SSID WPA/WPA2 PSK Issues

I have a customer who is having issues with one SSID.  He claims that when he changes the PreShared Key, clients that had previously had the old key can connect, and new clients can connect with the new key. 
When the PSK is chaned in the Layer2 section of Security of the WLAN, is the previous key deleted?

clients that had previously had the old key can connect
This is my understanding:
Let say I have PSK "abcdef" and I am able to authenticate and get into the internet.  While I'm connected, let's say some changes the PSK to "asdfed".  So when the key changes, and as long as I am still connected, I don't get kicked out.  This is probably what your customer is looking at.
If I log off and log back in, I won't be able to get back in. 

Similar Messages

  • WPA2 PSK Issues

    Anyone else having WPA2-PSK issues? My MacBook Pro works flawlessly with WEP but when I recently changes my network over to WPA2-PSK it stopped connecting. I have 5 PC's that connect just fine so I know there's nothing wrong with the settings on my WAP. I did some digging and noticed that after I configure the settings for my network in System Preferences and save it; it lists my network as WPA not WPA2. I thought this just might be a gui bug so I pretty much ignored it. Well I'm guessing it's more than that. I found that if I edit my com.apple.airport.preferences.plist and change the WPA reference to WPA2 it will connect to my network. The problem I have is OS X will change it back to WPA and I will lose connection. I've searched and searched forum after forum and I can't find a solution to my problem. I've reinstalled OS X and that didn't fix the issue. I've had to resort to setting up my 802.11a channel with WEP and my 802.11g with WPA2-PSK. I really want to dump the old WEP key since I now have neighbors within my wireless range.
    My router is a Netgear WGR614v2 (no laughing please). Anyone have any suggestion (besides buy a new router)?

    I'm new to the Mac world (have linux experience) so I could be wrong on this but isn't the Airport Utility only for configuring Apple's Airport WAP's? I don't think that would do me any good since I'm connected to a third party WAP. Am I wrong?

  • WPA/WPA2 PSK NOT SUPPORTED?

    I'm trying to join a router with WPA/WPA2 PSK, but for some reason NONE of my iOS devices will join it. Not my iPad 3, nor iPhone 5S, all running iOS 8.1.1.
    My MacBook Pro running Yosemite has no problem connecting. So does iOS 8, nor iPhones and iPads support this recommended security standard? Or is there a trick to it I'm not getting?

    Restart the router & also check for a firmware update for it.
    If neither of those helps, try temporarily removing the password from the router to see if your iOS devices will connect.
    ~Lyssa

  • Issue connecting touchpad to WPA2 PSK network

    I have an issue connecting my touchpad to any WPA2 PSK networks. The SSID is broadcast and other devices can connect but the touchpad errors with "unable to associate" even though I typed in the correct password. Any help is appreciated, and no I do not want to change the network settings since this device is supposed to utilize WPA2.
    Post relates to: HP TouchPad (WiFi)

    Hi Terabyte,
    I don't mean to take over deltatuks thread but as we are having the same issue i'll continue!
    I have power cycled the router and turned off/on the wireless on the device. I've just ran the tests and they all passed! including wifi! lol.
    Still not working though.
    This is very strange

  • WPA/WPA2 issue

    Hello there,
    My issue:
    Authetification mode with WPA/WPA2 personnal mode with PSK it seem not able.
    In the logs of my AP, i see:
    "A STA is rejected by 802.1x daemon "
    My PSK is similar to: !Password@1234
    *The WEP authetification (64/128) works fine*.
    Configuration:
    Itouch with FW 3.1.2
    AP DLink DAP-1160 with FW1 1.30
    No MAC filtering
    I see in other forum many issues with the 802.1x authetification. How to resolve this issue, does the Itouch works fine only in the WEP mode?
    There is a limitation with the PSK?
    Thanks
    Gilles

    Try the following step:
    # Open up the browser and on the address bar type 192.168.1.1 that will open up the Router setup page.
    # Then go to the Wireless tab, keep network mode as mixed,
     For Channel Settings of 2.4 GHz you can make Channel Width to 20 MHz only and Channel to 6, 9, 11..
     For Channel Settings of 5 GHz you can make Channel Width to 20 MHz only and Channel to 40 or 161...
    Then check the connectivity status..

  • Wga54g connecting to sony blu ray using WPA-PSK (TKIP) or WPA2-PSK (AES)

    My Wga54g is to be the interenet source to my sony blu ray player. I have a wireless broadband router modem setup that uses WPA-PSK (TKIP) and WPA2-PSK (AES). How do I configure everything to work? Since the WGA54G only does WEP is there a way to configure it or the Sony Blu ray to get a internet signal to it? The sony seems to have a automatic IP or manual IP configuration setting option.  I suppose I can step down to WEP on the router settings but I'd rather not. I tried that and couldn't get it to work regardless. Please help!

    To connect the Wireless-G Game adapter to a wireless network, please determine your SSID, Wireless Security and/or Network Key. Second you need to lower down the security mode to WEP, since WGA54G do not have any other security mode. Here is the link for connecting the Wireless Network using a WGA54G: http://www6.nohold.net/Cisco2/ukp.aspx?pid=93&login=1&vw=1&app=search&articleid=4558&userrole=Linksy...

  • Newbie adding Comcast wireless: WPA2-PSK (AES) or WPA-TKIP?

    I have an old (but still great!) 1.25 GHz PowerPC G4, runnig Mac OS X 10.5.8.  I also have a 3G iPhone (iOS 4.2.1).  (Both are the most current OS for those devices.)   In the next 6 months I'll be upgrading both of these devices, but I need to install my router now, with the older equipment/software.
    I am very, very new to wireless technology, so I am aware I know nothing about this.  I find that the support at Comcast isn't very Mac-savvy (especially working with my older device).
    I have a new "Gateway" ARRIS modem/router to set up.  My questions:
    1 -- Encryption Method - do I choose WPA2-PSK (AES) or WPA-TKIP?
    2 -- Are there any settings on my Mac (or iPhone) that I need to know about, in order to be sure the wireless network functions properly and securely?
    My thanks to all of you!

    1. At the noment your G4 isn't capable of running  WPA, the only thing you can run is WEP, but change that as soon as you get your new Mac.
    2. You ned to go to Settings>wi-fi and enter the details of your setup, name, password, smtp etc etc.

  • Found iPad 2 solution for WPA-PSK and WPA2-PSK

    My security setting is WPA-PSK/WPA2-PSK on my modem/wirless router with Time Warner Cable. IPad does not have an option to select this security setting when attempting to connect to a WiFi network. I could connect my iPad by WiFi on some ocassions (selecting WPA or WEP on the iPad). However, I would lose connection after about 5-10 minutes.  I have been having this problem for about 3 months. I spent a couple of hours on the phone yesterday with Time Warner and we think we "stumbled across" the fix (instead of actually knowing we found it).  The tech noticed that the setup on the Time Warner modem/wireless router had the box for Active WPS checked. After the Time Warner tech unchecked Active WPS within the router's setup, the iPad starting picking up the WiFi signal. The iPad has now functioned for a full 24 hours without a problem or shutdown!
    Please alert your techs and post this info on your website. When I talked with Apple techs in the past, they had no known solution to this situation and said that Apple simply did not support WPA-PSK or WPA2-PSK. The Time Warner tech also said that "he thinks" (but isn't sure) Apple's designation of WPA Enterprise equates to what others call the "old WPA" (or simply WPA) and what Apple calls WPA, others actually refer to as WPA-PSK (the newer WPA).

    Hope you found a solution before now, but if not, try this:
    Go into Settings, click on Wi-Fi and pick "Other" in the Network section.
    Type your Network name in the name field (Caps do seem to matter), click on security and check WPA2.
    Click the "Other Network" button to go back, input your password, click "Join".
    You should now be good to go.

  • WPA,WPA2,WPA-PSK support T43,T60,T61?

