Modulacion PSK y QAM URGE

Hola, buenas tardes, estoy realizando la modulacion de BPSK, QPSK,8 PSK y 8QAM. mi duda es la siguiente 
Estoy metiendo una portadora senoida o cosenoidal segun sea elc aso para modular, con una amplitud de 1V y frecuencia de 10 Hz.... me dijeorn que debo de cambiar esa frecuencia debido a mis tencicas de modulacion (PSK Y QAM), mas no se que valor sea el adecuado.
Alguien podría decirme que valor de frecuencia es el mas adecuado y porque??? o donde encontrar esta información, gracias.

buenas disculpe la molestia quisiera saber si podria ayudarme el esquema que tengo de modulacion 8qam no me funciona al leer el blog vi que estabas realizando dicho esquema de modulacion quisiera saber s me podrias enviar tu archivo de esa modulacion deberas ya estoy desesperada ... por favor un  proyecto importante depende de eso ... este es mi correo [email protected]
espero tu respuesta muchas gracias...

Similar Messages

  • Newbie RF satellite cables measurement

    Hi.
    I want to know what tools I need to test rf cables for satellite transmission application. We are experienced manufacturers of data cables and now our clients are requesting us for coaxials cables for satellite transmision, from IF band (70 Mhz) to Ku band (12 to 14 Ghz). I need want to know what I need to ensure that our cables are well made and that they have the needed quality. I'm newbie in RF cables and I don't know what parameters I need to test to ensure that the cable will work and what equipment I need for do that.
    Thanks in advance!
    P.D. Sorry my poor english

    The amount and types of testing performed on your cables can vary widely. A vector network analyzer could be used to acquire full magnitude and phase response of the cable in the specified frequency bands, with limits for magnitude and phase variation depending on the tolerances of the application.
    An RF signal generator and spectrum analyzer could be used to acquire just a magnitude response if phase variation is either not important or minimal in the cables themselves. Transmitting data that has been modulated with a phase modulation scheme like PSK or QAM (which modulates phase and magnitude) could make the cables' phase responses more important, thus implying a greater need for testing its phase response.
    In summary, the amount and type of testing done on the cables is a technical and business decision. The business decision lies in minimizing test time and capital expenditure on test equipment without sacrificing technical requirements.
    Hope this helps.
    Andy Hinde
    National Instruments

  • Point to Point radio link

    I 'm using Labview to simulate a Point to Point radio link I would like to
    save myself the effort of creating PSK and QAM modulators since i'm already
    very busy in modeling the fading channel
    Has anyone already done this and, if so, would they be willing to share
    their files?
    Thanks
    Horackz

    POOR (121% retries)  Time   Strength(dBm)   SNR      SNR          Retries
                         msec      In     Out    In      Out         In   Out
          Sent : 100, Avg  30    - 78    - 88    11        4   Tot: 103   140
    Lost to Tgt:   0, Max 993    - 78    - 85    12      138   Max:  20    27
    Lost to Src:   0, Min   2    - 80    -254    10        3

  • Os sons do meu iPad 3 sumiram.O som quando ligo sumiu, o som de recebimento de emails sumiu, o som de que enviei email tambem sumiu.O som do teclado também sumiu. O botão de volume está no máximo.Podem me ajudar?Tenho urgência na resposta.

    Preciso que me ajudem com urgência, por favor.
    Os sons do meu iPad 3, iOS 5.1.1, sumiram de repente.
    O som quando ligo sumiu, o som do teclado sumiu, o som de emails recebidos sumiu, o som de que enviei email sumiu
    Quando recebo algum email com vídeo, pelo menos esse dá pra ouvir.
    O volume está no máximo, mas mesmo assim não tem os sons que tinha antes.Já tentei de tudo mas nao acontece nada.
    Aguardo  resposta o mais rápido possível.

  • Lost PBS and ch. 5 HD channels in clear QAM

    We live in Newton MA and subscribe to the FiOS TV.  We have a LCD TV mounted on kitchen wall that we could not find room for a HD STB and have been satisfied to have the PBS HD channel through clear QAM for the kids in the morning.  This seems to have disappeared along with channel 5 HD channel in the recent past and I have done repeated scannings to no avail.  Is the local HD channel signal going to disappear from clear QAM and only SD plus music will remain?
    Alternative a very small HD receiver could be the solution but Verizon does not have such a STB for rent.
    Any one with similar problem?

    I too suddenly lost most of my clear hd channels except for one. SD channels are there, but I didnt count them.
    But when I tried with my tv card, it was able to pick them up(the missing hd channels).
    Do you have another tv to try?  Maybe the qam tuner got damaged. Whats the brand of your tv?

  • I have a 3rd generation iPod Touch and just did the update to IOS 5. Now I can't connect to my Netgear wifi router. My iPhone connects fine along with all of my other laptops etc. I have the router set with WPA-PSK [TKIP] security and an access list.

    I have a 3rd generation iPod Touch and just did the update to IOS 5. Now I can't connect to my Netgear wifi router. My iPhone connects fine along with all of my other laptops etc. I have the router set with WPA-PSK [TKIP] security and an access list. I've confirmed the mac address is included on that list and that the password is correct. Under choses netwrok I select the network and it just goes into a spin. I have tried removing the password and the access list settings and it still will not complete the connection to the router thus no internet access. The routers firmware is also up to date. This thing worked fine before this update and I've already tried to restore from backup. Any ideas or is the wifi nic bad in this thing with the new apple firmware update? Any fix?

    Thanks Bob, I don't know why but it all of a sudden worked a few days later. It's a mystery but at least problem solved.

