrp2: amrp send capwap-statistic-reply 0 entries
2017-08-09 06:10:22 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(121) ifindex 9
2017-08-09 06:10:22 info    amrp2: amrp send capwap-statistic-reply 34 entries
2017-08-09 06:10:22 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(121) ifindex 3
2017-08-09 06:10:22 info    ah_bgd: Bonjour Gateway receive event CAPWAP query BGD(349)
2017-08-09 06:10:21 info    capwap: CAPWAP_HM: Connected with HM 34.230.196.102
2017-08-09 06:10:21 info    ah_webui: WebUI: receive CAPWAP connect event, connected ip:34.230.196.102
2017-08-09 06:10:21 info    ah_scd: receive capwap connect event!
2017-08-09 06:10:21 info    capwap: fill in mfg_ver_info(1) to HM
2017-08-09 06:10:21 info    capwap: fill in hw_rev_info(05) to HM
2017-08-09 06:10:21 info    capwap: CAPWAP: get mgt0 bind hive:-snip-
2017-08-09 06:10:21 info    capwap: CAPWAP: device portal ip is 10.10.0.230
2017-08-09 06:10:21 info    capwap: CAPWAP:get device software version string:(HiveOS 6.5r7 build-160188)
2017-08-09 06:10:21 info    capwap: CAPWAP:Handshake with SSL server successfully!
2017-08-09 06:10:21 info    capwap: CAPWAP:Ready to do DTLS  connection
2017-08-09 06:10:16 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 06:10:16 info    capwap: CAPWAP can not find the proper request 6007, Maybe HM doesn't support it.
2017-08-09 06:10:16 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 06:10:16 info    capwap: CAPWAP:get device software version string:(HiveOS 6.5r7 build-160188)
2017-08-09 06:10:16 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 06:10:06 info    capwap: CAPWAP:Exit current DTLS connect!
2017-08-09 06:10:05 info    capwap: CAPWAP_HM:Ready connecting to HM 34.230.196.102
2017-08-09 06:10:05 info    capwap: CAPWAP_HM:use primary server(UDP), ip=34.230.196.102, port=12222
2017-08-09 06:10:05 info    capwap: CAPWAP_HM:get capwap server ip (34.230.196.102) for name (hm-useast-439.aerohive.com)
2017-08-09 06:10:05 info    capwap: CAPWAP_HM:user has configured primary or backup HM's name
2017-08-09 06:10:05 info    capwap: CAPWAP_HM:get hivemanager name from scd (first:hm-useast-439.aerohive.com, second:).
2017-08-09 06:10:05 info    capwap: CAPWAP_HM:Choose HM IP or name for connecting....
2017-08-09 06:10:05 info    capwap: CAPWAP: capwap predefine server name file isn't exist.
2017-08-09 06:10:03 info    amrp2: set proxy route: b44b:d275:9dec -> 4018:b152:8840 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:10:03 info    kernel: [mesh]: set proxy : b44b:d275:9dec 4018:b152:8840 n/a flag 0x1402
2017-08-09 06:09:58 info    amrp2: set proxy route: b44b:d275:9dec -> 0019:7737:a500 ifp N/A upid 6 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:09:58 info    kernel: [mesh]: set proxy : b44b:d275:9dec 0019:7737:a500 n/a flag 0x1402
2017-08-09 06:09:35 warn    capwap: CAPWAP: capwap client doesn't receive echo packet 2 times, CAPWAP client reconnect
2017-08-09 06:09:35 info    capwap: CAPWAP:capwap client reconnect because the neighbor dead interval elapsed during the previous CAPWAP session (reason id: 1006)
2017-08-09 06:09:20 warn    capwap: CAPWAP: capwap client doesn't receive echo packet 2 times
2017-08-09 06:08:50 warn    capwap: CAPWAP: capwap client doesn't receive echo packet 1 times
2017-08-09 06:07:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 06:06:49 info    ah_bgd: BGD process respond HM query capwap 14 bytes successfully
2017-08-09 06:06:49 info    capwap: CAPWAP: receive BGD respond to CAPWAP event!, length:32
2017-08-09 06:06:49 info    capwap: receive event BGD respond to CAPWAP: eventid = 350: length = 32
2017-08-09 06:06:49 info    ah_bgd: Bonjour Gateway restore event CAPWAP query BGD(349).
2017-08-09 06:06:49 info    ah_cli: admin:<report statistic period 10>
2017-08-09 06:06:49 info    capwap: receive event statistics recv event to auth: eventid = 129: length = 48
2017-08-09 06:06:49 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 06:06:49 info    capwap: CAPWAP: receive RedSec get proxy info response event!, length:29
2017-08-09 06:06:49 info    capwap: receive event RedSec get proxy info response: eventid = 241: length = 29
2017-08-09 06:06:49 info    ah_scd: response to HM successfully, self isn't a elected Radsec proxy server.