    Hello
    I got more than 1000 notebook mix with T43,T60 and T61 in my company.Are all this notebook moel support the WPA2 for the network wireless?

    my father has a T23 that i've installed an a/b/g card capable of WPA2-PSK.   again, support is determined by the card, not the computer.   the T43 will certainly support all of the standards mentioned above.
    thinkpad parts information can be found in the hardware maintenance manuals.   you'll have to search google for the various wireless card FRU numbers to determine their capabilities.   but, as i said above, every card i've seen from 2005 and newer have had support for WPA2-PSK at a minimum.
    ThinkStation C20
    ThinkPad X1C · X220 · X60T · s30 · 600

  • WLAN User Idle Timeout and WPA2-PSK authentication

    Hi,
    There is a WLAN for Guest users with Session Timeout of 65535 sec and User Idle Timeout of 28800 sec. The WLAN uses PSK as Layer-2 authentication and Web Auth as Layer-3 authentication. Authentication source is locally created users on the controllers (LocalEAP) - can be RADIUS through ISE as well. 
    (Cisco Controller) show>sysinfo
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.6.130.0
    RTOS Version..................................... 7.6.130.0
    Bootloader Version............................... 7.6.130.0
    Emergency Image Version.......................... 7.6.130.0
    Build Type....................................... DATA + WPS
    System Name...................................... vwlc-1
    System Location.................................. Matrix
    System Contact................................... IT HelpDesk Matrix
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
    IP Address....................................... 10.10.10.50
    System Up Time................................... 6 days 17 hrs 30 mins 26 secs
    System Timezone Location......................... (GMT+10:00) Sydney, Melbourne, Canberra
    System Stats Realtime Interval................... 5
    System Stats Normal Interval..................... 180
    Configured Country............................... AU - Australia
    --More-- or (q)uit
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 2
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ 00:0C:29:74:15:2F
    Maximum number of APs supported.................. 200
    (Cisco Controller) show> wlan 2
    WLAN Identifier.................................. 2
    Profile Name..................................... Matrix-LocalEAP
    Network Name (SSID).............................. Matrix-LocalEAP
    Status........................................... Enabled
    MAC Filtering.................................... Disabled
    Broadcast SSID................................... Enabled
    AAA Policy Override.............................. Disabled
    Network Admission Control
    Client Profiling Status
    Radius Profiling ............................ Disabled
    DHCP ....................................... Disabled
    HTTP ....................................... Disabled
    Local Profiling ............................. Disabled
    DHCP ....................................... Disabled
    HTTP ....................................... Disabled
    Radius-NAC State............................... Disabled
    SNMP-NAC State................................. Disabled
    Quarantine VLAN................................ 0
    Maximum number of Associated Clients............. 0
    Maximum number of Clients per AP Radio........... 200
    Number of Active Clients......................... 0
    Exclusionlist Timeout............................ 60 seconds
    Session Timeout.................................. 65535 seconds
    User Idle Timeout................................ 28800 seconds
    Sleep Client..................................... disable
    Sleep Client Timeout............................. 12 hours
    User Idle Threshold.............................. 0 Bytes
    NAS-identifier................................... vwlc-1
    CHD per WLAN..................................... Enabled
    Webauth DHCP exclusion........................... Disabled
    Interface........................................ management
    Multicast Interface.............................. Not Configured
    WLAN IPv4 ACL.................................... unconfigured
    WLAN IPv6 ACL.................................... unconfigured
    WLAN Layer2 ACL.................................. unconfigured
    mDNS Status...................................... Disabled
    mDNS Profile Name................................ unconfigured
    DHCP Server...................................... Default
    DHCP Address Assignment Required................. Enabled
    Static IP client tunneling....................... Disabled
    Quality of Service............................... Silver
    Per-SSID Rate Limits............................. Upstream Downstream
    Average Data Rate................................ 0 0
    Average Realtime Data Rate....................... 0 0
    Burst Data Rate.................................. 0 0
    Burst Realtime Data Rate......................... 0 0
    Per-Client Rate Limits........................... Upstream Downstream
    Average Data Rate................................ 0 0
    Average Realtime Data Rate....................... 0 0
    Burst Data Rate.................................. 0 0
    Burst Realtime Data Rate......................... 0 0
    Scan Defer Priority.............................. 4,5,6
    Scan Defer Time.................................. 100 milliseconds
    WMM.............................................. Allowed
    WMM UAPSD Compliant Client Support............... Disabled
    Media Stream Multicast-direct.................... Disabled
    CCX - AironetIe Support.......................... Enabled
    CCX - Gratuitous ProbeResponse (GPR)............. Disabled
    CCX - Diagnostics Channel Capability............. Disabled
    Dot11-Phone Mode (7920).......................... Disabled
    Wired Protocol................................... 802.1P (Tag=2)
    Passive Client Feature........................... Disabled
    Peer-to-Peer Blocking Action..................... Disabled
    Radio Policy..................................... All
    DTIM period for 802.11a radio.................... 1
    DTIM period for 802.11b radio.................... 1
    Radius Servers
    Authentication................................ 10.10.10.70 1812
    Accounting.................................... 10.10.10.70 1813
    Interim Update............................. Disabled
    Framed IPv6 Acct AVP ...................... Prefix
    Dynamic Interface............................. Disabled
    Dynamic Interface Priority.................... wlan
    Local EAP Authentication......................... Enabled (Profile 'local-eap-matrix')
    Security
    802.11 Authentication:........................ Open System
    FT Support.................................... Disabled
    Static WEP Keys............................... Disabled
    802.1X........................................ Disabled
    Wi-Fi Protected Access (WPA/WPA2)............. Enabled
    WPA (SSN IE)............................... Disabled
    WPA2 (RSN IE).............................. Enabled
    TKIP Cipher............................. Disabled
    AES Cipher.............................. Enabled
    Auth Key Management
    802.1x.................................. Disabled
    PSK..................................... Enabled
    CCKM.................................... Disabled
    FT-1X(802.11r).......................... Disabled
    FT-PSK(802.11r)......................... Disabled
    PMF-1X(802.11w)......................... Disabled
    PMF-PSK(802.11w)........................ Disabled
    FT Reassociation Timeout................... 20
    FT Over-The-DS mode........................ Disabled
    GTK Randomization.......................... Disabled
    SKC Cache Support.......................... Disabled
    CCKM TSF Tolerance......................... 1000
    WAPI.......................................... Disabled
    Wi-Fi Direct policy configured................ Disabled
    EAP-Passthrough............................... Disabled
    CKIP ......................................... Disabled
    Web Based Authentication...................... Enabled
    IPv4 ACL........................................ Unconfigured
    IPv6 ACL........................................ Unconfigured
    Web-Auth Flex ACL............................... Unconfigured
    Web Authentication server precedence:
    1............................................... local
    2............................................... radius
    3............................................... ldap
    Web-Passthrough............................... Disabled
    Conditional Web Redirect...................... Disabled
    Splash-Page Web Redirect...................... Disabled
    Auto Anchor................................... Disabled
    FlexConnect Local Switching................... Enabled
    flexconnect Central Dhcp Flag................. Disabled
    flexconnect nat-pat Flag...................... Disabled
    flexconnect Dns Override Flag................. Disabled
    flexconnect PPPoE pass-through................ Disabled
    flexconnect local-switching IP-source-guar.... Disabled
    FlexConnect Vlan based Central Switching ..... Disabled
    FlexConnect Local Authentication.............. Disabled
    FlexConnect Learn IP Address.................. Enabled
    Client MFP.................................... Optional
    PMF........................................... Disabled
    PMF Association Comeback Time................. 1
    PMF SA Query RetryTimeout..................... 200
    Tkip MIC Countermeasure Hold-down Timer....... 60
    Eap-params.................................... Disabled
    AVC Visibilty.................................... Disabled
    AVC Profile Name................................. None
    Flow Monitor Name................................ None
    Split Tunnel (Printers).......................... Disabled
    Call Snooping.................................... Disabled
    Roamed Call Re-Anchor Policy..................... Disabled
    SIP CAC Fail Send-486-Busy Policy................ Enabled
    SIP CAC Fail Send Dis-Association Policy......... Disabled
    KTS based CAC Policy............................. Disabled
    Assisted Roaming Prediction Optimization......... Disabled
    802.11k Neighbor List............................ Disabled
    802.11k Neighbor List Dual Band.................. Disabled
    Band Select...................................... Disabled
    Load Balancing................................... Disabled
    Multicast Buffer................................. Disabled
    Mobility Anchor List
    WLAN ID IP Address Status
    802.11u........................................ Disabled
    MSAP Services.................................. Disabled
    Local Policy
    Priority Policy Name