  • DMVPN phase I fails when migrating from PSK to RSIG

    I am currently is the process of migrating my DMVPN network from pre-share key to certificates. Most of the spokes have come up and are working without any issues but there are several that are not making it past phase I. I have included the isakmp debugging from the hub and one of the spokes that are failing. I see that the hub is going QM_IDLE after receiving the certificate from the spoke but it does not look like the spoke ever receives the cert from the hub. I suspect an issue with the ISP but it's not as simple as filtering 500 as all the messages except the cert seem to make it. If I move the spoke back to PSK it works fine. Has anyone seen this issue before and what was the resolution?        
    DMVPN Hub
    Oct  7 19:38:36.213: ISAKMP: local port 500, remote port 500
    Oct  7 19:38:36.213: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 7F1AA7CC5920
    Oct  7 19:38:36.213: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Oct  7 19:38:36.213: ISAKMP:(0):Old State = IKE_READY  New State = IKE_R_MM1
    Oct  7 19:38:36.214: ISAKMP:(0): processing SA payload. message ID = 0
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
    Oct  7 19:38:36.214: ISAKMP (0): vendor ID is NAT-T RFC 3947
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
    Oct  7 19:38:36.214: ISAKMP (0): vendor ID is NAT-T v7
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID is NAT-T v3
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID is NAT-T v2
    Oct  7 19:38:36.214: ISAKMP:(0):found peer pre-shared key matching 2.8.51.58
    Oct  7 19:38:36.214: ISAKMP:(0): local preshared key found
    Oct  7 19:38:36.214: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (R) MM_NO_STATE (peer 2.8.51.58)
    Oct  7 19:38:36.214: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (R) MM_NO_STATE (peer 2.8.51.58)
    Oct  7 19:38:36.214: ISAKMP:(0):Checking ISAKMP transform 1 against priority 5 policy
    Oct  7 19:38:36.214: ISAKMP:      encryption 3DES-CBC
    Oct  7 19:38:36.214: ISAKMP:      hash MD5
    Oct  7 19:38:36.214: ISAKMP:      default group 1
    Oct  7 19:38:36.214: ISAKMP:      auth RSA sig
    Oct  7 19:38:36.214: ISAKMP:      life type in seconds
    Oct  7 19:38:36.214: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
    Oct  7 19:38:36.214: ISAKMP:(0):atts are acceptable. Next payload is 3
    Oct  7 19:38:36.214: ISAKMP:(0):Acceptable atts:actual life: 0
    Oct  7 19:38:36.214: ISAKMP:(0):Acceptable atts:life: 0
    Oct  7 19:38:36.214: ISAKMP:(0):Fill atts in sa vpi_length:4
    Oct  7 19:38:36.214: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
    Oct  7 19:38:36.214: ISAKMP:(0): IKE->PKI Start PKI Session state (R) MM_NO_STATE (peer 2.8.51.58)
    Oct  7 19:38:36.214: ISAKMP:(0): PKI->IKE Started PKI Session state (R) MM_NO_STATE (peer 2.8.51.58)
    Oct  7 19:38:36.214: ISAKMP:(0):Returning Actual lifetime: 86400
    Oct  7 19:38:36.214: ISAKMP:(0)::Started lifetime timer: 86400.
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
    Oct  7 19:38:36.214: ISAKMP (0): vendor ID is NAT-T RFC 3947
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 245 mismatch
    Oct  7 19:38:36.214: ISAKMP (0): vendor ID is NAT-T v7
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 157 mismatch
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID is NAT-T v3
    Oct  7 19:38:36.214: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID seems Unity/DPD but major 123 mismatch
    Oct  7 19:38:36.214: ISAKMP:(0): vendor ID is NAT-T v2
    Oct  7 19:38:36.214: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Oct  7 19:38:36.214: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM1
    Oct  7 19:38:36.214: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
    Oct  7 19:38:36.214: ISAKMP:(0): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) MM_SA_SETUP
    Oct  7 19:38:36.214: ISAKMP:(0):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.214: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Oct  7 19:38:36.214: ISAKMP:(0):Old State = IKE_R_MM1  New State = IKE_R_MM2
    Oct  7 19:38:36.240: ISAKMP (0): received packet from 2.8.51.58 dport 500 sport 500 Global (R) MM_SA_SETUP
    Oct  7 19:38:36.240: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Oct  7 19:38:36.240: ISAKMP:(0):Old State = IKE_R_MM2  New State = IKE_R_MM3
    Oct  7 19:38:36.240: ISAKMP:(0): processing KE payload. message ID = 0
    Oct  7 19:38:36.242: ISAKMP:(0): processing NONCE payload. message ID = 0
    Oct  7 19:38:36.242: ISAKMP:(38618): processing CERT_REQ payload. message ID = 0
    Oct  7 19:38:36.242: ISAKMP:(38618): peer wants a CT_X509_SIGNATURE cert
    Oct  7 19:38:36.242: ISAKMP:(38618): peer wants cert issued by cn=Tetra Pak Root CA - G1
    Oct  7 19:38:36.242: ISAKMP:(38618): processing vendor id payload
    Oct  7 19:38:36.242: ISAKMP:(38618): vendor ID is DPD
    Oct  7 19:38:36.242: ISAKMP:(38618): processing vendor id payload
    Oct  7 19:38:36.242: ISAKMP:(38618): speaking to another IOS box!
    Oct  7 19:38:36.242: ISAKMP:(38618): processing vendor id payload
    Oct  7 19:38:36.242: ISAKMP:(38618): vendor ID seems Unity/DPD but major 209 mismatch
    Oct  7 19:38:36.242: ISAKMP:(38618): vendor ID is XAUTH
    Oct  7 19:38:36.242: ISAKMP:received payload type 20
    Oct  7 19:38:36.242: ISAKMP (38618): His hash no match - this node outside NAT
    Oct  7 19:38:36.242: ISAKMP:received payload type 20
    Oct  7 19:38:36.242: ISAKMP (38618): No NAT Found for self or peer
    Oct  7 19:38:36.242: ISAKMP:(38618):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Oct  7 19:38:36.242: ISAKMP:(38618):Old State = IKE_R_MM3  New State = IKE_R_MM3
    Oct  7 19:38:36.243: ISAKMP:(38618): IKE->PKI Get configured TrustPoints state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.243: ISAKMP:(38618): PKI->IKE Got configured TrustPoints state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.243: ISAKMP:(38618): IKE->PKI Get IssuerNames state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.243: ISAKMP:(38618): PKI->IKE Got IssuerNames state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.243: ISAKMP (38618): constructing CERT_REQ for issuer cn=Tetra Pak Issuing NAD CA 01 - G1,dc=tp1,dc=ad1,dc=tetrapak,dc=com
    Oct  7 19:38:36.243: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) MM_KEY_EXCH
    Oct  7 19:38:36.243: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.243: ISAKMP:(38618):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Oct  7 19:38:36.243: ISAKMP:(38618):Old State = IKE_R_MM3  New State = IKE_R_MM4
    Oct  7 19:38:36.484: ISAKMP (38618): received packet from 2.8.51.58 dport 500 sport 500 Global (R) MM_KEY_EXCH
    Oct  7 19:38:36.484: ISAKMP:(38618):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Oct  7 19:38:36.484: ISAKMP:(38618):Old State = IKE_R_MM4  New State = IKE_R_MM5
    Oct  7 19:38:36.484: ISAKMP:(38618): processing ID payload. message ID = 0
    Oct  7 19:38:36.484: ISAKMP (38618): ID payload
            next-payload : 6
            type         : 2
            FQDN name    : lvrirt-s2s-01.nvv.net.company.com
            protocol     : 17
            port         : 500
            length       : 42
    Oct  7 19:38:36.484: ISAKMP:(38618): processing CERT payload. message ID = 0
    Oct  7 19:38:36.484: ISAKMP:(38618): processing a CT_X509_SIGNATURE cert
    Oct  7 19:38:36.484: ISAKMP:(38618): IKE->PKI Add peer's certificate state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.485: ISAKMP:(38618): PKI->IKE Added peer's certificate state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.485: ISAKMP:(38618): IKE->PKI Get PeerCertificateChain state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.485: ISAKMP:(38618): PKI->IKE Got PeerCertificateChain state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.485: ISAKMP:(38618): peer's pubkey is cached
    Oct  7 19:38:36.485: ISAKMP:(38618): IKE->PKI Validate certificate chain state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.485: ISAKMP:(38618): PKI->IKE Validate certificate chain state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.485: ISAKMP:(38618): Unable to get DN from certificate!
    Oct  7 19:38:36.485: ISAKMP:(38618): processing SIG payload. message ID = 0
    Oct  7 19:38:36.486: ISAKMP:received payload type 17
    Oct  7 19:38:36.486: ISAKMP:(38618): processing NOTIFY INITIAL_CONTACT protocol 1
            spi 0, message ID = 0, sa = 0x7F1AA7CC5920
    Oct  7 19:38:36.486: ISAKMP:(38618):SA authentication status:
            authenticated
    Oct  7 19:38:36.486: ISAKMP:(38618):SA has been authenticated with 2.8.51.58
    Oct  7 19:38:36.486: ISAKMP:(38618):SA authentication status:
            authenticated
    Oct  7 19:38:36.486: ISAKMP:(38618): Process initial contact,
    bring down existing phase 1 and 2 SA's with local 15.18.1.1 remote 2.8.51.58 remote port 500
    Oct  7 19:38:36.486: ISAKMP:(38617):received initial contact, deleting SA
    Oct  7 19:38:36.486: ISAKMP:(38617):peer does not do paranoid keepalives.
    Oct  7 19:38:36.486: ISAKMP:(38617):deleting SA reason "Receive initial contact" state (R) QM_IDLE       (peer 2.8.51.58)
    Oct  7 19:38:36.486: ISAKMP:(38618):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Oct  7 19:38:36.486: ISAKMP:(38618):Old State = IKE_R_MM5  New State = IKE_R_MM5
    Oct  7 19:38:36.487: ISAKMP: set new node 2177251913 to QM_IDLE