2017-08-09 06:06:49 debug   ah_scd: Get proxy server info success, 1 totally.
2017-08-09 06:06:49 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 16
2017-08-09 06:06:49 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 696
2017-08-09 06:06:49 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:20
2017-08-09 06:06:49 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 20
2017-08-09 06:06:49 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 06:06:49 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 06:06:49 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 731
2017-08-09 06:06:49 info    amrp2: amrp send capwap-statistic-reply 0 entries
2017-08-09 06:06:49 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(119) ifindex 9
2017-08-09 06:06:49 info    amrp2: amrp send capwap-statistic-reply 34 entries
2017-08-09 06:06:49 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(119) ifindex 3
2017-08-09 06:06:49 info    ah_bgd: Bonjour Gateway receive event CAPWAP query BGD(349)
2017-08-09 06:06:48 info    capwap: CAPWAP_HM: Connected with HM 34.230.196.102
2017-08-09 06:06:48 info    ah_webui: WebUI: receive CAPWAP connect event, connected ip:34.230.196.102
2017-08-09 06:06:48 info    ah_scd: receive capwap connect event!
2017-08-09 06:06:48 info    capwap: fill in mfg_ver_info(1) to HM
2017-08-09 06:06:48 info    capwap: fill in hw_rev_info(05) to HM
2017-08-09 06:06:48 info    capwap: CAPWAP: get mgt0 bind hive:-snip-
2017-08-09 06:06:48 info    capwap: CAPWAP: device portal ip is 10.10.0.230
2017-08-09 06:06:48 info    capwap: CAPWAP:get device software version string:(HiveOS 6.5r7 build-160188)
2017-08-09 06:06:48 info    capwap: CAPWAP:Handshake with SSL server successfully!
2017-08-09 06:06:48 info    capwap: CAPWAP:Ready to do DTLS  connection
2017-08-09 06:06:43 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 06:06:43 info    capwap: CAPWAP can not find the proper request 6007, Maybe HM doesn't support it.
2017-08-09 06:06:43 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 06:06:43 info    capwap: CAPWAP:get device software version string:(HiveOS 6.5r7 build-160188)
2017-08-09 06:06:43 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 06:06:33 info    capwap: CAPWAP:Exit current DTLS connect!
2017-08-09 06:06:32 info    capwap: CAPWAP_HM:Ready connecting to HM 34.230.196.102
2017-08-09 06:06:32 info    capwap: CAPWAP_HM:use primary server(UDP), ip=34.230.196.102, port=12222
2017-08-09 06:06:32 info    capwap: CAPWAP_HM:get capwap server ip (34.230.196.102) for name (hm-useast-439.aerohive.com)
2017-08-09 06:06:32 info    capwap: CAPWAP_HM:user has configured primary or backup HM's name
2017-08-09 06:06:32 info    capwap: CAPWAP_HM:get hivemanager name from scd (first:hm-useast-439.aerohive.com, second:).
2017-08-09 06:06:32 info    capwap: CAPWAP_HM:Choose HM IP or name for connecting....
2017-08-09 06:06:32 info    capwap: CAPWAP: capwap predefine server name file isn't exist.
2017-08-09 06:06:10 info    kernel: [wifi]: wifi1: background scan done, num_bgscans 108, num_req_bgscans 108
2017-08-09 06:06:07 warn    capwap: CAPWAP: capwap client doesn't receive echo packet 2 times, CAPWAP client reconnect
2017-08-09 06:06:07 info    capwap: CAPWAP:capwap client reconnect because the neighbor dead interval elapsed during the previous CAPWAP session (reason id: 1006)
2017-08-09 06:06:05 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 107, cont periodic scan 
2017-08-09 06:06:04 debug   kernel: wifi1: Failed to start bg-scan
2017-08-09 06:06:04 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 107, cont periodic scan 
2017-08-09 06:06:03 info    kernel: [wifi]: wifi0: background scan done, num_bgscans 108, num_req_bgscans 108
2017-08-09 06:06:01 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 107, cont periodic scan 
2017-08-09 06:06:00 debug   kernel: wifi0: Failed to start bg-scan
2017-08-09 06:06:00 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 107, cont periodic scan 
2017-08-09 06:05:52 warn    capwap: CAPWAP: capwap client doesn't receive echo packet 2 times
2017-08-09 06:05:22 warn    capwap: CAPWAP: capwap client doesn't receive echo packet 1 times
2017-08-09 06:05:18 warn    l7d: Next collecting will occur in 43 sec instead of 60 sec
2017-08-09 06:05:18 warn    l7d: Time was adjusted across 1 sec