    The wireless user on joining the WLAN enters the PSK and than gets redirected to WLC Web Auth portal for authentication. On successful login, the user is granted access. The issue is that despite Idle Timeout being 28800 sec (8 hours), the WLC removes the client entry before 8 hours if the device goes to sleep - mostly within the first hour. Tested this on Windows 7 notebook multiple times. When the PC is put to sleep, the WLC loses its record after some time. When PC wakes up, it has to undergo Web Auth again. Debugging the client MAC generates these logs - from initial association to final clearing.
    (Cisco Controller) >*apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Association received from mobile on BSSID 00:26:cb:4c:89:d1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Global 200 Clients are allowed to AP radio
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Max Client Trap Threshold: 0 cur: 1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Rf profile 600 Clients are allowed to AP wlan
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 override for default ap group, marking intgrp NULL
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Applying Interface policy on Mobile, role Local. Ms NAC State 2 Quarantine Vlan 0 Access Vlan 10
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Re-applying interface policy for client
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Changing IPv4 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2219)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Changing IPv6 ACL 'none' (ACL ID 255) ===> 'none' (ACL ID 255) --- (caller apf_policy.c:2240)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 apfApplyWlanPolicy: Apply WLAN Policy over PMIPv6 Client Mobility Type
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 In processSsidIE:4850 setting Central switched to FALSE
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Applying site-specific Local Bridging override for station 3c:a9:f4:0b:91:70 - vapId 2, site 'default-group', interface 'management'
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Applying Local Bridging Interface Policy for station 3c:a9:f4:0b:91:70 - vlan 10, interface id 0, interface 'management'
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 processSsidIE statusCode is 0 and status is 0
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 processSsidIE ssid_done_flag is 0 finish_flag is 0
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 STA - rates (6): 152 36 176 72 96 108 0 0 0 0 0 0 0 0 0 0
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 suppRates statusCode is 0 and gotSuppRatesElement is 1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Processing RSN IE type 48, length 22 for mobile 3c:a9:f4:0b:91:70
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 AID 1 in Assoc Req from flex AP 00:26:cb:4c:89:d0 is same as in mscb 3c:a9:f4:0b:91:70
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 apfMs1xStateDec
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Change state to START (0) last state WEBAUTH_REQD (8)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 pemApfAddMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 START (0) Initializing policy
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 START (0) Change state to AUTHCHECK (2) last state START (0)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 AUTHCHECK (2) Change state to 8021X_REQD (3) last state AUTHCHECK (2)
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Encryption policy is set to 0x80000001
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Central switch is FALSE
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Sending Local Switch flag = 1
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 8021X_REQD (3) DHCP Not required on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2for this client
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 Not Using WMM Compliance code qosCap 00
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 10.10.1.130 8021X_REQD (3) Plumbed mobile LWAPP rule on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2 flex-acl-name:
    *apfMsConnTask_0: Feb 04 07:48:10.562: 3c:a9:f4:0b:91:70 apfPemAddUser2 (apf_policy.c:333) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Associated to Associated
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 apfPemAddUser2:session timeout forstation 3c:a9:f4:0b:91:70 - Session Tout 65535, apfMsTimeOut '65535' and sessionTimerRunning flag is 0
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 49) in 65535 seconds
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 Func: apfPemAddUser2, Ms Timeout = 65535, Session Timeout = 65535
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 Sending Assoc Response to station on BSSID 00:26:cb:4c:89:d1 (status 0) ApVapId 2 Slot 0
    *apfMsConnTask_0: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 apfProcessAssocReq (apf_80211.c:8294) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Associated to Associated
    *pemReceiveTask: Feb 04 07:48:10.563: 3c:a9:f4:0b:91:70 10.10.1.130 Removed NPU entry.
    *spamApTask7: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Sent 1x initiate message to multi thread task for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Creating a PKC PMKID Cache entry for station 3c:a9:f4:0b:91:70 (RSN 2)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Resetting MSCB PMK Cache Entry 0 for station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Removing BSSID 00:26:cb:4c:89:d1 from PMKID cache of station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Setting active key cache index 0 ---> 8
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Setting active key cache index 8 ---> 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Adding BSSID 00:26:cb:4c:89:d1 to PMKID cache at index 0 for station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: New PMKID: (16)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: [0000] 67 67 8f 7d 2a 8d 78 f9 6d 29 c7 74 d2 fd 6a 25
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Initiating RSN PSK to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 EAP-PARAM Debug - eap-params for Wlan-Id :2 is disabled - applying Global eap timers and retries
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 dot1x - moving mobile 3c:a9:f4:0b:91:70 into Force Auth state
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Skipping EAP-Success to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 EAPOL Header:
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 00000000: 02 03 5f 00 .._.
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Found an cache entry for BSSID 00:26:cb:4c:89:d1 in PMKID cache at index 0 of station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Found an cache entry for BSSID 00:26:cb:4c:89:d1 in PMKID cache at index 0 of station 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: Including PMKID in M1 (16)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: [0000] 67 67 8f 7d 2a 8d 78 f9 6d 29 c7 74 d2 fd 6a 25
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Starting key exchange to mobile 3c:a9:f4:0b:91:70, data packets will be dropped
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state INITPMK (message 1), replay counter 00.00.00.00.00.00.00.00
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 Allocating EAP Pkt for retransmission to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 0 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.566: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.567: 3c:a9:f4:0b:91:70 Received EAPOL-Key from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Received EAPOL-key in PTK_START state (message 2) from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Stopping retransmission timer for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 EAPOL Header:
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 00000000: 02 03 5f 00 .._.
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITNEGOTIATING (message 3), replay counter 00.00.00.00.00.00.00.01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 Reusing allocated memory for EAP Pkt for retransmission to mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 0 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.568: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Received EAPOL-Key from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Ignoring invalid EAPOL version (1) in EAPOL-key message from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Received EAPOL-key in PTKINITNEGOTIATING state (message 4) from mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Stopping retransmission timer for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Freeing EAP Retransmit Bufer for mobile 3c:a9:f4:0b:91:70
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 apfMs1xStateInc
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 8021X_REQD (3) Change state to L2AUTHCOMPLETE (4) last state 8021X_REQD (3)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Central switch is FALSE
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Sending the Central Auth Info
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Central Auth Info Allocated PMKLen = 32
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: EapolReplayCounter: 00 00 00 00 00 00 00 01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: EapolReplayCounter: 00 00 00 00 00 00 00 01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 PMK: pmkActiveIndex = 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 EapolReplayCounter: 00 00 00 00 00 00 00 01
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 msAssocTypeFlagsMsb = 0 msAssocTypeFlagsLsb = 2
    apfMsEntryType = 0 apfMsEapType = 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Sending Local Switch flag = 1
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 L2AUTHCOMPLETE (4) DHCP Not required on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2for this client
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 Not Using WMM Compliance code qosCap 00
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:26:cb:4c:89:d0 vapId 2 apVapId 2 flex-acl-name:
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 L2AUTHCOMPLETE (4) Change state to WEBAUTH_REQD (8) last state L2AUTHCOMPLETE (4)
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) pemAdvanceState2 6236, Adding TMP rule
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Adding Fast Path rule
    type = Airespace AP Client - ACL passthru
    on AP 00:26:cb:4c:89:d0, slot 0, interface = 1, QOS = 0
    IPv4 ACL ID
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Fast Path rule (contd...) 802.1P = 2, DSCP = 0, TokenID = 64206 Local Bridging Vlan = 10, Local Bridging intf id = 0
    *Dot1x_NW_MsgTask_0: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
    *spamApTask7: Feb 04 07:48:10.569: 3c:a9:f4:0b:91:70 spamEncodeCentralAuthInoMsPayload: msAssocTypeFlagsMsb = 0 msAssocTypeFlagsLsb = 2
    apfMsEntryType = 0 pmkLen = 32
    *pemReceiveTask: Feb 04 07:48:10.570: 3c:a9:f4:0b:91:70 10.10.1.130 Added NPU entry of type 2, dtlFlags 0x0
    *pemReceiveTask: Feb 04 07:48:10.570: 3c:a9:f4:0b:91:70 Pushing IPv6: fe80:0000:0000:0000:c915:4a8e:6d1a:e20d , and MAC: 3C:A9:F4:0B:91:70 , Binding to Data Plane. SUCCESS !!
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP received op BOOTREPLY (2) (len 308,vlan 10, port 1, encap 0xec03)