    Oct  7 19:38:36.487: ISAKMP:(38617): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) QM_IDLE
    Oct  7 19:38:36.487: ISAKMP:(38617):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.487: ISAKMP:(38617):purging node 2177251913
    Oct  7 19:38:36.487: ISAKMP:(38617):Input = IKE_MESG_INTERNAL, IKE_PHASE1_DEL
    Oct  7 19:38:36.487: ISAKMP:(38617):Old State = IKE_P1_COMPLETE  New State = IKE_DEST_SA
    Oct  7 19:38:36.487: ISAKMP:(38618): IKE->PKI Get self CertificateChain state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.487: ISAKMP:(38618): PKI->IKE Got self CertificateChain state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.487: ISAKMP:(38618): IKE->PKI Get SubjectName state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.487: ISAKMP:(38618): PKI->IKE Got SubjectName state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.487: ISAKMP:(38618):My ID configured as IPv4 Addr, but Addr not in Cert!
    Oct  7 19:38:36.487: ISAKMP:(38618):Using FQDN as My ID
    Oct  7 19:38:36.487: ISAKMP:(38618):SA is doing RSA signature authentication using id type ID_FQDN
    Oct  7 19:38:36.487: ISAKMP (38618): ID payload
            next-payload : 6
            type         : 2
            FQDN name    : selurt-dmvpn-01.nvv.net.company.com
            protocol     : 17
            port         : 500
            length       : 44
    Oct  7 19:38:36.487: ISAKMP:(38618):Total payload length: 44
    Oct  7 19:38:36.487: ISAKMP:(38618): IKE->PKI Get CertificateChain to be sent to peer state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.488: ISAKMP:(38618): PKI->IKE Got CertificateChain to be sent to peer state (R) MM_KEY_EXCH (peer 2.8.51.58)
    Oct  7 19:38:36.489: ISAKMP (38618): constructing CERT payload for hostname=selurt-dmvpn-01.nvv.net.company.com,serialNumber=4279180096
    Oct  7 19:38:36.489: ISAKMP (38618): constructing CERT payload for cn=Tetra Pak Issuing NAD CA 01 - G1,dc=tp1,dc=ad1,dc=tetrapak,dc=com
    Oct  7 19:38:36.489: ISAKMP:(38618): using the TP_NAD_CA trustpoint's keypair to sign
    Oct  7 19:38:36.494: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) MM_KEY_EXCH
    Oct  7 19:38:36.494: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.494: ISAKMP:(38618):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Oct  7 19:38:36.494: ISAKMP:(38618):Old State = IKE_R_MM5  New State = IKE_P1_COMPLETE
    Oct  7 19:38:36.494: ISAKMP:(38617):deleting SA reason "Receive initial contact" state (R) QM_IDLE       (peer 2.8.51.58)
    Oct  7 19:38:36.494: ISAKMP:(38617):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Oct  7 19:38:36.494: ISAKMP:(38617):Old State = IKE_DEST_SA  New State = IKE_DEST_SA
    Oct  7 19:38:36.494: ISAKMP:(38618):IKE_DPD is enabled, initializing timers
    Oct  7 19:38:36.494: ISAKMP:(38618): IKE->PKI End PKI Session state (R) QM_IDLE       (peer 2.8.51.58)
    Oct  7 19:38:36.494: ISAKMP:(38618): PKI->IKE Ended PKI session state (R) QM_IDLE       (peer 2.8.51.58)
    Oct  7 19:38:36.494: ISAKMP:(38618):Input = IKE_MESG_INTERNAL, IKE_PHASE1_COMPLETE
    selurt-dmvpn-01#
    Oct  7 19:38:36.494: ISAKMP:(38618):Old State = IKE_P1_COMPLETE  New State = IKE_P1_COMPLETE
    selurt-dmvpn-01#
    Oct  7 19:38:46.492: ISAKMP (38618): received packet from 2.8.51.58 dport 500 sport 500 Global (R) QM_IDLE
    Oct  7 19:38:46.492: ISAKMP:(38618): phase 1 packet is a duplicate of a previous packet.
    Oct  7 19:38:46.492: ISAKMP:(38618): retransmitting due to retransmit phase 1
    Oct  7 19:38:46.992: ISAKMP:(38618): retransmitting phase 1 QM_IDLE      ...
    Oct  7 19:38:46.992: ISAKMP (38618): incrementing error counter on sa, attempt 1 of 5: retransmit phase 1
    Oct  7 19:38:46.992: ISAKMP:(38618): retransmitting phase 1 QM_IDLE
    Oct  7 19:38:46.992: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) QM_IDLE
    selurt-dmvpn-01#
    Oct  7 19:38:46.992: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    selurt-dmvpn-01#
    Oct  7 19:38:56.481: ISAKMP (38618): received packet from 2.8.51.58 dport 500 sport 500 Global (R) QM_IDLE
    Oct  7 19:38:56.481: ISAKMP:(38618): phase 1 packet is a duplicate of a previous packet.
    Oct  7 19:38:56.481: ISAKMP:(38618): retransmitting due to retransmit phase 1
    Oct  7 19:38:56.981: ISAKMP:(38618): retransmitting phase 1 QM_IDLE      ...
    Oct  7 19:38:56.981: ISAKMP (38618): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1
    Oct  7 19:38:56.981: ISAKMP:(38618): retransmitting phase 1 QM_IDLE
    Oct  7 19:38:56.981: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) QM_IDLE
    selurt-dmvpn-01#
    Oct  7 19:38:56.981: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    selurt-dmvpn-01#
    Oct  7 19:39:06.481: ISAKMP (38618): received packet from 2.8.51.58 dport 500 sport 500 Global (R) QM_IDLE
    Oct  7 19:39:06.481: ISAKMP:(38618): phase 1 packet is a duplicate of a previous packet.
    Oct  7 19:39:06.481: ISAKMP:(38618): retransmitting due to retransmit phase 1
    Oct  7 19:39:06.981: ISAKMP:(38618): retransmitting phase 1 QM_IDLE      ...
    Oct  7 19:39:06.981: ISAKMP (38618): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1
    Oct  7 19:39:06.981: ISAKMP:(38618): retransmitting phase 1 QM_IDLE
    Oct  7 19:39:06.981: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) QM_IDLE
    selurt-dmvpn-01#
    Oct  7 19:39:06.981: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    selurt-dmvpn-01#
    Oct  7 19:39:09.880: ISAKMP:(38616):purging SA., sa=7F1AA7721158, delme=7F1AA7721158
    selurt-dmvpn-01#
    Oct  7 19:39:16.481: ISAKMP (38618): received packet from 2.8.51.58 dport 500 sport 500 Global (R) QM_IDLE
    Oct  7 19:39:16.481: ISAKMP:(38618): phase 1 packet is a duplicate of a previous packet.
    Oct  7 19:39:16.481: ISAKMP:(38618): retransmitting due to retransmit phase 1
    Oct  7 19:39:16.980: ISAKMP:(38618): retransmitting phase 1 QM_IDLE      ...
    Oct  7 19:39:16.980: ISAKMP (38618): incrementing error counter on sa, attempt 4 of 5: retransmit phase 1
    Oct  7 19:39:16.980: ISAKMP:(38618): retransmitting phase 1 QM_IDLE
    Oct  7 19:39:16.980: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) QM_IDLE
    selurt-dmvpn-01#
    Oct  7 19:39:16.980: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    selurt-dmvpn-01#
    Oct  7 19:39:26.481: ISAKMP (38618): received packet from 2.8.51.58 dport 500 sport 500 Global (R) QM_IDLE
    Oct  7 19:39:26.482: ISAKMP:(38618): phase 1 packet is a duplicate of a previous packet.
    Oct  7 19:39:26.482: ISAKMP:(38618): retransmitting due to retransmit phase 1
    Oct  7 19:39:26.981: ISAKMP:(38618): retransmitting phase 1 QM_IDLE      ...
    Oct  7 19:39:26.981: ISAKMP (38618): incrementing error counter on sa, attempt 5 of 5: retransmit phase 1
    Oct  7 19:39:26.981: ISAKMP:(38618): retransmitting phase 1 QM_IDLE
    Oct  7 19:39:26.981: ISAKMP:(38618): sending packet to 2.8.51.58 my_port 500 peer_port 500 (R) QM_IDLE
    selurt-dmvpn-01#
    Oct  7 19:39:26.981: ISAKMP:(38618):Sending an IKE IPv4 Packet.
    selurt-dmvpn-01#
    Oct  7 19:39:36.493: ISAKMP:(38617):purging SA., sa=7F1AA79AD9E0, delme=7F1AA79AD9E0
    DMVPN Spoke
    Oct  7 19:38:36.181: ISAKMP:(0): SA request profile is (NULL)
    Oct  7 19:38:36.181: ISAKMP: Created a peer struct for 15.18.1.1, peer port 500
    Oct  7 19:38:36.181: ISAKMP: New peer created peer = 0x2B1F480C peer_handle = 0x80001DF4
    Oct  7 19:38:36.181: ISAKMP: Locking peer struct 0x2B1F480C, refcount 1 for isakmp_initiator
    Oct  7 19:38:36.181: ISAKMP: local port 500, remote port 500
    Oct  7 19:38:36.181: ISAKMP: set new node 0 to QM_IDLE
    Oct  7 19:38:36.181: ISAKMP: Find a dup sa in the avl tree during calling isadb_insert sa = 2B16C9FC
    Oct  7 19:38:36.181: ISAKMP:(0):Can not start Aggressive mode, trying Main mode.
    Oct  7 19:38:36.181: ISAKMP:(0):found peer pre-shared key matching 15.18.1.1
    Oct  7 19:38:36.181: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer 15.18.1.1)
    Oct  7 19:38:36.181: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer 15.18.1.1)
    Oct  7 19:38:36.181: ISAKMP:(0): constructed NAT-T vendor-rfc3947 ID
    Oct  7 19:38:36.181: ISAKMP:(0): constructed NAT-T vendor-07 ID
    Oct  7 19:38:36.181: ISAKMP:(0): constructed NAT-T vendor-03 ID
    Oct  7 19:38:36.181: ISAKMP:(0): constructed NAT-T vendor-02 ID
    Oct  7 19:38:36.181: ISAKMP:(0):Input = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM
    Oct  7 19:38:36.181: ISAKMP:(0):Old State = IKE_READY  New State = IKE_I_MM1
    Oct  7 19:38:36.181: ISAKMP:(0): beginning Main Mode exchange
    Oct  7 19:38:36.181: ISAKMP:(0): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_NO_STATE
    Oct  7 19:38:36.181: ISAKMP:(0):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.205: ISAKMP (0): received packet from 15.18.1.1 dport 500 sport 500 Global (I) MM_NO_STATE
    Oct  7 19:38:36.205: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Oct  7 19:38:36.205: ISAKMP:(0):Old State = IKE_I_MM1  New State = IKE_I_MM2
    Oct  7 19:38:36.205: ISAKMP:(0): processing SA payload. message ID = 0
    Oct  7 19:38:36.205: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.205: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
    Oct  7 19:38:36.205: ISAKMP (0): vendor ID is NAT-T RFC 3947
    Oct  7 19:38:36.205: ISAKMP:(0):found peer pre-shared key matching 15.18.1.1
    Oct  7 19:38:36.205: ISAKMP:(0): local preshared key found