2017-08-09 06:04:06 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 06:04:06 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 06:02:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 06:01:51 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 06:01:51 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 731
2017-08-09 06:01:33 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 124
2017-08-09 06:00:04 info    l7d: Failover for uploading 00197737A6800016.lpr succeed
2017-08-09 06:00:04 notice  curl -F "filename=@/tmp/l7_report/00197737A6800016.lpr" -m 900  -4 -v -k -f --digest -u scpuser:******************************** "https://34.230.196.102/hm/upload?FileType=6"; >/home/admin/curl_log 2>&1 "scpuser" successfully http to server2017-08-09 06:00:03 info    capwap: in ah_http_capture_callback
2017-08-09 06:00:03 info    ah_cli: admin:<save app-report local 00197737A6800016.lpr  "https://34.230.196.102/hm/upload?FileType=6"; admin scpuser password *** digest>
2017-08-09 06:00:02 info    capwap: CAPWAP: receive application report notification capwap event!, length:42
2017-08-09 06:00:02 info    capwap: receive event application report notification capwap: eventid = 207: length = 42
2017-08-09 06:00:02 info    l7d: Totally 0KB report files occupied
2017-08-09 06:00:02 info    l7d: All-app stats aggregation occurs, number of aggs 8
2017-08-09 06:00:02 info    l7d: A new report file created: "00197737A6800016.lpr"
2017-08-09 06:00:02 info    l7d: A new report start from 00:01 to 00:01, span 60 min
2017-08-09 06:00:02 info    l7d: L7D set timer for low resolution to 0 min, 3600 sec remain
2017-08-09 05:59:49 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:6700 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:59:49 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:6700 n/a flag 0x1402
2017-08-09 05:59:43 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:6700 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:59:43 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:6700 n/a flag 0x1402
2017-08-09 05:59:43 info    capwap: CAPWAP: receive capwap_idp_push event!, length:73
2017-08-09 05:59:43 info    capwap: receive event capwap_idp_push: eventid = 120: length = 73
2017-08-09 05:59:33 warn    ah_dcd: IDP: AP 4018:b14e:ae57 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -92, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:59:33 warn    ah_dcd: IDP: AP 4018:b14e:ae59 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -92, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:59:30 info    capwap: CAPWAP: receive capwap_idp_push event!, length:43
2017-08-09 05:59:30 info    capwap: receive event capwap_idp_push: eventid = 120: length = 43
2017-08-09 05:59:21 info    ah_dcd: IDP: AP 0019:7737:a519 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 1, RSSI -97, SSID IDM-SSID, ENC wpa, Reason ()
2017-08-09 05:59:10 info    capwap: CAPWAP: receive capwap_idp_push event!, length:123
2017-08-09 05:59:10 info    capwap: receive event capwap_idp_push: eventid = 120: length = 123
2017-08-09 05:59:06 warn    ah_dcd: IDP: AP 4018:b152:9e17 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 11, RSSI -94, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:59:01 info    ah_dcd: IDP: AP 0019:7733:da97 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 6, RSSI -94, SSID BWInternal, ENC wpa, Reason ()
2017-08-09 05:59:01 info    ah_dcd: IDP: AP 0019:7733:da99 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 6, RSSI -93, SSID IDM-SSID, ENC wpa, Reason ()
2017-08-09 05:59:01 warn    ah_dcd: IDP: AP 000d:677c:0350 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -95, SSID , ENC wpa, Reason ( oui )
2017-08-09 05:58:59 info    capwap: CAPWAP: receive capwap_idp_push event!, length:161
2017-08-09 05:58:59 info    capwap: receive event capwap_idp_push: eventid = 120: length = 161
2017-08-09 05:58:58 warn    ah_dcd: IDP: AP 4018:b152:9e19 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 11, RSSI -94, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:51 info    ah_dcd: IDP: AP 0019:7737:a517 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 1, RSSI -96, SSID BWInternal, ENC wpa, Reason ()