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP processing DHCP ACK (5)
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP op: BOOTREPLY, htype: Ethernet, hlen: 6, hops: 0
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP xid: 0xcce207f6 (3437365238), secs: 0, flags: 0
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP chaddr: 3c:a9:f4:0b:91:70
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP ciaddr: 0.0.0.0, yiaddr: 10.10.1.130
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP siaddr: 0.0.0.0, giaddr: 0.0.0.0
    *DHCP Socket Task: Feb 04 07:48:10.589: 3c:a9:f4:0b:91:70 DHCP server id: 10.10.1.20 rcvd server id: 10.10.1.20
    *SNMPTask: Feb 04 07:48:16.594: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:48:16.594: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:48:16.595: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:48:16.595: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *ewmwebWebauth1: Feb 04 07:48:31.129: 3c:a9:f4:0b:91:70 Username entry (local1) created for mobile, length = 6
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 Username entry (local1) created in mscb for mobile, length = 6
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_REQD (8) Change state to WEBAUTH_NOL3SEC (14) last state WEBAUTH_REQD (8)
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 apfMsRunStateInc
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 10.10.1.130 WEBAUTH_NOL3SEC (14) Change state to RUN (20) last state WEBAUTH_NOL3SEC (14)
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 Session Timeout is 65535 - starting session timer for the mobile
    *ewmwebWebauth1: Feb 04 07:48:31.130: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Reached PLUMBFASTPATH: from line 6571
    *ewmwebWebauth1: Feb 04 07:48:31.131: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Replacing Fast Path rule
    type = Airespace AP Client
    on AP 00:26:cb:4c:89:d0, slot 0, interface = 1, QOS = 0
    IPv4 ACL ID = 255, IPv6 ACL ID =
    *ewmwebWebauth1: Feb 04 07:48:31.131: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Fast Path rule (contd...) 802.1P = 2, DSCP = 0, TokenID = 64206 Local Bridging Vlan = 10, Local Bridging intf id = 0
    *ewmwebWebauth1: Feb 04 07:48:31.131: 3c:a9:f4:0b:91:70 10.10.1.130 RUN (20) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255)
    *pemReceiveTask: Feb 04 07:48:31.132: 3c:a9:f4:0b:91:70 10.10.1.130 Added NPU entry of type 1, dtlFlags 0x0
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >
    (Cisco Controller) >*pemReceiveTask: Feb 04 07:48:31.132: 3c:a9:f4:0b:91:70 Pushing IPv6: fe80:0000:0000:0000:c915:4a8e:6d1a:e20d , and MAC: 3C:A9:F4:0B:91:70 , Binding to Data Plane. SUCCESS !!
    *emWeb: Feb 04 07:49:14.120: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *emWeb: Feb 04 07:49:14.120: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *emWeb: Feb 04 07:49:14.120: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.646: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.646: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.662: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.662: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.663: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:51:19.663: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *IPv6_Msg_Task: Feb 04 07:53:35.661: 3c:a9:f4:0b:91:70 Link Local address fe80::c915:4a8e:6d1a:e20d updated to mscb. Not Advancing pem state.Current state: mscb in apfMsMmInitial mobility state and client state APF_MS_STATE_A
    *dot1xMsgTask: Feb 04 07:54:26.664: GTK Rotation Kicked in for AP: 00:26:cb:4c:89:d0 SlotId = 1 - (0x47440ef0)
    *dot1xMsgTask: Feb 04 07:54:26.665: Generated a new group key for AP 00:26:cb:4c:89:d0(1) - vap 1
    *dot1xMsgTask: Feb 04 07:54:26.665: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *dot1xMsgTask: Feb 04 07:54:26.665: Generated a new group key for AP 00:26:cb:4c:89:d0(1) - vap 2
    *dot1xMsgTask: Feb 04 07:54:26.665: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *SNMPTask: Feb 04 07:56:19.689: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 07:56:19.689: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 08:01:19.730: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *SNMPTask: Feb 04 08:01:19.730: 3c:a9:f4:0b:91:70 Central Switch = FALSE
    *dot1xMsgTask: Feb 04 08:01:23.904: GTK Rotation Kicked in for AP: 00:26:cb:4c:89:d0 SlotId = 0 - (0x47440ef0)
    *dot1xMsgTask: Feb 04 08:01:23.904: Generated a new group key for AP 00:26:cb:4c:89:d0(0) - vap 1
    *dot1xMsgTask: Feb 04 08:01:23.905: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *dot1xMsgTask: Feb 04 08:01:23.905: Generated a new group key for AP 00:26:cb:4c:89:d0(0) - vap 2
    *dot1xMsgTask: Feb 04 08:01:23.905: GTK rotation for 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:23.905: 3c:a9:f4:0b:91:70 EAPOL Header:
    *dot1xMsgTask: Feb 04 08:01:23.905: 00000000: 02 03 5f 00 .._.
    *dot1xMsgTask: Feb 04 08:01:23.905: 3c:a9:f4:0b:91:70 Key exchange done, data packets from mobile 3c:a9:f4:0b:91:70 should be forwarded shortly
    *dot1xMsgTask: Feb 04 08:01:23.905: 3c:a9:f4:0b:91:70 Key exchange done, data packets from mobile 3c:a9:f4:0b:91:70 should be forwarded shortly
    *dot1xMsgTask: Feb 04 08:01:23.906: Confirmation Key: (16)
    *dot1xMsgTask: Feb 04 08:01:23.906: [0000] fa a3 68 28 46 1f 49 18 a0 60 7a 92 c4 f5 64 3d
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 Sending EAPOL-Key Message to mobile 3c:a9:f4:0b:91:70
    state PTKINITDONE (message 5 - group), replay counter 00.00.00.00.00.00.00.02
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 Allocating EAP Pkt for retransmission to mobile 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *dot1xMsgTask: Feb 04 08:01:23.906: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 1 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 Updated broadcast key sent to mobile 3C:A9:F4:0B:91:70
    *dot1xMsgTask: Feb 04 08:01:23.907: 3c:a9:f4:0b:91:70 Updated broadcast key sent to mobile 3C:A9:F4:0B:91:70
    *dot1xMsgTask: Feb 04 08:01:23.907: Sending of M5 for 00:26:cb:4c:89:d0 is Skipped, rc = 1
    *osapiBsnTimer: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 802.1x 'timeoutEvt' Timer expired for station 3c:a9:f4:0b:91:70 and for message = M5
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 Retransmit 1 of EAPOL-Key M5 (length 131) for mobile 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 1 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *dot1xMsgTask: Feb 04 08:01:25.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *osapiBsnTimer: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 802.1x 'timeoutEvt' Timer expired for station 3c:a9:f4:0b:91:70 and for message = M5
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 Retransmit 2 of EAPOL-Key M5 (length 131) for mobile 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappLradNhMac = 00:0c:29:e4:e9:6a mscb->apfMsLradSlotId = 0 mscb->apfMsLradJumbo = 0 mscb->apfMsintIfNum = 1
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 mscb->apfMsBssid = 00:26:cb:4c:89:d0 mscb->apfMsAddress = 3c:a9:f4:0b:91:70 mscb->apfMsApVapId = 2
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 dot1xcb->snapOrg = 00 00 00 dot1xcb->eapolWepBit = 1 mscb->apfMsLwappLradVlanId = 10 mscb->apfMsLwappMwarInet.ipv4.addr = 168430130
    *dot1xMsgTask: Feb 04 08:01:26.104: 3c:a9:f4:0b:91:70 mscb->apfMsLwappMwarPort = 5246 mscb->apfMsLwappLradInet.ipv4.addr = 168427904 mscb->apfMsLwappLradPort = 41879
    *osapiBsnTimer: Feb 04 08:01:27.104: 3c:a9:f4:0b:91:70 802.1x 'timeoutEvt' Timer expired for station 3c:a9:f4:0b:91:70 and for message = M5
    *dot1xMsgTask: Feb 04 08:01:27.104: 3c:a9:f4:0b:91:70 Retransmit failure for EAPOL-Key M5 to mobile 3c:a9:f4:0b:91:70, retransmit count 3, mscb deauth count 0
    *dot1xMsgTask: Feb 04 08:01:27.104: 3c:a9:f4:0b:91:70 Resetting MSCB PMK Cache Entry 0 for station 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Removing BSSID 00:26:cb:4c:89:d1 from PMKID cache of station 3c:a9:f4:0b:91:70
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Setting active key cache index 0 ---> 8
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Sent Deauthenticate to mobile on BSSID 00:26:cb:4c:89:d0 slot 0(caller 1x_ptsm.c:598)
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Setting active key cache index 8 ---> 8
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Deleting the PMK cache when de-authenticating the client.
    *dot1xMsgTask: Feb 04 08:01:27.105: 3c:a9:f4:0b:91:70 Global PMK Cache deletion failed.
    *dot1xMsgTask: Feb 04 08:01:27.106: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 57) in 10 seconds
    *dot1xMsgTask: Feb 04 08:01:27.106: 3c:a9:f4:0b:91:70 Freeing EAP Retransmit Bufer for mobile 3c:a9:f4:0b:91:70
    *osapiBsnTimer: Feb 04 08:01:37.105: 3c:a9:f4:0b:91:70 apfMsExpireCallback (apf_ms.c:626) Expiring Mobile!
    *apfReceiveTask: Feb 04 08:01:37.105: 3c:a9:f4:0b:91:70 apfMsExpireMobileStation (apf_ms.c:6655) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Associated to Disassociated
    *apfReceiveTask: Feb 04 08:01:37.105: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 45) in 10 seconds
    *osapiBsnTimer: Feb 04 08:01:47.105: 3c:a9:f4:0b:91:70 apfMsExpireCallback (apf_ms.c:626) Expiring Mobile!
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Sent Deauthenticate to mobile on BSSID 00:26:cb:4c:89:d0 slot 0(caller apf_ms.c:6749)
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Setting active key cache index 8 ---> 8
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Deleting the PMK cache when de-authenticating the client.
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Global PMK Cache deletion failed.
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 apfMsAssoStateDec
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 apfMsExpireMobileStation (apf_ms.c:6787) Changing state for mobile 3c:a9:f4:0b:91:70 on AP 00:26:cb:4c:89:d0 from Disassociated to Idle
    *apfReceiveTask: Feb 04 08:01:47.106: 3c:a9:f4:0b:91:70 Scheduling deletion of Mobile Station: (callerId: 47) in 10 seconds
    *osapiBsnTimer: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 apfMsExpireCallback (apf_ms.c:626) Expiring Mobile!
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 pemApfDeleteMobileStation2: APF_MS_PEM_WAIT_L2_AUTH_COMPLETE = 0.
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 10.10.1.130 START (0) Deleted mobile LWAPP rule on AP [00:26:cb:4c:89:d0]
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 Username entry deleted for mobile
    *apfReceiveTask: Feb 04 08:01:57.106: 3c:a9:f4:0b:91:70 Deleting mobile on AP 00:26:cb:4c:89:d0(0)
    If Layer-2 Auth (PSK) is set to "none" and only Layer-3 Web Auth is kept, then there are no issues. PC can wake up before 8 hours and not prompted for Web Auth again. As a test, I setup the WLAN with Layer-2 PSK auth only with Layer-3 auth set to none. The WLC removed the client entry after 25 minutes. Not an issue for PSK based auth only as PC on wake up seamlessly gets associated to WLAN. 
    Is User Idle Timeout setting not valid when WPA2-PSK is used as the auth method ?
    Thanks, 
    Rick.