    Oct  7 19:38:36.205: ISAKMP : Scanning profiles for xauth ...
    Oct  7 19:38:36.205: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_NO_STATE (peer 15.18.1.1)
    Oct  7 19:38:36.205: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_NO_STATE (peer 15.18.1.1)
    Oct  7 19:38:36.205: ISAKMP:(0):Checking ISAKMP transform 1 against priority 5 policy
    Oct  7 19:38:36.205: ISAKMP:      encryption 3DES-CBC
    Oct  7 19:38:36.205: ISAKMP:      hash MD5
    Oct  7 19:38:36.205: ISAKMP:      default group 1
    Oct  7 19:38:36.205: ISAKMP:      auth RSA sig
    Oct  7 19:38:36.205: ISAKMP:      life type in seconds
    Oct  7 19:38:36.205: ISAKMP:      life duration (VPI) of  0x0 0x1 0x51 0x80
    Oct  7 19:38:36.205: ISAKMP:(0):atts are acceptable. Next payload is 0
    Oct  7 19:38:36.205: ISAKMP:(0):Acceptable atts:actual life: 0
    Oct  7 19:38:36.205: ISAKMP:(0):Acceptable atts:life: 0
    Oct  7 19:38:36.205: ISAKMP:(0):Fill atts in sa vpi_length:4
    Oct  7 19:38:36.205: ISAKMP:(0):Fill atts in sa life_in_seconds:86400
    Oct  7 19:38:36.205: ISAKMP:(0): IKE->PKI Start PKI Session state (I) MM_NO_STATE (peer 15.18.1.1)
    Oct  7 19:38:36.205: ISAKMP:(0): PKI->IKE Started PKI Session state (I) MM_NO_STATE (peer 15.18.1.1)
    Oct  7 19:38:36.205: ISAKMP:(0):Returning Actual lifetime: 86400
    Oct  7 19:38:36.205: ISAKMP:(0)::Started lifetime timer: 86400.
    Oct  7 19:38:36.205: ISAKMP:(0): processing vendor id payload
    Oct  7 19:38:36.205: ISAKMP:(0): vendor ID seems Unity/DPD but major 69 mismatch
    Oct  7 19:38:36.205: ISAKMP (0): vendor ID is NAT-T RFC 3947
    Oct  7 19:38:36.205: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Oct  7 19:38:36.205: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM2
    Oct  7 19:38:36.209: ISAKMP:(0): IKE->PKI Get configured TrustPoints state (I) MM_SA_SETUP (peer 15.18.1.1)
    Oct  7 19:38:36.209: ISAKMP:(0): PKI->IKE Got configured TrustPoints state (I) MM_SA_SETUP (peer 15.18.1.1)
    Oct  7 19:38:36.209: ISAKMP:(0): IKE->PKI Get IssuerNames state (I) MM_SA_SETUP (peer 15.18.1.1)
    Oct  7 19:38:36.209: ISAKMP:(0): PKI->IKE Got IssuerNames state (I) MM_SA_SETUP (peer 15.18.1.1)
    Oct  7 19:38:36.209: ISAKMP (0): constructing CERT_REQ for issuer cn=Tetra Pak Root CA - G1
    Oct  7 19:38:36.209: ISAKMP:(0): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_SA_SETUP
    Oct  7 19:38:36.209: ISAKMP:(0):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.209: ISAKMP:(0):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Oct  7 19:38:36.209: ISAKMP:(0):Old State = IKE_I_MM2  New State = IKE_I_MM3
    Oct  7 19:38:36.233: ISAKMP (0): received packet from 15.18.1.1 dport 500 sport 500 Global (I) MM_SA_SETUP
    Oct  7 19:38:36.233: ISAKMP:(0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
    Oct  7 19:38:36.233: ISAKMP:(0):Old State = IKE_I_MM3  New State = IKE_I_MM4
    Oct  7 19:38:36.233: ISAKMP:(0): processing KE payload. message ID = 0
    Oct  7 19:38:36.245: ISAKMP:(0): processing NONCE payload. message ID = 0
    Oct  7 19:38:36.245: ISAKMP:(8329): processing CERT_REQ payload. message ID = 0
    Oct  7 19:38:36.245: ISAKMP:(8329): peer wants a CT_X509_SIGNATURE cert
    Oct  7 19:38:36.245: ISAKMP:(8329): peer wants cert issued by cn=Tetra Pak Issuing NAD CA 01 - G1,dc=tp1,dc=ad1,dc=tetrapak,dc=com
    Oct  7 19:38:36.249:  Choosing trustpoint TP_NAD_CA as issuer
    Oct  7 19:38:36.249: ISAKMP:(8329): processing vendor id payload
    Oct  7 19:38:36.249: ISAKMP:(8329): vendor ID is Unity
    Oct  7 19:38:36.249: ISAKMP:(8329): processing vendor id payload
    Oct  7 19:38:36.249: ISAKMP:(8329): vendor ID is DPD
    Oct  7 19:38:36.249: ISAKMP:(8329): processing vendor id payload
    Oct  7 19:38:36.249: ISAKMP:(8329): speaking to another IOS box!
    Oct  7 19:38:36.249: ISAKMP:received payload type 20
    Oct  7 19:38:36.249: ISAKMP (8329): His hash no match - this node outside NAT
    Oct  7 19:38:36.249: ISAKMP:received payload type 20
    Oct  7 19:38:36.249: ISAKMP (8329): No NAT Found for self or peer
    Oct  7 19:38:36.249: ISAKMP:(8329):Input = IKE_MESG_INTERNAL, IKE_PROCESS_MAIN_MODE
    Oct  7 19:38:36.249: ISAKMP:(8329):Old State = IKE_I_MM4  New State = IKE_I_MM4
    Oct  7 19:38:36.249: ISAKMP:(8329):Send initial contact
    Oct  7 19:38:36.249: ISAKMP:(8329): IKE->PKI Get self CertificateChain state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:38:36.249: ISAKMP:(8329): PKI->IKE Got self CertificateChain state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:38:36.249: ISAKMP:(8329): IKE->PKI Get SubjectName state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:38:36.249: ISAKMP:(8329): PKI->IKE Got SubjectName state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:38:36.249: ISAKMP:(8329):My ID configured as IPv4 Addr, but Addr not in Cert!
    Oct  7 19:38:36.249: ISAKMP:(8329):Using FQDN as My ID
    Oct  7 19:38:36.249: ISAKMP:(8329):SA is doing RSA signature authentication using id type ID_FQDN
    Oct  7 19:38:36.249: ISAKMP (8329): ID payload
            next-payload : 6
            type         : 2
            FQDN name    : lvrirt-s2s-01.nvv.net.company.com
            protocol     : 17
            port         : 500
            length       : 42
    Oct  7 19:38:36.249: ISAKMP:(8329):Total payload length: 42
    Oct  7 19:38:36.249: ISAKMP:(8329): IKE->PKI Get CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:38:36.253: ISAKMP:(8329): PKI->IKE Got CertificateChain to be sent to peer state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:38:36.253: ISAKMP (8329): constructing CERT payload for hostname=lvrirt-s2s-01.nvv.net.company.com,serialNumber=FCZ163860KW
    Oct  7 19:38:36.253: ISKAMP: growing send buffer from 1024 to 3072
    Oct  7 19:38:36.253: ISAKMP:(8329): using the TP_NAD_CA trustpoint's keypair to sign
    Oct  7 19:38:36.449: ISAKMP:(8329): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Oct  7 19:38:36.449: ISAKMP:(8329):Sending an IKE IPv4 Packet.
    Oct  7 19:38:36.449: ISAKMP:(8329):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    Oct  7 19:38:36.449: ISAKMP:(8329):Old State = IKE_I_MM4  New State = IKE_I_MM5
    Oct  7 19:38:36.481: ISAKMP (8328): received packet from 15.18.1.1 dport 500 sport 500 Global (I) MM_NO_STATE
    Oct  7 19:38:46.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH...
    Oct  7 19:38:46.449: ISAKMP (8329): incrementing error counter on sa, attempt 1 of 5: retransmit phase 1
    Oct  7 19:38:46.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH
    Oct  7 19:38:46.449: ISAKMP:(8329): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Oct  7 19:38:46.449: ISAKMP:(8329):Sending an IKE IPv4 Packet.
    Oct  7 19:38:54.709: ISAKMP:(8327):purging node 1841056658
    Oct  7 19:38:54.709: ISAKMP:(8327):purging node -57107868
    Oct  7 19:38:56.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH...
    Oct  7 19:38:56.449: ISAKMP (8329): incrementing error counter on sa, attempt 2 of 5: retransmit phase 1
    Oct  7 19:38:56.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH
    Oct  7 19:38:56.449: ISAKMP:(8329): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Oct  7 19:38:56.449: ISAKMP:(8329):Sending an IKE IPv4 Packet.
    Oct  7 19:39:04.709: ISAKMP:(8327):purging SA., sa=3169E824, delme=3169E824
    Oct  7 19:39:06.181: ISAKMP: set new node 0 to QM_IDLE
    Oct  7 19:39:06.181: ISAKMP:(8329):SA is still budding. Attached new ipsec request to it. (local 2.8.51.58, remote 15.18.1.1)
    Oct  7 19:39:06.181: ISAKMP: Error while processing SA request: Failed to initialize SA
    Oct  7 19:39:06.181: ISAKMP: Error while processing KMI message 0, error 2.
    Oct  7 19:39:06.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH...
    Oct  7 19:39:06.449: ISAKMP (8329): incrementing error counter on sa, attempt 3 of 5: retransmit phase 1
    Oct  7 19:39:06.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH
    Oct  7 19:39:06.449: ISAKMP:(8329): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Oct  7 19:39:06.449: ISAKMP:(8329):Sending an IKE IPv4 Packet.
    Oct  7 19:39:10.261: ISAKMP:(8328):purging node -1445247076
    Oct  7 19:39:16.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH...
    Oct  7 19:39:16.449: ISAKMP (8329): incrementing error counter on sa, attempt 4 of 5: retransmit phase 1
    Oct  7 19:39:16.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH
    Oct  7 19:39:16.449: ISAKMP:(8329): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Oct  7 19:39:16.449: ISAKMP:(8329):Sending an IKE IPv4 Packet.
    Oct  7 19:39:20.261: ISAKMP:(8328):purging SA., sa=2AD85BD0, delme=2AD85BD0
    Oct  7 19:39:26.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH...
    Oct  7 19:39:26.449: ISAKMP (8329): incrementing error counter on sa, attempt 5 of 5: retransmit phase 1
    Oct  7 19:39:26.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH
    Oct  7 19:39:26.449: ISAKMP:(8329): sending packet to 15.18.1.1 my_port 500 peer_port 500 (I) MM_KEY_EXCH
    Oct  7 19:39:26.449: ISAKMP:(8329):Sending an IKE IPv4 Packet.
    Oct  7 19:39:36.449: ISAKMP:(8329): retransmitting phase 1 MM_KEY_EXCH...
    Oct  7 19:39:36.449: ISAKMP:(8329):peer does not do paranoid keepalives.
    Oct  7 19:39:36.449: ISAKMP:(8329):deleting SA reason "Death by retransmission P1" state (I) MM_KEY_EXCH (peer 15.18.1.1)
    Oct  7 19:39:36.449: ISAKMP:(8329):deleting SA reason "Death by retransmission P1" state (I) MM_KEY_EXCH (peer 15.18.1.1)