2017-08-09 05:58:49 warn    ah_dcd: IDP: AP 4018:b128:6857 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -87, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:49 warn    ah_dcd: IDP: AP 4018:b14e:b797 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -90, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:49 warn    ah_dcd: IDP: AP 4018:b14e:b799 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -90, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:49 info    capwap: CAPWAP: receive capwap_idp_push event!, length:391
2017-08-09 05:58:49 info    capwap: receive event capwap_idp_push: eventid = 120: length = 391
2017-08-09 05:58:45 warn    ah_dcd: IDP: AP 4018:b128:6859 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -87, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:41 warn    ah_dcd: IDP: AP 4018:b14e:aa97 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -81, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:41 warn    ah_dcd: IDP: AP 4018:b14e:aa99 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -81, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:41 warn    ah_dcd: IDP: AP 4018:b14e:aaab detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 157, RSSI -86, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:41 warn    ah_dcd: IDP: AP 4018:b14e:aaad detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 157, RSSI -86, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:40 warn    ah_dcd: IDP: AP 4018:b14e:b7ab detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -87, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:40 warn    ah_dcd: IDP: AP 4018:b14e:b7ad detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -87, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:40 warn    ah_dcd: IDP: AP 4018:b14e:ae2b detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -77, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:40 warn    ah_dcd: IDP: AP 4018:b14e:ae2d detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -77, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:40 warn    ah_dcd: IDP: AP 4018:b128:6717 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -84, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:40 warn    ah_dcd: IDP: AP 4018:b128:6719 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -84, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:39 warn    ah_dcd: IDP: AP 4018:b14e:ae17 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -68, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:58:39 warn    ah_dcd: IDP: AP 4018:b14e:ae19 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -67, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:58:30 info    amrp2: set proxy route: 483b:380d:72dd -> 0019:7733:dac0 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:58:30 info    kernel: [mesh]: set proxy : 483b:380d:72dd 0019:7733:dac0 n/a flag 0x1402
2017-08-09 05:57:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 05:56:09 info    kernel: [wifi]: wifi1: background scan done, num_bgscans 107, num_req_bgscans 107
2017-08-09 05:56:04 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 106, cont periodic scan 
2017-08-09 05:56:03 debug   kernel: wifi1: Failed to start bg-scan
2017-08-09 05:56:03 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 106, cont periodic scan 
2017-08-09 05:56:02 info    kernel: [wifi]: wifi0: background scan done, num_bgscans 107, num_req_bgscans 107
2017-08-09 05:56:00 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 106, cont periodic scan 
2017-08-09 05:55:59 debug   kernel: wifi0: Failed to start bg-scan
2017-08-09 05:55:59 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 106, cont periodic scan 
2017-08-09 05:55:52 info    capwap: CAPWAP: receive RedSec get proxy info response event!, length:29
2017-08-09 05:55:52 info    capwap: receive event RedSec get proxy info response: eventid = 241: length = 29
2017-08-09 05:55:52 info    ah_scd: response to HM successfully, self isn't a elected Radsec proxy server.
2017-08-09 05:55:52 debug   ah_scd: Get proxy server info success, 1 totally.
2017-08-09 05:54:23 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:54:23 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 05:52:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 05:49:43 warn    capwap: A rogue client 483b:380d:72dd connected to rogue AP 4018:b128:6717 is detected.