    Thanks Scott, The code version is 7.6.130.0 which supports Sleeping Client feature. However, as per the docu "http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-6/configuration-guide/b_cg76/b_cg76_chapter_010111.html#reference_7008E6F7D7094BA7AD39491D7361622D"
    The authentication of sleeping clients feature is not supported with Layer 2 security and web authentication enabled.
    and as you mentioned as well
    ...Sleeping client like George mentioned is a better way than adjusting the idle timer but strictly for layer 3 only...
    Sleeping Client wasn't an option in my case. That is why I was hoping that Idle Timeout may do the trick here. This is an actual case where a client with an existing wireless network just wanted to enable sleeping client feature so that their guests don't need to re-auth if their device sleeps or they go out (break) and come back after some time. Layer-3 Web Auth alone should be enough I think. Keeping L2-PSK is probably their security team's decision, as they also use the same SSID for BYOD devices and don't want nearby people/buildings to see that there is an Open Wifi available and on joining would see the Web Auth portal and company disclaimer. 
    George, I agree with Dot1X method. It can be used for the BYOD devices (separate SSID) while we can keep the Guest WLAN as L3-WebAuth only on controller (or do CWA through ISE if available). 
    Thanks for all your help.
    Rick.

  • WPA2 CCMP issues with netcfg 2.8.3

    I'm on a machine with RT2860 network interface, however because networkmanager kept dropping the connection and made it roughly 5x slower than on any other OS, I decided to move to netcfg.  After setting up the profile the way that arch wiki suggested, I kept getting an error from netcfg saying that "Authentication/Association failed".  Did I do something wrong with my configuration?  My router says WPA2-PSK security with AES (So I assume CCMP keypairing).  I suspect that the problem could be from my configuration, So I have included my rc.conf Daemon line, my network profile for netcfg, and the network block from wpa_supplicant.conf.
    DAEMONS=(hwclock syslog-ng dbus slim !networkmanager @net-profiles @net-auto-wireless netfs crond)
    Network Profile:
    CONNECTION="wireless"
    DESCRIPTION="Automatically generated profile"
    INTERFACE=ra0
    HOSTNAME=Arch
    IP="dhcp"
    DHCP_TIMEOUT=10
    ESSID="networkname"
    SECURITY="WPA-CONFIG"
    KEY="passwordinplaintext" /* also tried the password hash generated by 'wpa_passphrase networkname "passwordinplaintext" ' */
    SCAN="NO"
    TIMEOUT=15
    WPA_CONF="/etc/wpa_supplicant.conf"
    On a side note, my wireless interface is not wlan0, but ra0
    Network block from /etc/wpa_supplicant.conf:
    network={
    ssid="networkname"
    #psk="passwordinplaintext"
    proto=RSN
    key_mgmt=WPA-PSK
    pairwise=CCMP TKIP
    group=CCMP TKIP
    psk=787d139150drandom56gibberish4715290ac6c523

    Update:
    "ifconfig wlan0 down" always hangs... must be a driver issue (ath5k).

  • Unable to connect to home network (WPA2-PSK, works on Windows)

    Hello!
    I am having problems with connecting to my home network (on a FRITZ!Box Fon WLAN 7360 SL) which uses WPA2-PSK encryption.
    Windows works normally so I don't think that it is a router issue.
    In addition, I managed to connect to my Universities WPA2 network and another unsecured network without problems.
    I tried netcfg+wpa_supplicant, wpa_supplicant on its own and wicd (on a sidenote, wicd didn't even manage to connect to the router when using a cable). None worked.
    This is the wpa_supplicant conf file that I am using:
    ## wpa_aachen.conf
    ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel
    ap_scan=1
    fast_reauth=1
    network={
    ssid="myssid"
    psk=hexcode
    proto=WPA RSN
    key_mgmt=WPA-PSK
    pairwise=CCMP TKIP
    I am getting an "authentication timeout" error everytime I try. Yes, I double and triple checked the passphrase. I also tried it via hexcode and plaintext passphrase.
    Does anybody have any suggestions?
    Last edited by lorizean (2012-10-14 20:59:49)

    Ive been trying the same thing for several hours googling it etc. wicd doesnt work always ends up with bad password error no matter what..
    so.. this worked for me:
    get into term as root and type:
    NetworkManager start
    then it will pop up in the notification area click network settings / wireless /connect to hidden network and type name, pass and it connect just fine..
    really simple and it works

  • [Solved] Trouble with WPA/WPA2 and wireless connections (ath9k)

    Hi, I'm having some issues with my Arch install. Right now I'm posting this from Windows so I don't have precise logs, but I mostly remember the issue so bare with me.
    I'm using ath9k with my Bigfoot Killer 1202 card (not sure what the exact model is), and I can't connect to my university's WPA/WPA2 access point. Using wpa_supplicant I get the error "4-way handshake failed - pre-shared key may be incorrect".
    So after some digging I found that I can get it to authenticate with nohwcrypt=1, but when I rmmod ath9k && modprobe ath9k nohwcrypt=1 it enumerates itself as wlan0 (instead of wlp3s0, which is what I get from booting up).
    Then I made the file /etc/modprobe.d/ath9k with the contents "options ath9k nohwcrypt=1" but it seems to still not want to connect until I rmmod && modprobe manually.
    Can someone point me in the right direction on how to fix this issue? I haven't used Arch in a few years and a lot of things have changed, and so far it seems nothing works as I expect it to. Also, how do I get my wifi card to enumerate as the same device no matter when I load ath9k? I don't care if it's called wlan0 or wlp3s0, I just want it to stay the same.
    Edit: Additional Info
    lspci
    03:00.0 Network controller: Qualcomm Atheros AR9462 Wireless Network Adapter (rev 01)
    cat /sys/module/ath9k/parameters/nohwcrypt
    [root@huxley pobegam]# cat /sys/module/ath9k/parameters/nohwcrypt
    0
    (so I guess it isn't loading from ath9k.conf on boot after all?)
    wpa_supplicant output
    <3>CTRL-EVENT-SCAN-RESULTS
    <3>WPS-AP-AVAILABLE
    <3>CTRL-EVENT-SCAN-RESULTS
    <3>WPS-AP-AVAILABLE
    <3>CTRL-EVENT-SSID-REENABLED id=0 ssid="Student"
    <3>Trying to associate with 00:19:30:6b:1b:a2 (SSID='Student' freq=2412 MHz)
    <3>Association request to the driver failed
    <3>Associated with 00:19:30:6b:1b:a2
    <4>WPA: Failed to set PTK to the driver (alg=2 keylen=32 bssid=00:19:30:6b:1b:a2)
    <3>CTRL-EVENT-DISCONNECTED bssid=00:19:30:6b:1b:a2 reason=1 locally_generated=1
    <3>WPA: 4-Way Handshake failed - pre-shared key may be incorrect
    <3>CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="Student" auth_failures=2 duration=20
    <3>CTRL-EVENT-SCAN-RESULTS
    <3>WPS-AP-AVAILABLE
    wpa_supplicant configuration file
    [root@huxley wpa_supplicant]# cat sunyit.conf
    ctrl_interface=/var/run/wpa_supplicant
    update_config=1
    network={
    scan_ssid=1
    ssid="Student"
    proto=WPA
    key_mgmt=WPA-PSK
    pairwise=TKIP
    group=TKIP
    priority=1
    psk="Wireless@SUNYIT"
    Last edited by Pobega (2013-10-02 03:55:51)