    Mike,
    Hub sends its cert but spoke never recives that, this is typically a problem with fragmentation handling in transit networks.
    Sniff both end you control and check whether you're not missing any fragments on spoke end.
    Could be as simple as an MTU problem on your end or could be something in the path attempting reassambly.
    Multiple ways to go, check your end, if fragments are missing in transit - start investigating with ISP(s).
    M.

  • 802.1X Athentication Successful but can't ping Default Router. PSK works fine

    Got an interesting scenario. I am labbing out 802.1X authentication for wireless with a Cisco 2504 WLC along with a Windows Server 2012 r2 with AD, DHCP Server, DNS Server, Certificate Services, and NPS. I was able to make the different parts communicate and was able to successfully authenticate with an account I created on AD. Under my windows server event viewer, I received confirmation message: "Network Policy Server granted access to user." I received a valid IP address from the DHCP server. Computer is on the domain. Everything looks like it is working perfectly. I even checked the debug on my WLC looking for the mac address of my device but I received the "Processing Access-Accept mobile <MAC-ADDRESS>" message. 
    Here comes the problem. I created 2 WLAN’s to test. One was PSK while the other was 802.1X. They share the same interface on the WLC, so they have the exact same configurations. On my PSK everything works fine, I can browse Internet and ping devices within the network. On the 802.1X, I am able to ping the controller, but nothing else. Can’t ping gateway nor my dhcp server. Any thoughts?
    Best Regards,
    Sean

    In your testing the device that connected with psk is the same device that connected to TLS? 

  • Which hp printers use wpa2-psk

    My new Netgear R6300 only wants to use wpa2-psk (aes). My old HP printer can not do this security code. Need to get a new HP printer, which one has this level of encription?

    Hello, and Welcome to the HP Support Community!
    wpa-psk (either AES or TKIP) is pretty standard these days.  Looking at my year-old OfficeJet 8600 Pro, it easily supports this method and is the way I have it connected to my home network.
    We just installed a newer 8610 at the office, and it had no problems with the wpa/wpa2 encryption scheme either!
    I believe you will be safe with any present-day HP printer that offers wireless connectivity.    
    WyreNut
    I am a Volunteer here, not employed by HP.
    You too can become an HP Expert! Details HERE!
    If my post has helped you, click the Kudos Thumbs up!
    If it solved your issue, Click the "Accept as Solution" button so others can benefit from the question you asked!

  • Can't Connect To WPA-PSK/AES

    I've read through dozens of posts here and on other sites, but still can't figure this out.
    At home, I have a D-Link DI-634M wireless router. We have two laptops (Toshiba and IBM) that connect to it just fine, but I can't get my new iPhone 3G to connect. The Wireless Settings page on the router looks like this:
    SSID: SomethingLikeThis
    Channel: Auto Channel Select enabled
    Super G Mode: Disabled
    Transmission Rate: Auto
    802.11g Only Mode: Disabled
    SSID Broadcast: Disabled
    Security Mode: WPA-PSK
    WPA Mode: WPA
    Cipher Type: AES
    Passphrase: Looks something like this sentence, for a total of 63 characters.
    When I try to add the network to my iPhone, I get the error that it can't connect. But, in the network settings, it will now show the SSID, with the encryption icon and the signal strength meter. I select it, get prompted for the password again, but still can't connect.
    Just checked the logs on the router, and I can see an INFO message that says "Wireless system with MAC address nnnnnnnnnnnnn associated", showing the MAC address of my iPhone. I don't see anything after that to indicate any error with that device.
    I upgraded the firmware in the router to the latest release (Feb/2008). I've tried changing the Cipher Type from AES to TKIP, and even "TKIP and AES".
    What am I missing here?
    Thanks!

    Sorry, forgot to mention that when I turn off encryption it works fine. But, even though I don't broadcast my SSID, I'd never run a wireless router without at least some basic encryption. Just tried changing the password to not have spaces, and now it works fine. That's strange, since I didn't have any problems with any other wireless devices connecting when the password did have spaces.
    Thanks a million!!!!

  • Unable to connect to Wi-Fi connection using WPA2 PSK authentication and encryption type TKIP

    I was referred to here from this thread at the Windows Insider Program: http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_web/unable-to-connect-to-wi-fi-connection-using-wpa2/07bae1ed-c7fb-4f85-9d26-5549cc23e57a?msgId=2eb70420-fe35-494b-a13d-dcacd4d55eb9&rtAction=1426697691002
    My issue is copy/pasted below:
    Original Title: TKIP selection in WiFi network settings
    I have a workplace WiFi connection using WPA2 PSK authentication and encryption type TKIP.
    On the machine I used to test Windows 10, I had a previous installation of Windows 7 professional which connected to my workplace WiFi using the above settings. After installing Windows 10, my workplace wifi settings were imported and worked fine.
    Windows 10 had a system crash, and since I had deleted my previous windows installation, I performed a complete reinstall of Windows 7. However, when I went to install Windows 10 again, I had not taken the time to set up my workplace Wifi on Windows
    7 before installing Windows 10. As a result, I had to set up my workplace wifi as a new connection in Windows 10.
    When going to set up the wifi connection, the encryption type was grayed out, but appeared to default to AES. Searching the internet suggested that Windows 8.1 did not need a encryption type selected, because Windows could automatically determine
    if it was TKIP or AES, hence why the option to select encryption type was grayed out. However, after completing the setup of my workplace wifi, Windows 10 could not connect to my workplace wifi. After restoring Windows 7 with a factory reset, and setting up
    the workplace wifi (the encryption type selection was not grayed out and I manually selected TKIP encryption), my workplace wifi was working again.

    I was referred to here from this thread at the Windows Insider Program: http://answers.microsoft.com/en-us/insider/forum/insider_wintp-insider_web/unable-to-connect-to-wi-fi-connection-using-wpa2/07bae1ed-c7fb-4f85-9d26-5549cc23e57a?msgId=2eb70420-fe35-494b-a13d-dcacd4d55eb9&rtAction=1426697691002
    My issue is copy/pasted below:
    Original Title: TKIP selection in WiFi network settings
    I have a workplace WiFi connection using WPA2 PSK authentication and encryption type TKIP.
    On the machine I used to test Windows 10, I had a previous installation of Windows 7 professional which connected to my workplace WiFi using the above settings. After installing Windows 10, my workplace wifi settings were imported and worked fine.
    Windows 10 had a system crash, and since I had deleted my previous windows installation, I performed a complete reinstall of Windows 7. However, when I went to install Windows 10 again, I had not taken the time to set up my workplace Wifi on Windows
    7 before installing Windows 10. As a result, I had to set up my workplace wifi as a new connection in Windows 10.
    When going to set up the wifi connection, the encryption type was grayed out, but appeared to default to AES. Searching the internet suggested that Windows 8.1 did not need a encryption type selected, because Windows could automatically determine
    if it was TKIP or AES, hence why the option to select encryption type was grayed out. However, after completing the setup of my workplace wifi, Windows 10 could not connect to my workplace wifi. After restoring Windows 7 with a factory reset, and setting up
    the workplace wifi (the encryption type selection was not grayed out and I manually selected TKIP encryption), my workplace wifi was working again.