2017-08-09 05:49:43 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 144
2017-08-09 05:49:28 info    amrp2: set proxy route: 483b:380d:72dd -> 4018:b128:6700 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:49:28 info    kernel: [mesh]: set proxy : 483b:380d:72dd 4018:b128:6700 n/a flag 0x1402
2017-08-09 05:48:39 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 05:48:39 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 731
2017-08-09 05:47:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 05:47:55 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:78
2017-08-09 05:47:55 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 78
2017-08-09 05:46:55 info    capwap: CAPWAP: receive capwap query interface map info response event!, length:239
2017-08-09 05:46:55 info    capwap: receive event capwap query interface map info response: eventid = 177: length = 239
2017-08-09 05:46:55 info    capwap: CAPWAP: receive capwap query interface map info response event!, length:1308
2017-08-09 05:46:55 info    capwap: receive event capwap query interface map info response: eventid = 177: length = 1308
2017-08-09 05:46:55 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 05:46:55 info    capwap: receive event statistics recv event to auth: eventid = 129: length = 48
2017-08-09 05:46:55 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 16
2017-08-09 05:46:55 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 696
2017-08-09 05:46:55 info    amrp2: amrp send capwap-statistic-reply 0 entries
2017-08-09 05:46:55 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(118) ifindex 9
2017-08-09 05:46:55 info    amrp2: amrp send capwap-statistic-reply 34 entries
2017-08-09 05:46:55 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(118) ifindex 3
2017-08-09 05:46:42 info    capwap: CAPWAP: receive capwap_idp_push event!, length:43
2017-08-09 05:46:42 info    capwap: receive event capwap_idp_push: eventid = 120: length = 43
2017-08-09 05:46:32 info    ah_dcd: IDP: AP 0019:7733:da99 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 6, RSSI -93, SSID IDM-SSID, ENC wpa, Reason ()
2017-08-09 05:46:19 info    capwap: CAPWAP: receive capwap_idp_push event!, length:73
2017-08-09 05:46:19 info    capwap: receive event capwap_idp_push: eventid = 120: length = 73
2017-08-09 05:46:09 warn    ah_dcd: IDP: AP 4018:b152:9e17 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 11, RSSI -94, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:46:09 warn    ah_dcd: IDP: AP 4018:b152:9e19 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 11, RSSI -94, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:46:08 info    kernel: [wifi]: wifi1: background scan done, num_bgscans 106, num_req_bgscans 106
2017-08-09 05:46:03 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 105, cont periodic scan 
2017-08-09 05:46:02 debug   kernel: wifi1: Failed to start bg-scan
2017-08-09 05:46:02 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 105, cont periodic scan 
2017-08-09 05:46:01 info    kernel: [wifi]: wifi0: background scan done, num_bgscans 106, num_req_bgscans 106
2017-08-09 05:45:59 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 105, cont periodic scan 
2017-08-09 05:45:58 debug   kernel: wifi0: Failed to start bg-scan
2017-08-09 05:45:58 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 105, cont periodic scan 
2017-08-09 05:45:37 info    capwap: CAPWAP: receive capwap_idp_push event!, length:45
2017-08-09 05:45:37 info    capwap: receive event capwap_idp_push: eventid = 120: length = 45
2017-08-09 05:45:27 info    ah_dcd: IDP: AP 0019:7733:da97 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 6, RSSI -93, SSID BWInternal, ENC wpa, Reason ()
2017-08-09 05:45:26 info    capwap: CAPWAP: receive capwap_idp_push event!, length:131
2017-08-09 05:45:26 info    capwap: receive event capwap_idp_push: eventid = 120: length = 131
2017-08-09 05:45:25 info    ah_dcd: IDP: AP 0019:7737:a519 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 1, RSSI -97, SSID IDM-SSID, ENC wpa, Reason ()
2017-08-09 05:45:19 warn    ah_dcd: IDP: AP 4018:b14e:ae57 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -92, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:19 warn    ah_dcd: IDP: AP 4018:b14e:ae59 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -92, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:17 info    ah_dcd: IDP: AP 0019:7737:a517 detected, Detector AP(HS-408) 10.10.0.230, Type valid, CH 1, RSSI -97, SSID BWInternal, ENC wpa, Reason ()