    Update: It seems to work ONLY when I rmmod && modprobe; if I force nohwcrypt=1 at boot it doesn't seem to work. Seems kind of odd... Wonder if this is a kernel issue?
    Edit: Also updated with dmesg (because I'm an idiot and forgot to include it)
    [ 2.802118] hub 3-1:1.0: USB hub found
    [ 2.802210] hub 3-1:1.0: 6 ports detected
    [ 2.876377] e1000e 0000:00:19.0 eth0: registered PHC clock
    [ 2.876380] e1000e 0000:00:19.0 eth0: (PCI Express:2.5GT/s:Width x1) 00:90:f5:ea:54:ff
    [ 2.876382] e1000e 0000:00:19.0 eth0: Intel(R) PRO/1000 Network Connection
    [ 2.876418] e1000e 0000:00:19.0 eth0: MAC: 11, PHY: 12, PBA No: FFFFFF-0FF
    [ 2.876688] ACPI Warning: 0x000000000000f040-0x000000000000f05f SystemIO conflicts with Region \_SB_.PCI0.SBUS.SMBI 1 (20130517/utaddress-251)
    [ 2.876697] ACPI: If an ACPI driver is available for this device, you should use it instead of the native driver
    [ 2.908262] usb 4-1: new high-speed USB device number 2 using ehci-pci
    [ 2.913682] [drm] Memory usable by graphics device = 2048M
    [ 2.913687] checking generic (e0000000 7f0000) vs hw (e0000000 10000000)
    [ 2.913688] fb: conflicting fb hw usage inteldrmfb vs VESA VGA - removing generic driver
    [ 2.913702] Console: switching to colour dummy device 80x25
    [ 2.913836] i915 0000:00:02.0: setting latency timer to 64
    [ 2.948473] i915 0000:00:02.0: irq 47 for MSI/MSI-X
    [ 2.948482] [drm] Supports vblank timestamp caching Rev 1 (10.10.2010).
    [ 2.948483] [drm] Driver supports precise vblank timestamp query.
    [ 2.948547] vgaarb: device changed decodes: PCI:0000:00:02.0,olddecodes=io+mem,decodes=io+mem:owns=io+mem
    [ 3.032964] hub 4-1:1.0: USB hub found
    [ 3.033016] hub 4-1:1.0: 8 ports detected
    [ 3.038244] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
    [ 3.169633] e1000e 0000:00:19.0: irq 46 for MSI/MSI-X
    [ 3.221450] [drm] GMBUS [i915 gmbus vga] timed out, falling back to bit banging on pin 2
    [ 3.237256] fbcon: inteldrmfb (fb0) is primary device
    [ 3.271526] e1000e 0000:00:19.0: irq 46 for MSI/MSI-X
    [ 3.271623] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
    [ 3.491212] Switched to clocksource tsc
    [ 4.027317] psmouse serio2: synaptics: Touchpad model: 1, fw: 8.1, id: 0x1e2b1, caps: 0xd00123/0x840300/0x126c00, board id: 2439, fw id: 1215751
    [ 4.066270] input: SynPS/2 Synaptics TouchPad as /devices/platform/i8042/serio2/input/input7
    [ 4.477837] [drm] Enabling RC6 states: RC6 on, RC6p off, RC6pp off
    [ 4.967580] Console: switching to colour frame buffer device 240x67
    [ 4.977758] i915 0000:00:02.0: fb0: inteldrmfb frame buffer device
    [ 4.977761] i915 0000:00:02.0: registered panic notifier
    [ 4.978457] acpi device:45: registered as cooling_device8
    [ 4.978479] ACPI: Video Device [GFX0] (multi-head: yes rom: no post: no)
    [ 4.978579] input: Video Bus as /devices/LNXSYSTM:00/device:00/PNP0A08:00/LNXVIDEO:00/input/input8
    [ 4.978690] [drm] Initialized i915 1.6.0 20080730 for 0000:00:02.0 on minor 0
    [ 4.978877] snd_hda_intel 0000:00:1b.0: irq 48 for MSI/MSI-X
    [ 4.979210] snd_hda_intel 0000:00:03.0: irq 49 for MSI/MSI-X
    [ 4.989927] hda_codec: invalid CONNECT_LIST verb 5[1]:0
    [ 4.989974] hda_codec: invalid CONNECT_LIST verb 6[1]:0
    [ 4.990029] hda_codec: invalid CONNECT_LIST verb 7[1]:0
    [ 4.991935] input: HDA Intel MID HDMI/DP,pcm=8 as /devices/pci0000:00/0000:00:03.0/sound/card0/input9
    [ 4.992031] input: HDA Intel MID HDMI/DP,pcm=7 as /devices/pci0000:00/0000:00:03.0/sound/card0/input10
    [ 4.992087] input: HDA Intel MID HDMI/DP,pcm=3 as /devices/pci0000:00/0000:00:03.0/sound/card0/input11
    [ 4.994100] input: HDA Intel PCH Front Headphone as /devices/pci0000:00/0000:00:1b.0/sound/card1/input12
    [ 4.994171] input: HDA Intel PCH Mic as /devices/pci0000:00/0000:00:1b.0/sound/card1/input13
    [ 6.977361] wlan0: authenticate with 00:1d:45:cd:c1:c2
    [ 6.987213] wlan0: send auth to 00:1d:45:cd:c1:c2 (try 1/3)
    [ 6.988904] wlan0: authenticated
    [ 6.989040] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 6.989044] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 6.989046] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 6.990123] wlan0: associate with 00:1d:45:cd:c1:c2 (try 1/3)
    [ 6.993437] wlan0: RX AssocResp from 00:1d:45:cd:c1:c2 (capab=0x431 status=0 aid=9)
    [ 6.993577] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
    [ 6.993624] wlan0: associated
    [ 6.998736] wlan0: deauthenticating from 00:1d:45:cd:c1:c2 by local choice (reason=1)
    [ 7.002835] cfg80211: Calling CRDA for country: US
    [ 24.197672] wlan0: authenticate with 00:1d:45:cd:c1:c2
    [ 24.207666] wlan0: send auth to 00:1d:45:cd:c1:c2 (try 1/3)
    [ 24.209338] wlan0: authenticated
    [ 24.209468] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 24.209472] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 24.209474] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 24.210593] wlan0: associate with 00:1d:45:cd:c1:c2 (try 1/3)
    [ 24.213338] wlan0: RX AssocResp from 00:1d:45:cd:c1:c2 (capab=0x31 status=0 aid=9)
    [ 24.213481] wlan0: associated
    [ 24.221396] wlan0: deauthenticating from 00:1d:45:cd:c1:c2 by local choice (reason=1)
    [ 24.225880] cfg80211: Calling CRDA to update world regulatory domain
    [ 50.045002] wlan0: authenticate with 00:19:30:6b:1b:a2
    [ 50.054957] wlan0: send auth to 00:19:30:6b:1b:a2 (try 1/3)
    [ 50.056639] wlan0: authenticated
    [ 50.056775] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 50.056779] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 50.056781] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 50.057899] wlan0: associate with 00:19:30:6b:1b:a2 (try 1/3)
    [ 50.061270] wlan0: RX AssocResp from 00:19:30:6b:1b:a2 (capab=0x431 status=0 aid=89)
    [ 50.061426] wlan0: associated
    [ 50.073874] wlan0: deauthenticating from 00:19:30:6b:1b:a2 by local choice (reason=1)
    [ 50.078661] cfg80211: Calling CRDA to update world regulatory domain
    [ 75.892318] wlan0: authenticate with 00:1d:45:cd:c1:c2
    [ 75.902267] wlan0: send auth to 00:1d:45:cd:c1:c2 (try 1/3)
    [ 75.904108] wlan0: authenticated
    [ 75.904254] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 75.904256] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 75.904257] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 75.905145] wlan0: associate with 00:1d:45:cd:c1:c2 (try 1/3)
    [ 75.908344] wlan0: RX AssocResp from 00:1d:45:cd:c1:c2 (capab=0x401 status=17 aid=0)
    [ 75.908348] wlan0: 00:1d:45:cd:c1:c2 denied association (code=17)
    [ 75.918844] wlan0: deauthenticating from 00:1d:45:cd:c1:c2 by local choice (reason=3)
    [ 86.045293] wlan0: authenticate with 00:19:30:6b:1b:52
    [ 86.059226] wlan0: send auth to 00:19:30:6b:1b:52 (try 1/3)
    [ 86.061328] wlan0: authenticated
    [ 86.061475] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 86.061477] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 86.061478] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 86.064853] wlan0: associate with 00:19:30:6b:1b:52 (try 1/3)
    [ 86.169949] wlan0: associate with 00:19:30:6b:1b:52 (try 2/3)
    [ 86.179194] wlan0: RX AssocResp from 00:19:30:6b:1b:52 (capab=0x431 status=0 aid=22)
    [ 86.179323] wlan0: associated
    [ 89.123073] wlan0: deauthenticated from 00:19:30:6b:1b:52 (Reason: 4)
    [ 89.147287] cfg80211: Calling CRDA for country: US
    [ 105.770381] e1000e: eth0 NIC Link is Up 100 Mbps Full Duplex, Flow Control: None
    [ 105.770386] e1000e 0000:00:19.0 eth0: 10/100 speed: disabling TSO
    [ 105.770418] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
    [ 114.898216] wlan0: authenticate with 00:19:30:6b:1b:a2
    [ 114.912130] wlan0: send auth to 00:19:30:6b:1b:a2 (try 1/3)
    [ 114.914102] wlan0: authenticated
    [ 114.914235] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 114.914239] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 114.914241] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 114.914348] wlan0: associate with 00:19:30:6b:1b:a2 (try 1/3)
    [ 114.916916] wlan0: RX AssocResp from 00:19:30:6b:1b:a2 (capab=0x401 status=17 aid=0)
    [ 114.916920] wlan0: 00:19:30:6b:1b:a2 denied association (code=17)
    [ 114.937999] wlan0: deauthenticating from 00:19:30:6b:1b:a2 by local choice (reason=3)
    [ 125.064495] wlan0: authenticate with 00:19:30:6b:1b:52
    [ 125.078431] wlan0: send auth to 00:19:30:6b:1b:52 (try 1/3)
    [ 125.081945] wlan0: authenticated
    [ 125.082083] ath9k 0000:03:00.0 wlan0: disabling HT/VHT due to WEP/TKIP use
    [ 125.082094] ath9k 0000:03:00.0 wlan0: disabling HT as WMM/QoS is not supported by the AP
    [ 125.082095] ath9k 0000:03:00.0 wlan0: disabling VHT as WMM/QoS is not supported by the AP
    [ 125.084061] wlan0: associate with 00:19:30:6b:1b:52 (try 1/3)
    [ 125.098558] wlan0: RX AssocResp from 00:19:30:6b:1b:52 (capab=0x431 status=0 aid=22)
    [ 125.098683] wlan0: associated
    [ 127.937457] wlan0: deauthenticated from 00:19:30:6b:1b:52 (Reason: 4)
    [ 127.959914] cfg80211: Calling CRDA to update world regulatory domain
    Edit: I ended up solving my problem -- the issue I was running into was that ath9k was baked into my initrd without nohwcrypt=1. I opted to `mkinitcpio` again without MODULES='ath9k' -- alternatively, you could add a modprobe.d file to FILES= to get it to work, but I just figured this is simpler.
    Last edited by Pobega (2013-10-02 03:57:27)