  • WLAN User Idle Timeout and WPA2-PSK authentication

    Hi,
    There is a WLAN for Guest users with Session Timeout of 65535 sec and User Idle Timeout of 28800 sec. The WLAN uses PSK as Layer-2 authentication and Web Auth as Layer-3 authentication. Authentication source is locally created users on the controllers (LocalEAP) - can be RADIUS through ISE as well. 
    (Cisco Controller) show>sysinfo
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.6.130.0
    RTOS Version..................................... 7.6.130.0
    Bootloader Version............................... 7.6.130.0
    Emergency Image Version.......................... 7.6.130.0
    Build Type....................................... DATA + WPS
    System Name...................................... vwlc-1
    System Location.................................. Matrix
    System Contact................................... IT HelpDesk Matrix
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
    IP Address....................................... 10.10.10.50
    System Up Time................................... 6 days 17 hrs 30 mins 26 secs
    System Timezone Location......................... (GMT+10:00) Sydney, Melbourne, Canberra
    System Stats Realtime Interval................... 5
    System Stats Normal Interval..................... 180
    Configured Country............................... AU - Australia
    --More-- or (q)uit
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 2
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ 00:0C:29:74:15:2F
    Maximum number of APs supported.................. 200
    (Cisco Controller) show> wlan 2
    WLAN Identifier.................................. 2
    Profile Name..................................... Matrix-LocalEAP
    Network Name (SSID).............................. Matrix-LocalEAP
    Status........................................... Enabled
    MAC Filtering.................................... Disabled
    Broadcast SSID................................... Enabled
    AAA Policy Override.............................. Disabled
    Network Admission Control
    Client Profiling Status
    Radius Profiling ............................ Disabled
    DHCP ....................................... Disabled
    HTTP ....................................... Disabled
    Local Profiling ............................. Disabled
    DHCP ....................................... Disabled
    HTTP ....................................... Disabled
    Radius-NAC State............................... Disabled
    SNMP-NAC State................................. Disabled
    Quarantine VLAN................................ 0
    Maximum number of Associated Clients............. 0
    Maximum number of Clients per AP Radio........... 200
    Number of Active Clients......................... 0
    Exclusionlist Timeout............................ 60 seconds
    Session Timeout.................................. 65535 seconds
    User Idle Timeout................................ 28800 seconds
    Sleep Client..................................... disable
    Sleep Client Timeout............................. 12 hours
    User Idle Threshold.............................. 0 Bytes
    NAS-identifier................................... vwlc-1
    CHD per WLAN..................................... Enabled
    Webauth DHCP exclusion........................... Disabled
    Interface........................................ management
    Multicast Interface.............................. Not Configured
    WLAN IPv4 ACL.................................... unconfigured
    WLAN IPv6 ACL.................................... unconfigured
    WLAN Layer2 ACL.................................. unconfigured
    mDNS Status...................................... Disabled
    mDNS Profile Name................................ unconfigured
    DHCP Server...................................... Default
    DHCP Address Assignment Required................. Enabled
    Static IP client tunneling....................... Disabled
    Quality of Service............................... Silver
    Per-SSID Rate Limits............................. Upstream Downstream
    Average Data Rate................................ 0 0
    Average Realtime Data Rate....................... 0 0
    Burst Data Rate.................................. 0 0
    Burst Realtime Data Rate......................... 0 0
    Per-Client Rate Limits........................... Upstream Downstream
    Average Data Rate................................ 0 0
    Average Realtime Data Rate....................... 0 0
    Burst Data Rate.................................. 0 0
    Burst Realtime Data Rate......................... 0 0
    Scan Defer Priority.............................. 4,5,6
    Scan Defer Time.................................. 100 milliseconds
    WMM.............................................. Allowed
    WMM UAPSD Compliant Client Support............... Disabled
    Media Stream Multicast-direct.................... Disabled
    CCX - AironetIe Support.......................... Enabled
    CCX - Gratuitous ProbeResponse (GPR)............. Disabled
    CCX - Diagnostics Channel Capability............. Disabled
    Dot11-Phone Mode (7920).......................... Disabled
    Wired Protocol................................... 802.1P (Tag=2)
    Passive Client Feature........................... Disabled
    Peer-to-Peer Blocking Action..................... Disabled
    Radio Policy..................................... All
    DTIM period for 802.11a radio.................... 1
    DTIM period for 802.11b radio.................... 1
    Radius Servers
    Authentication................................ 10.10.10.70 1812
    Accounting.................................... 10.10.10.70 1813
    Interim Update............................. Disabled
    Framed IPv6 Acct AVP ...................... Prefix
    Dynamic Interface............................. Disabled
    Dynamic Interface Priority.................... wlan
    Local EAP Authentication......................... Enabled (Profile 'local-eap-matrix')
    Security
    802.11 Authentication:........................ Open System
    FT Support.................................... Disabled
    Static WEP Keys............................... Disabled
    802.1X........................................ Disabled
    Wi-Fi Protected Access (WPA/WPA2)............. Enabled
    WPA (SSN IE)............................... Disabled
    WPA2 (RSN IE).............................. Enabled
    TKIP Cipher............................. Disabled
    AES Cipher.............................. Enabled
    Auth Key Management
    802.1x.................................. Disabled
    PSK..................................... Enabled
    CCKM.................................... Disabled
    FT-1X(802.11r).......................... Disabled
    FT-PSK(802.11r)......................... Disabled
    PMF-1X(802.11w)......................... Disabled
    PMF-PSK(802.11w)........................ Disabled
    FT Reassociation Timeout................... 20
    FT Over-The-DS mode........................ Disabled
    GTK Randomization.......................... Disabled
    SKC Cache Support.......................... Disabled
    CCKM TSF Tolerance......................... 1000
    WAPI.......................................... Disabled
    Wi-Fi Direct policy configured................ Disabled
    EAP-Passthrough............................... Disabled
    CKIP ......................................... Disabled
    Web Based Authentication...................... Enabled
    IPv4 ACL........................................ Unconfigured
    IPv6 ACL........................................ Unconfigured
    Web-Auth Flex ACL............................... Unconfigured
    Web Authentication server precedence:
    1............................................... local
    2............................................... radius
    3............................................... ldap
    Web-Passthrough............................... Disabled
    Conditional Web Redirect...................... Disabled
    Splash-Page Web Redirect...................... Disabled
    Auto Anchor................................... Disabled
    FlexConnect Local Switching................... Enabled
    flexconnect Central Dhcp Flag................. Disabled
    flexconnect nat-pat Flag...................... Disabled
    flexconnect Dns Override Flag................. Disabled
    flexconnect PPPoE pass-through................ Disabled
    flexconnect local-switching IP-source-guar.... Disabled
    FlexConnect Vlan based Central Switching ..... Disabled
    FlexConnect Local Authentication.............. Disabled
    FlexConnect Learn IP Address.................. Enabled
    Client MFP.................................... Optional
    PMF........................................... Disabled
    PMF Association Comeback Time................. 1
    PMF SA Query RetryTimeout..................... 200
    Tkip MIC Countermeasure Hold-down Timer....... 60
    Eap-params.................................... Disabled
    AVC Visibilty.................................... Disabled
    AVC Profile Name................................. None
    Flow Monitor Name................................ None
    Split Tunnel (Printers).......................... Disabled
    Call Snooping.................................... Disabled
    Roamed Call Re-Anchor Policy..................... Disabled
    SIP CAC Fail Send-486-Busy Policy................ Enabled
    SIP CAC Fail Send Dis-Association Policy......... Disabled
    KTS based CAC Policy............................. Disabled
    Assisted Roaming Prediction Optimization......... Disabled
    802.11k Neighbor List............................ Disabled
    802.11k Neighbor List Dual Band.................. Disabled
    Band Select...................................... Disabled
    Load Balancing................................... Disabled
    Multicast Buffer................................. Disabled
    Mobility Anchor List
    WLAN ID IP Address Status
    802.11u........................................ Disabled
    MSAP Services.................................. Disabled
    Local Policy
    Priority Policy Name
    The wireless user on joining the WLAN enters the PSK and than gets redirected to WLC Web Auth portal for authentication. On successful login, the user is granted access. The issue is that despite Idle Timeout being 28800 sec (8 hours), the WLC removes the client entry before 8 hours if the device goes to sleep - mostly within the first hour. Tested this on Windows 7 notebook multiple times. When the PC is put to sleep, the WLC loses its record after some time. When PC wakes up, it has to undergo Web Auth again. Debugging the client MAC generates these logs - from initial association to final clearing.
    (Cisco Controller) >*apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Association received from mobile on BSSID 00:26:cb:4c:89:d1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Global 200 Clients are allowed to AP radio
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Max Client Trap Threshold: 0 cur: 1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Rf profile 600 Clients are allowed to AP wlan
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 override for default ap group, marking intgrp NULL
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 10
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Re-applying interface policy for client
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2219)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2240)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 In processSsidIE:4850 setting Central switched to FALSE
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Applying site-specific Local Bridging override for station 3c:a9:f4:0b:91:70 - vapId 2, site 'default-group', interface 'management'
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Applying Local Bridging Interface Policy for station 3c:a9:f4:0b:91:70 - vlan 10, interface id 0, interface 'management'
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 processSsidIE statusCode is 0 and status is 0
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 processSsidIE ssid_done_flag is 0 finish_flag is 0
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 STA - rates (6): 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 0
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 suppRates statusCode is 0 and gotSuppRatesElement is 1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Processing RSN IE type 48, length 22 for mobile 3c:a9:f4:0b:91:70
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 AID 1 in Assoc Req from flex AP 00:26:cb:4c:89:d0 is same as in mscb 3c:a9:f4:0b:91:70
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 apfMs1xStateDec
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Change state to START (0) last state WEBAUTH_REQD (8)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 START (0) Initializing policy
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 START (0) Change state to AUTHCHECK (2) last state START (0)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Encryption policy is set to 0x80000001
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Central switch is FALSE
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Sending Local Switch flag = 1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 8021X_REQD (3) DHCP Not required on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2for this client
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Not Using WMM Compliance code qosCap 00
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2 flex-acl-name:
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 apfPemAddUser2 (apf_policy.c:333) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Associated to Associated
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 apfPemAddUser2:session timeout forstation 3c:a9:f4:0b:91:70 - Session Tout 65535, apfMsTimeOut '65535' and sessionTimerRunning flag is 0
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 49) in 65535 seconds
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 Func: apfPemAddUser2, Ms Timeout = 65535, Session Timeout = 65535
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 Sending Assoc Response to station on BSSID 00:26:cb:4c:89:d1 (status 0) ApVapId 2 Slot 0
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 apfProcessAssocReq (apf_80211.c:8294) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Associated to Associated
    *pemReceiveTask: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 10.10.1.130 Removed NPU entry.