2017-08-09 05:45:16 info    capwap: CAPWAP: receive capwap_idp_push event!, length:499
2017-08-09 05:45:16 info    capwap: receive event capwap_idp_push: eventid = 120: length = 499
2017-08-09 05:45:15 warn    ah_dcd: IDP: AP 4018:b14e:b797 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -91, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:11 warn    ah_dcd: IDP: AP 4018:b128:6859 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -87, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:11 warn    ah_dcd: IDP: AP 4018:b14e:b799 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -91, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:11 warn    ah_dcd: IDP: AP 4018:b14e:b7ab detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -87, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:11 warn    ah_dcd: IDP: AP 4018:b14e:b7ad detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -87, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:09 warn    ah_dcd: IDP: AP 4018:b14e:aaab detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 157, RSSI -86, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:09 warn    ah_dcd: IDP: AP 4018:b14e:aaad detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 157, RSSI -86, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:08 warn    ah_dcd: IDP: AP 4018:b14e:ae2b detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -77, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:08 warn    ah_dcd: IDP: AP 4018:b14e:ae2d detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 48, RSSI -78, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:08 warn    ah_dcd: IDP: AP 000d:677c:0350 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -95, SSID , ENC wpa, Reason ( oui )
2017-08-09 05:45:08 warn    ah_dcd: IDP: AP 4018:b14e:ae17 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -68, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:07 warn    ah_dcd: IDP: AP 4018:b14e:ae19 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -67, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:07 warn    ah_dcd: IDP: AP 4018:b14e:aa97 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -82, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:07 warn    ah_dcd: IDP: AP 4018:b14e:aa99 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -81, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:45:07 warn    ah_dcd: IDP: AP 4018:b128:6857 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 6, RSSI -86, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:07 warn    ah_dcd: IDP: AP 4018:b128:6717 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -87, SSID BWInternal, ENC wpa, Reason ( oui )
2017-08-09 05:45:07 warn    ah_dcd: IDP: AP 4018:b128:6719 detected, Detector AP(HS-408) 10.10.0.230, Type rogue, CH 1, RSSI -87, SSID IDM-SSID, ENC wpa, Reason ( oui )
2017-08-09 05:44:40 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:44:40 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 05:42:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 05:39:22 info    ah_bgd: BGD process respond HM query capwap 14 bytes successfully
2017-08-09 05:39:22 info    capwap: CAPWAP: receive BGD respond to CAPWAP event!, length:32
2017-08-09 05:39:22 info    capwap: receive event BGD respond to CAPWAP: eventid = 350: length = 32
2017-08-09 05:39:22 info    ah_bgd: Bonjour Gateway restore event CAPWAP query BGD(349).
2017-08-09 05:39:21 info    ah_bgd: Bonjour Gateway receive event CAPWAP query BGD(349)
2017-08-09 05:39:03 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 124
2017-08-09 05:38:10 info    amrp2: set proxy route: 8429:99ad:e69c -> 0019:7733:d840 ifp N/A upid 1 flag 0x1402 monitor(0/0) pkt/sec ok
2017-08-09 05:38:10 info    kernel: [mesh]: set proxy : 8429:99ad:e69c 0019:7733:d840 n/a flag 0x1402
2017-08-09 05:38:04 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 124
2017-08-09 05:38:04 info    capwap: CAPWAP receive kevent KEVT_IDP_STA, eventid = 13, size = 124
2017-08-09 05:37:57 info    ah_dcd: get track-ip trigger access console request: cancel.