  • Wireless-Card doesn't not work with WPA/WPA2 but with WEP [Solved]

    Hello I have a MacBook (late 2007) with a wireless-card from Broadcam, the card works with WEP and the classic configuration over rc.conf very well. But I can't get the card running with WPA and the net network-profiles.
    Here is the link to the driver - http://www.broadcom.com/support/802.11/linux_sta.php
    eth2 = wireless-card
    eth1 = firewireanything
    eth0 = wired-card
    rc.conf
    # /etc/rc.conf - Main Configuration for Arch Linux
    # LOCALIZATION
    # LOCALE: available languages can be listed with the 'locale -a' command
    # HARDWARECLOCK: set to "UTC" or "localtime"
    # USEDIRECTISA: use direct I/O requests instead of /dev/rtc for hwclock
    # TIMEZONE: timezones are found in /usr/share/zoneinfo
    # KEYMAP: keymaps are found in /usr/share/kbd/keymaps
    # CONSOLEFONT: found in /usr/share/kbd/consolefonts (only needed for non-US)
    # CONSOLEMAP: found in /usr/share/kbd/consoletrans
    # USECOLOR: use ANSI color sequences in startup messages
    LOCALE="en_US.utf8"
    HARDWARECLOCK="UTC"
    USEDIRECTISA="no"
    TIMEZONE="Europe/Berlin"
    KEYMAP="us"
    CONSOLEFONT=
    CONSOLEMAP=
    USECOLOR="yes"
    # HARDWARE
    # MOD_AUTOLOAD: Allow autoloading of modules at boot and when needed
    # MOD_BLACKLIST: Prevent udev from loading these modules
    # MODULES: Modules to load at boot-up. Prefix with a ! to blacklist.
    # NOTE: Use of 'MOD_BLACKLIST' is deprecated. Please use ! in the MODULES array.
    MOD_AUTOLOAD="yes"
    #MOD_BLACKLIST=() #deprecated
    #MODULES=(sky2 snd-mixer-oss snd-pcm-oss snd-hwdep snd-page-alloc snd-pcm snd-timer snd snd-hda-intel soundcore)
    # Scan for LVM volume groups at startup, required if you use LVM
    USELVM="no"
    # NETWORKING
    # HOSTNAME: Hostname of machine. Should also be put in /etc/hosts
    HOSTNAME="macbook"
    # Use 'ifconfig -a' or 'ls /sys/class/net/' to see all available interfaces.
    # Interfaces to start at boot-up (in this order)
    # Declare each interface then list in INTERFACES
    # - prefix an entry in INTERFACES with a ! to disable it
    # - no hyphens in your interface names - Bash doesn't like it
    # DHCP: Set your interface to "dhcp" (eth0="dhcp")
    # Wireless: See network profiles below
    eth0="eth0 192.168.1.220 netmask 255.255.255.0 broadcast 192.168.1.255"
    INTERFACES=(!eth0 !eth1 eth2)
    # Routes to start at boot-up (in this order)
    # Declare each route then list in ROUTES
    # - prefix an entry in ROUTES with a ! to disable it
    gateway="default gw 192.168.1.1"
    ROUTES=(!gateway)
    # Enable these network profiles at boot-up. These are only useful
    # if you happen to need multiple network configurations (ie, laptop users)
    # - set to 'menu' to present a menu during boot-up (dialog package required)
    # - prefix an entry with a ! to disable it
    # Network profiles are found in /etc/network.d
    # This now requires the netcfg package
    NETWORKS=(wireless)
    # DAEMONS
    # Daemons to start at boot-up (in this order)
    # - prefix a daemon with a ! to disable it
    # - prefix a daemon with a @ to start it up in the background
    DAEMONS=(syslog-ng network net-profiles netfs alsa crond portmap fam hal)
    /etc/network.d/wireless
    CONNECTION="wireless"
    INTERFACE=eth2
    HOSTNAME=macbook
    IP="static"
    IFOPTS="192.168.1.225 netmask 255.255.255.0 broadcast 192.168.1.255"
    GATEWAY=192.168.1.1
    DNS1=192.168.1.1
    # Wireless Settings (optional)
    ESSID=3Com
    #KEY=
    IWOPTS="mode managed essid $ESSID channel 11"
    #WIFI_INTERFACE=wlan0 # use this if you have a special wireless interface
    # that is linked to the real $INTERFACE
    #WIFI_WAIT=5 # seconds to wait for the wireless card to
    # associate before bringing the interface up
    USEWPA="yes" # start wpa_supplicant with the profile
    WPAOPTS="" # use "" for normal operation or specify additional
    # options (eg, "-D ipw")
    # see /etc/wpa_supplicant.conf for configuration
    Can I set here the WPA/WPA2-Key also? Why here ESSID? Do I need still a configuration in wpa_supplicant.conf?
    Thats very confusing and not explained.
    WPAOPTS? Do I need to add something like "-D wext"?
    /etc/wpa_supplicant.conf
    # This is a network block that connects to any unsecured access point.
    # We give it a low priority so any defined blocks are preferred.
    ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel
    network={
    key_mgmt=NONE
    priority=-9999999
    network={
    ssid="3Com"
    proto=WPA
    key_mgmt=WPA-PSK
    pairwise=CCMP TKIP
    group=CCMP TKIP
    psk="topsecret"
    priority=5
    # WPA2
    # proto=WPA RSN
    I need help. Please
    Last edited by hoschi (2009-01-04 20:21:58)