    *spamApTask7: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Sent 1x initiate message to multi thread task for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Creating a PKC PMKID Cache entry for station 3c:a9:f4:0b:91:70 (RSN 2)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Resetting MSCB PMK Cache Entry 0 for station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Removing BSSID 00:26:cb:4c:89:d1 from PMKID cache of station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Setting active key cache index 0 ---> 8
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Setting active key cache index 8 ---> 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Adding BSSID 00:26:cb:4c:89:d1 to PMKID cache at index 0 for station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: New PMKID: (16)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: [0000] 67 67 8f 7d 2a 8d 78 f9 6d 29 c7 74 d2 fd 6a 25
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Initiating RSN PSK to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 dot1x - moving mobile 3c:a9:f4:0b:91:70 into Force Auth state
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Skipping EAP-Success to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 EAPOL Header:
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 00000000: 02 03 5f 00 .._.
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Found an cache entry for BSSID 00:26:cb:4c:89:d1 in PMKID cache at index 0 of station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Found an cache entry for BSSID 00:26:cb:4c:89:d1 in PMKID cache at index 0 of station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: Including PMKID in M1 (16)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: [0000] 67 67 8f 7d 2a 8d 78 f9 6d 29 c7 74 d2 fd 6a 25
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Starting key exchange to mobile 3c:a9:f4:0b:91:70, data packets will be dropped
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Allocating EAP Pkt for retransmission to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 0 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.567: 3c:a9:f4:0b:91:70 Received EAPOL-Key from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Received EAPOL-key in PTK_START state (message 2) from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Stopping retransmission timer for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 EAPOL Header:
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 00000000: 02 03 5f 00 .._.
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Reusing allocated memory for EAP Pkt for retransmission to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 0 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Received EAPOL-Key from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Stopping retransmission timer for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Freeing EAP Retransmit Bufer for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 apfMs1xStateInc
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Central switch is FALSE
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Sending the Central Auth Info
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Central Auth Info Allocated PMKLen = 32
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: EapolReplayCounter: 00 00 00 00 00 00 00 01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: EapolReplayCounter: 00 00 00 00 00 00 00 01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 PMK: pmkActiveIndex = 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 EapolReplayCounter: 00 00 00 00 00 00 00 01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 msAssocTypeFlagsMsb = 0 msAssocTypeFlagsLsb = 2
    apfMsEntryType = 0 apfMsEapType = 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Sending Local Switch flag = 1
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 L2AUTHCOMPLETE (4) DHCP Not required on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2for this client
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Not Using WMM Compliance code qosCap 00
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2 flex-acl-name:
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 L2AUTHCOMPLETE (4) Change state to WEBAUTH_REQD (8) last state L2AUTHCOMPLETE (4)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) pemAdvanceState2 6236, Adding TMP rule
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Adding Fast Path rule
    type = Airespace AP Client - ACL passthru
    on AP 00:26:cb:4c:89:d0, slot 0, interface = 1, QOS = 0
    IPv4 ACL ID
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Fast Path rule (contd...) 802.1P = 2, DSCP = 0, TokenID = 64206 Local Bridging Vlan = 10, Local Bridging intf id = 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
    *spamApTask7: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 spamEncodeCentralAuthInoMsPayload: msAssocTypeFlagsMsb = 0 msAssocTypeFlagsLsb = 2
    apfMsEntryType = 0 pmkLen = 32
    *pemReceiveTask: Feb 04 07:48:10.570: 3c:a9:f4:0b:91:70 10.10.1.130 Added NPU entry of type 2, dtlFlags 0x0
    *pemReceiveTask: Feb 04 07:48:10.570: 3c:a9:f4:0b:91:70 Pushing IPv6: fe80:0000:0000:0000:c915:4a8e:6d1a:e20d , and MAC: 3C:A9:F4:0B:91:70 , Binding to Data Plane. SUCCESS !!
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP received op BOOTREPLY (2) (len 308,vlan 10, port 1, encap 0xec03)
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP processing DHCP ACK (5)
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP xid: 0xcce207f6 (3437365238), secs: 0, flags: 0
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP chaddr: 3c:a9:f4:0b:91:70
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP ciaddr: 0.0.0.0, yiaddr: 10.10.1.130
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP server id: 10.10.1.20 rcvd server id: 10.10.1.20
    *SNMPTask: Feb 04 07:48:16.594: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:48:16.594: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:48:16.595: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:48:16.595: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *ewmwebWebauth1: Feb 04 07:48:31.129: 3c:a9:f4:0b:91:70 Username entry (local1) created for mobile, length = 6
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 Username entry (local1) created in mscb for mobile, length = 6
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Change state to WEBAUTH_NOL3SEC (14) last state WEBAUTH_REQD (8)
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 apfMsRunStateInc
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_NOL3SEC (14) Change state to RUN (20) last state WEBAUTH_NOL3SEC (14)
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 Session Timeout is 65535 - starting session timer for the mobile
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Reached PLUMBFASTPATH: from line 6571
    *ewmwebWebauth1: Feb 04 07:48:31.131: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Replacing Fast Path rule
    type = Airespace AP Client
    on AP 00:26:cb:4c:89:d0, slot 0, interface = 1, QOS = 0
    IPv4 ACL ID = 255, IPv6 ACL ID =
    *ewmwebWebauth1: Feb 04 07:48:31.131: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Fast Path rule (contd...) 802.1P = 2, DSCP = 0, TokenID = 64206 Local Bridging Vlan = 10, Local Bridging intf id = 0
    *ewmwebWebauth1: Feb 04 07:48:31.131: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
    *pemReceiveTask: Feb 04 07:48:31.132: 3c:a9:f4:0b:91:70 10.10.1.130 Added NPU entry of type 1, dtlFlags 0x0
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >*pemReceiveTask: Feb 04 07:48:31.132: 3c:a9:f4:0b:91:70 Pushing IPv6: fe80:0000:0000:0000:c915:4a8e:6d1a:e20d , and MAC: 3C:A9:F4:0B:91:70 , Binding to Data Plane. SUCCESS !!
    *emWeb: Feb 04 07:49:14.120: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *emWeb: Feb 04 07:49:14.120: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *emWeb: Feb 04 07:49:14.120: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.646: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.646: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.662: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.662: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.663: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.663: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *IPv6_Msg_Task: Feb 04 07:53:35.661: 3c:a9:f4:0b:91:70 Link Local address fe80::c915:4a8e:6d1a:e20d updated to mscb. Not Advancing pem state.Current state: mscb in apfMsMmInitial mobility state and client state APF_MS_STATE_A
    *dot1xMsgTask: Feb 04 07:54:26.664: GTK Rotation Kicked in for AP: 00:26:cb:4c:89:d0 SlotId = 1 - (0x47440ef0)
    *dot1xMsgTask: Feb 04 07:54:26.665: Generated a new group key for AP 00:26:cb:4c:89:d0(1) - vap 1
    *dot1xMsgTask: Feb 04 07:54:26.665: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *dot1xMsgTask: Feb 04 07:54:26.665: Generated a new group key for AP 00:26:cb:4c:89:d0(1) - vap 2
    *dot1xMsgTask: Feb 04 07:54:26.665: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *SNMPTask: Feb 04 07:56:19.689: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:56:19.689: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 08:01:19.730: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 08:01:19.730: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *dot1xMsgTask: Feb 04 08:01:23.904: GTK Rotation Kicked in for AP: 00:26:cb:4c:89:d0 SlotId = 0 - (0x47440ef0)
    *dot1xMsgTask: Feb 04 08:01:23.904: Generated a new group key for AP 00:26:cb:4c:89:d0(0) - vap 1
    *dot1xMsgTask: Feb 04 08:01:23.905: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *dot1xMsgTask: Feb 04 08:01:23.905: Generated a new group key for AP 00:26:cb:4c:89:d0(0) - vap 2
    *dot1xMsgTask: Feb 04 08:01:23.905: GTK rotation for 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:23.905: 3c:a9:f4:0b:91:70 EAPOL Header:
    *dot1xMsgTask: Feb 04 08:01:23.905: 00000000: 02 03 5f 00 .._.
    *dot1xMsgTask: Feb 04 08:01:23.905: 3c:a9:f4:0b:91:70 Key exchange done, data packets from mobile 3c:a9:f4:0b:91:70 should be forwarded shortly
    *dot1xMsgTask: Feb 04 08:01:23.905: 3c:a9:f4:0b:91:70 Key exchange done, data packets from mobile 3c:a9:f4:0b:91:70 should be forwarded shortly
    *dot1xMsgTask: Feb 04 08:01:23.906: Confirmation Key: (16)
    *dot1xMsgTask: Feb 04 08:01:23.906: [0000] fa a3 68 28 46 1f 49 18 a0 60 7a 92 c4 f5 64 3d
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 Allocating EAP Pkt for retransmission to mobile 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 1 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 Updated broadcast key sent to mobile 3C:A9:F4:0B:91:70
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 Updated broadcast key sent to mobile 3C:A9:F4:0B:91:70
    *dot1xMsgTask: Feb 04 08:01:23.907: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *osapiBsnTimer: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 802.1x 'timeoutEvt' Timer expired for station 3c:a9:f4:0b:91:70 and for message = M5
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 Retransmit 1 of EAPOL-Key M5 (length 131) for mobile 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 1 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *osapiBsnTimer: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 802.1x 'timeoutEvt' Timer expired for station 3c:a9:f4:0b:91:70 and for message = M5
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 Retransmit 2 of EAPOL-Key M5 (length 131) for mobile 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 1 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *osapiBsnTimer: Feb 04 08:01:27.104: 3c:a9:f4:0b:91:70 802.1x 'timeoutEvt' Timer expired for station 3c:a9:f4:0b:91:70 and for message = M5
    *dot1xMsgTask: Feb 04 08:01:27.104: 3c:a9:f4:0b:91:70 Retransmit failure for EAPOL-Key M5 to mobile 3c:a9:f4:0b:91:70, retransmit count 3, mscb deauth count 0
    *dot1xMsgTask: Feb 04 08:01:27.104: 3c:a9:f4:0b:91:70 Resetting MSCB PMK Cache Entry 0 for station 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Removing BSSID 00:26:cb:4c:89:d1 from PMKID cache of station 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Setting active key cache index 0 ---> 8
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Sent Deauthenticate to mobile on BSSID 00:26:cb:4c:89:d0 slot 0(caller 1x_ptsm.c:598)
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Setting active key cache index 8 ---> 8
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Deleting the PMK cache when de-authenticating the client.
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Global PMK Cache deletion failed.
    *dot1xMsgTask: Feb 04 08:01:27.106: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 57) in 10 seconds
    *dot1xMsgTask: Feb 04 08:01:27.106: 3c:a9:f4:0b:91:70 Freeing EAP Retransmit Bufer for mobile 3c:a9:f4:0b:91:70
    *osapiBsnTimer: Feb 04 08:01:37.105: 3c:a9:f4:0b:91:70 apfMsExpireCallback (apf_ms.c:626) Expiring Mobile!
    *apfReceiveTask: Feb 04 08:01:37.105: 3c:a9:f4:0b:91:70 apfMsExpireMobileStation (apf_ms.c:6655) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Associated to Disassociated
    *apfReceiveTask: Feb 04 08:01:37.105: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
    *osapiBsnTimer: Feb 04 08:01:47.105: 3c:a9:f4:0b:91:70 apfMsExpireCallback (apf_ms.c:626) Expiring Mobile!
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Sent Deauthenticate to mobile on BSSID 00:26:cb:4c:89:d0 slot 0(caller apf_ms.c:6749)
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Setting active key cache index 8 ---> 8
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Deleting the PMK cache when de-authenticating the client.
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Global PMK Cache deletion failed.
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 apfMsAssoStateDec
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 apfMsExpireMobileStation (apf_ms.c:6787) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Disassociated to Idle
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 47) in 10 seconds
    *osapiBsnTimer: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 apfMsExpireCallback (apf_ms.c:626) Expiring Mobile!
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 10.10.1.130 START (0) Deleted mobile LWAPP rule on AP [00:26:cb:4c:89:d0]
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 Username entry deleted for mobile
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 Deleting mobile on AP 00:26:cb:4c:89:d0(0)
    If Layer-2 Auth (PSK) is set to "none" and only Layer-3 Web Auth is kept, then there are no issues. PC can wake up before 8 hours and not prompted for Web Auth again. As a test, I setup the WLAN with Layer-2 PSK auth only with Layer-3 auth set to none. The WLC removed the client entry after 25 minutes. Not an issue for PSK based auth only as PC on wake up seamlessly gets associated to WLAN. 
    Is User Idle Timeout setting not valid when WPA2-PSK is used as the auth method ?
    Thanks, 
    Rick.