2017-08-09 05:36:07 info    kernel: [wifi]: wifi1: background scan done, num_bgscans 105, num_req_bgscans 105
2017-08-09 05:36:02 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 104, cont periodic scan 
2017-08-09 05:36:01 debug   kernel: wifi1: Failed to start bg-scan
2017-08-09 05:36:01 info    kernel: [wifi]: wifi1: trigger background scan: chans scanned 104, cont periodic scan 
2017-08-09 05:36:00 info    kernel: [wifi]: wifi0: background scan done, num_bgscans 105, num_req_bgscans 105
2017-08-09 05:35:58 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 104, cont periodic scan 
2017-08-09 05:35:57 debug   kernel: wifi0: Failed to start bg-scan
2017-08-09 05:35:57 info    kernel: [wifi]: wifi0: trigger background scan: chans scanned 104, cont periodic scan 
2017-08-09 05:35:06 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 05:35:06 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 731
2017-08-09 05:35:00 info    ah_bgd: BGD process respond HM query capwap 14 bytes successfully
2017-08-09 05:35:00 info    capwap: CAPWAP: receive BGD respond to CAPWAP event!, length:32
2017-08-09 05:35:00 info    capwap: receive event BGD respond to CAPWAP: eventid = 350: length = 32
2017-08-09 05:35:00 info    ah_bgd: Bonjour Gateway restore event CAPWAP query BGD(349).
2017-08-09 05:35:00 info    capwap: receive event statistics recv event to auth: eventid = 129: length = 48
2017-08-09 05:35:00 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 05:35:00 info    ah_cli: admin:<report statistic period 10>
2017-08-09 05:35:00 info    capwap: CAPWAP: receive RedSec get proxy info response event!, length:29
2017-08-09 05:35:00 info    capwap: receive event RedSec get proxy info response: eventid = 241: length = 29
2017-08-09 05:35:00 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 16
2017-08-09 05:35:00 info    capwap: receive event statistics recv event to amrp: eventid = 127: length = 696
2017-08-09 05:35:00 info    capwap: CAPWAP: receive DCD send response to CAPWAP event!, length:20
2017-08-09 05:35:00 info    capwap: receive event DCD send response to CAPWAP: eventid = 174: length = 20
2017-08-09 05:35:00 info    capwap: receive event statistics recv event to dcd: eventid = 125: length = 48
2017-08-09 05:35:00 info    capwap: CAPWAP receive IDP push all event!
2017-08-09 05:35:00 info    capwap: receive event capwap_idp_pull_all: eventid = 122: length = 731
2017-08-09 05:35:00 info    ah_scd: response to HM successfully, self isn't a elected Radsec proxy server.
2017-08-09 05:35:00 debug   ah_scd: Get proxy server info success, 1 totally.
2017-08-09 05:35:00 info    amrp2: amrp send capwap-statistic-reply 0 entries
2017-08-09 05:35:00 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(116) ifindex 9
2017-08-09 05:35:00 info    amrp2: amrp send capwap-statistic-reply 34 entries
2017-08-09 05:35:00 info    amrp2: amrp receive capwap-statistic-request Mod_id (4) No.(116) ifindex 3
2017-08-09 05:35:00 info    ah_bgd: Bonjour Gateway receive event CAPWAP query BGD(349)
2017-08-09 05:34:59 info    capwap: CAPWAP_HM: Connected with HM 34.230.196.102
2017-08-09 05:34:59 info    ah_webui: WebUI: receive CAPWAP connect event, connected ip:34.230.196.102
2017-08-09 05:34:59 info    ah_scd: receive capwap connect event!
2017-08-09 05:34:59 info    capwap: fill in mfg_ver_info(1) to HM
2017-08-09 05:34:59 info    capwap: fill in hw_rev_info(05) to HM
2017-08-09 05:34:59 info    capwap: CAPWAP: get mgt0 bind hive:-snip_
2017-08-09 05:34:59 info    capwap: CAPWAP: device portal ip is 10.10.0.230
2017-08-09 05:34:59 info    capwap: CAPWAP:get device software version string:(HiveOS 6.5r7 build-160188)
2017-08-09 05:34:59 info    capwap: CAPWAP:Handshake with SSL server successfully!
2017-08-09 05:34:59 info    capwap: CAPWAP:Ready to do DTLS  connection
2017-08-09 05:34:54 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 05:34:54 info    capwap: CAPWAP can not find the proper request 6007, Maybe HM doesn't support it.
2017-08-09 05:34:54 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 05:34:54 info    capwap: CAPWAP:get device software version string:(HiveOS 6.5r7 build-160188)
2017-08-09 05:34:54 info    capwap: receive event capwap disconnect: eventid = 244: length = 0
2017-08-09 05:34:45 info    capwap: CAPWAP:Exit current DTLS connect!
Photo of Joshua Thomas