    fwojciec wrote:If this info is not in the wiki it might be worth it to add it -- it's all detailed in /etc/network.d/examples/complete.example though.
    Thats the reason why I was so confused.
    My new and well working configuration:
    # /etc/rc.conf - Main Configuration for Arch Linux
    # LOCALIZATION
    # LOCALE: available languages can be listed with the 'locale -a' command
    # HARDWARECLOCK: set to "UTC" or "localtime"
    # USEDIRECTISA: use direct I/O requests instead of /dev/rtc for hwclock
    # TIMEZONE: timezones are found in /usr/share/zoneinfo
    # KEYMAP: keymaps are found in /usr/share/kbd/keymaps
    # CONSOLEFONT: found in /usr/share/kbd/consolefonts (only needed for non-US)
    # CONSOLEMAP: found in /usr/share/kbd/consoletrans
    # USECOLOR: use ANSI color sequences in startup messages
    LOCALE="en_US.utf8"
    HARDWARECLOCK="UTC"
    USEDIRECTISA="no"
    TIMEZONE="Europe/Berlin"
    KEYMAP="us"
    CONSOLEFONT=
    CONSOLEMAP=
    USECOLOR="yes"
    # HARDWARE
    # MOD_AUTOLOAD: Allow autoloading of modules at boot and when needed
    # MOD_BLACKLIST: Prevent udev from loading these modules
    # MODULES: Modules to load at boot-up. Prefix with a ! to blacklist.
    # NOTE: Use of 'MOD_BLACKLIST' is deprecated. Please use ! in the MODULES array.
    MOD_AUTOLOAD="yes"
    #MOD_BLACKLIST=() #deprecated
    #MODULES=(sky2 snd-mixer-oss snd-pcm-oss snd-hwdep snd-page-alloc snd-pcm snd-timer snd snd-hda-intel soundcore)
    # Scan for LVM volume groups at startup, required if you use LVM
    USELVM="no"
    # NETWORKING
    # HOSTNAME: Hostname of machine. Should also be put in /etc/hosts
    HOSTNAME="macbook"
    # Use 'ifconfig -a' or 'ls /sys/class/net/' to see all available interfaces.
    # Interfaces to start at boot-up (in this order)
    # Declare each interface then list in INTERFACES
    # - prefix an entry in INTERFACES with a ! to disable it
    # - no hyphens in your interface names - Bash doesn't like it
    # DHCP: Set your interface to "dhcp" (eth0="dhcp")
    # Wireless: See network profiles below
    eth0="eth0 192.168.1.220 netmask 255.255.255.0 broadcast 192.168.1.255"
    INTERFACES=(!eth0 !eth1 !eth2)
    # Routes to start at boot-up (in this order)
    # Declare each route then list in ROUTES
    # - prefix an entry in ROUTES with a ! to disable it
    gateway="default gw 192.168.1.1"
    ROUTES=(!gateway)
    # Enable these network profiles at boot-up. These are only useful
    # if you happen to need multiple network configurations (ie, laptop users)
    # - set to 'menu' to present a menu during boot-up (dialog package required)
    # - prefix an entry with a ! to disable it
    # Network profiles are found in /etc/network.d
    # This now requires the netcfg package
    NETWORKS=(3com)
    # DAEMONS
    # Daemons to start at boot-up (in this order)
    # - prefix a daemon with a ! to disable it
    # - prefix a daemon with a @ to start it up in the background
    DAEMONS=(syslog-ng network net-profiles netfs alsa crond portmap fam hal)
    CONNECTION="wireless"
    DESCRIPTION="Very verbose complete wireless example"
    INTERFACE=eth2
    HOSTNAME=macbook
    # Interface Settings (use IP="dhcp" for DHCP)
    IP="static"
    IFOPTS="192.168.1.225 netmask 255.255.255.0 broadcast 192.168.1.255"
    GATEWAY=192.168.1.1
    # DNS Settings (optional)
    DOMAIN=localdomain
    DNS1=192.168.1.1
    DNS2=
    SEARCH=
    # Standard Wireless Settings
    ESSID=3Com
    SECURITY=wpa-config # One of wep, wpa, wpa-config, none
    KEY=""
    # Scans to see if network is available before connecting (reccomended)
    SCAN="YES"
    # Time to wait to connect to a network. Default 15.
    TIMEOUT=10
    # Pass *custom* options to iwconfig. Usually not needed (optional)
    IWOPTS="mode managed essid $ESSID channel 6 key restricted $KEY"
    # Any extra arguments for wpa_supplicant
    WPA_OPTS=
    # For SECURITY='wpa-config' only - filename of a wpa-supplicant config
    WPA_CONF=/etc/wpa_supplicant.conf
    # This is a network block that connects to any unsecured access point.
    # We give it a low priority so any defined blocks are preferred.
    ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel
    network={
    key_mgmt=NONE
    priority=-9999999
    network={
    ssid="Linksys"
    proto=WPA RSN
    key_mgmt=WPA-PSK
    pairwise=CCMP TKIP
    group=CCMP TKIP
    psk="areulookingatmybreasts"
    priority=5
    network={
    ssid="3Com"
    proto=WPA
    key_mgmt=WPA-PSK
    pairwise=CCMP TKIP
    group=CCMP TKIP
    psk="nomam"
    priority=5
    # WPA2
    # proto=WPA RSN
    There are also profiles for the Linksys-Router and for wired cable.
    Thanks for the help!
    Last edited by hoschi (2009-01-04 20:21:23)

  • Which hp printers use wpa2-psk

    My new Netgear R6300 only wants to use wpa2-psk (aes). My old HP printer can not do this security code. Need to get a new HP printer, which one has this level of encription?

    Hello, and Welcome to the HP Support Community!
    wpa-psk (either AES or TKIP) is pretty standard these days.  Looking at my year-old OfficeJet 8600 Pro, it easily supports this method and is the way I have it connected to my home network.
    We just installed a newer 8610 at the office, and it had no problems with the wpa/wpa2 encryption scheme either!
    I believe you will be safe with any present-day HP printer that offers wireless connectivity.    
    WyreNut
    I am a Volunteer here, not employed by HP.
    You too can become an HP Expert! Details HERE!
    If my post has helped you, click the Kudos Thumbs up!
    If it solved your issue, Click the "Accept as Solution" button so others can benefit from the question you asked!

Maybe you are looking for

  • Mail.app keeps saving downloads to Mail Downloads rather than ~/Downloads

    I've modified Mail.app preferences to save downloads in the main downloads folder, ~/Downloads. But every time I double click an attachment, it still downloads to the wrong folder, Mail Downloads, in a terribly nested directory, ~/Library/Containers/

  • Session Timeouts issue massively frustrating

    I am getting session timeouts when logged into my netmail & trying to compose emails. It happens constantly, sometimes immediately after logging in, sometimes 5 minutes into a session, sometimes 2 minutes into a session. It is completely random timin

  • No Boot, No Video and Constant Restarts

    Hi, I've run into a bit of trouble here, and it's really wearing on me. Been working all night to try and figure it out and just can't figure out a way to be sure of what the problem is. I just bought parts for an upgrade; MSI NF750-G55 mobo, Phenom

  • Pricing condition based on a $ value

    Hello, We have a uniqure requirement in the Pricing for a Sales Order. We have a sales price condition PBXX maintained and it populates automatically during sales Order creation. Now what we want is if the total of all the conditions is less then 500

  • How to maintain data in a boolean array

    Hi i have booleans inside 1D array and i have a numerc control, and a text file so that the entered number going to be compared with the number in the text file if the numbers match, the boolean of that number goes on The question is that, when I ent