    Thanks Scott, The code version is 7.6.130.0 which supports Sleeping Client feature. However, as per the docu "http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-6/configuration-guide/b_cg76/b_cg76_chapter_010111.html#reference_7008E6F7D7094BA7AD39491D7361622D"
    The authentication of sleeping clients feature is not supported with Layer 2 security and web authentication enabled.
    and as you mentioned as well
    ...Sleeping client like George mentioned is a better way than adjusting the idle timer but strictly for layer 3 only...
    Sleeping Client wasn't an option in my case. That is why I was hoping that Idle Timeout may do the trick here. This is an actual case where a client with an existing wireless network just wanted to enable sleeping client feature so that their guests don't need to re-auth if their device sleeps or they go out (break) and come back after some time. Layer-3 Web Auth alone should be enough I think. Keeping L2-PSK is probably their security team's decision, as they also use the same SSID for BYOD devices and don't want nearby people/buildings to see that there is an Open Wifi available and on joining would see the Web Auth portal and company disclaimer. 
    George, I agree with Dot1X method. It can be used for the BYOD devices (separate SSID) while we can keep the Guest WLAN as L3-WebAuth only on controller (or do CWA through ISE if available). 
    Thanks for all your help.
    Rick.

  • PSK Demod.VI doesn't demodulate the enitre message

    I'm attempting to create my own PSK link similar to the PSK Transmitter and Receiver examples shipped with the NI Comm Toolkit.
    Before getting the hardware in the loop, I tried to create a simple transceiver simulation, similar to the MT PSK Transceiver(with FFT Spectrum) found in the simulation examples folder.
    Starting with BPSK, I began by defining my own simple 8-bit message...prepended by a few guard bits, and an 8-bit sync sequence.  No problems there.
    However, after using the PSK Demoduate VI...I notice that not all of my bits are getting demodulated.  In otherwords...it finds the sync location correctly, and starts it's demodulation, but not all of my message bits get demodulated.  It's as if they weren't even there to begin with.
    I looked at the MT PSK Transceiver (with FFT Spectrum) example a little deeper, and found that the same thing happens.  There's a mysterious VI called Align Array that comes after the PSK Demod VI thats chopping the orignal TX message to the length of what gets demodulated, so that the front panel advertises a "See...they're the same!", when in reality, not all of the tx sequence got demodulated.
    Why is this?  I suspect that it has something to do with the filtering...but I thought that this was the purpose of the guard bits...to give the filters something to chew on during the first few samples so that group delay through the filters didn't mess with you signal.  It almost seems as if I need some guard bits at the end of my message as well so that demod of my message bits can continue even after the filters begin to "empty"? 
    Brandon

    Hi Brandon,
    You are correct in thinking that the Align Array VI has something to do with filtering, it is compensating for digital filter delay in the PSK demodulator.  You'll also notice that the Align Array VI doesn't throw away any bits after the first time its ran (when it discards the guard bits).  After this any bits that can't be matched in the present iteration of the loop are matched in the next iteration by storing them up in a shift register.  In this transceiver example, this has to be done this way because there is a direct correlation between the number of symbols the modulator produces and the number of symbols that come out of the demodulator.  In continuous mode with the Modulation Tools, because of the filter, there will always be some symbols that will be delayed going through the filter and will come through the next iteration of the loop.
    Once you go to hardware, you would see a similar issue if you are doing continuous acquisition.  Continuous acquisition is challenging to do because demodulation takes a lot of processing and in general it is difficult to keep up with the VSA's buffer.  Normally, I have seen people do a finite acquisition, making sure that the amount of data acquired is long enough to account for the filter delay and then discarding symbols at the start.  You'll notice that the hardware examples do this by using a subVI called mod_Truncate Filter Transient.
    Regards,
    Craig
    Systems Engineering
    National Instruments

  • HT201412 My ipjone keeps coming up with a message say that the cable or accessory urged in is not a reliable source for this iPhone but I do not have Nything plugged in to my iPhone. I Put it in a bowl of rice for 2 hours to see if that would help it but

    My ipjone keeps coming up with a message say that the cable or accessory urged in is not a reliable source for this iPhone but I do not have Nything plugged in to my iPhone. I Put it in a bowl of rice for 2 hours to see if that would help it but it hasn't. Is there anything thank can do???

    Clean the connector on the bottom of the phone. Use a magnifying glass, bright light, and a wood or plastic toothpick. If you got the phone wet put it in a bag of uncooked rice for several days, not hours.

  • Purchase Order Maintainer is unable to generate reminder / urging message

    Hi all,
    Purchase Order Maintainer is unable to generate reminder / urging message for purchase order.
    In material mater reminder time is set as well in vendor master partner function is set.
    But in ME91F message is coming like "Not possible to generate urging messages for all documents"
    regards,
    Nitin Patil

    Hi,
    The PO output should have been successfully processed before the urgig message to trigger.
    The order generally is
    PO output, urging and then reminders

Maybe you are looking for