Joshua Thomas

  • 5 Posts
  • 0 Reply Likes

Posted 8 months ago

  • 1
Photo of Nick Lowe

Nick Lowe, Official Rep

  • 2491 Posts
  • 451 Reply Likes
Hi Joshua,

It sounds like a packet loss or high latency issue:

warn    capwap: CAPWAP: capwap client doesn't receive echo packet 2 times

Can you check for this?

Thanks,

Nick
(Edited)
Photo of Joshua Thomas

Joshua Thomas

  • 5 Posts
  • 0 Reply Likes
Hi Nick, thank you for the reply. I'm a total newbie at this stuff, how would I go about collecting that debug info?
Photo of Nick Lowe

Nick Lowe, Official Rep

  • 2491 Posts
  • 451 Reply Likes
Hi Joshua,

Typically we would look at the output of the CAPWAP debugging command that you should now have.

Thanks,

Nick
(Edited)
Photo of Joshua Thomas

Joshua Thomas

  • 5 Posts
  • 0 Reply Likes
Thanks! Sifting through it all now. Lots to look at but thankfully I managed to get it during one of the times it lost connection. 
Photo of Joshua Thomas

Joshua Thomas

  • 5 Posts
  • 0 Reply Likes
Not sure what I'm looking for. :/ Would it be okay to post what I'm looking at here? If you've got the time.
Photo of Nick Lowe

Nick Lowe, Official Rep

  • 2491 Posts
  • 451 Reply Likes
Hi Joshua,

The logs are likely to be showing the symptom of packet loss or latency, but the root cause of that will likely lie in the path between the AP and HiveManager.

Something that may be easier for you to work with...

Run a capwap ping from the AP to HiveManager and observe the result. You will likely see latency or drops and will subsequently need to investigate the path

capwap ping <string> [ count <number> ] [ size <number> ] [ timeout <number> ]

I would try with a ping with a high count, omitting the size and timeout to use the defaults for those.

Cheers,

Nick
Photo of Joshua Thomas

Joshua Thomas

  • 5 Posts
  • 0 Reply Likes
Any way I can have this thread removed? I don't see an option to edit the original post to remove the log. Found out the issue was with load balancing on our Sonicwall, had to set up a routing rule for the aerohive traffic to hivemanager.
Photo of Bill Hartigan

Bill Hartigan

  • 1 Post
  • 0 Reply Likes
I am having a similar issue and also use Sonicwall, did you simply set a static route for HMOL traffic tied to one wan interface?