Guest

Wireless, LAN (WLAN)

Wireless LAN Controller 5760/3850 Web Passthrough Configuration Example

Techzone Article content

Document ID: 116879

Updated: Dec 17, 2013

Contributed by Surendra BG, Cisco TAC Engineer.

   Print

Introduction

This document describes how to configure the web passthrough feature on a Wireless LAN Controller (WLC).

Prerequisites

Requirements

This document assumes that the initial configurations are already completed on the WLC.

Components Used

The information in this document is based on these software and hardware versions:

  • A 5760 WLC that runs Version 3.3 code
  • Cisco Aironet 3600 Series Lightweight Access Point
  • Microsoft Windows 7 Native Wireless Supplicant

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Web Passthrough on Wireless LAN Controllers

Web passthrough is a solution that is typically used for guest access. The process of web passthrough is similiar to that of web authentication, except that no authentication credentials are required for web passthrough.

In web passthrough, wireless users are redirected to the usage policy page when they try to use the Internet for the first time. Once the users accept the policy, they can browse the Internet. This redirection to the policy page is handled by the WLC.

In this example, a VLAN interface is created on a separate subnet on the WLC. Then, a separate Wireless LAN (WLAN)/Service Set Identifier (SSID) is created and configured with web passthrough, and it is mapped to this VLAN interface.

Note: Web passthrough does not provide any data encryption.

Configure

Here is the network diagram:

You can complete this configuration with the CLI or the GUI.

Configuration with the CLI

Configure DHCP snooping for the VLANs that you use for clients. In this example, VLAN20 is used for clients. The pool is configured on the same WLC.

TenGigabitEthernet1/0/1 from WLC 5760 connects to the uplink switch. If you have the DHCP server configured on the server beyond the WLC or on an external DHCP server, then you have to trust DHCP snooping and Relay information.

ip device tracking
ip dhcp snooping vlan 12,20,30,40
ip dhcp snooping
!
ip dhcp pool vlan20
 network 20.20.20.0 255.255.255.0
 default-router 20.20.20.1

interface Vlan20
 ip address 20.20.20.1 255.255.255.0

interface TenGigabitEthernet1/0/1
 switchport trunk native vlan 12
 switchport mode trunk
 ip dhcp relay information trusted
 ip dhcp snooping trust


parameter-map type webauth global
 type consent
 virtual-ip ipv4 192.168.200.1
!
!
parameter-map type webauth web
 type consent

wlan Webauth 9 Webauth
 client vlan VLAN0020
 no security wpa
 no security wpa akm dot1x
 no security wpa wpa2
 no security wpa wpa2 ciphers aes
 security web-auth
 security web-auth parameter-map web
 session-timeout 1800

Configuration with the GUI

Complete these steps in order to configure on the GUI.

  1. From the WLC GUI, navigate to Configuration > Security:



  2. On the bottom-right of the Security page, navigate to Webauth > Webauth Parameter Map:



  3. Choose global for the default parameter map:



  4. Navigate to Webauth Parameter Map > Edit in order to configure the virtual IP address. It is 192.169.200.1 in this example. Change the Type to consent, so that the global parameter becomes consent (Web passthrough).

    Note: It is not mandatory to configure the global parameter map to consent.





  5. Create the parameter map, and choose consent for the Type. This example uses web as the Parameter-map name, which is used under the WLAN for the users to access the Consent page.



    Here is a screen capture of the parameter maps on the GUI:



  6. From the WLC GUI, navigate to Configuration > Wireless > WLAN in order to create a new WLAN. This example has Webauth as the WLAN mapped to VLAN20:



  7. Navigate to WLAN > Edit > Security > Layer2, and select None for Layer 2 Security:



  8. Navigate to WLAN > Edit > Security > Layer3, and choose the appropriate setting for Webauth Parameter Map. In this example, it is web.



  9. Save the configuration, and it is ready to test.

  10. After you connect to the WLAN, the client receives the IP address. When you try to open the browser with the virtual IP address, the Consent Login Page displays, and you must click the Accept radio button.

    Note: If you have the valid Domain Name Server (DNS) configuration, then you do not need to manually enter the virtual IP address on the browser.





  11. Once you click Accept, the successful authentication page launches, which gives you the option to navigate to the requested page.



Client Example

Here is the packet capture from the client laptop when the client receives the DHCP:


After the client receives the IP address, the client opens the browser, and types the virtual IP address.

Note: If the DNS is configured properly, then you do not need to enter the virtual IP address on the browser.

Because this configuration does not use any webauth certifications, there are CERT errors in this packet capture:

After successful authentication, the client is in the RUN state on the WLC GUI.

Verify

There is currently no verification procedure available for this configuration.

Troubleshoot

Note: Because debugs are processor-intensive, you should run the debugs in a scheduled maintenance window.

Enter these debugs in order to troubleshoot your configuration:

debug client mac-address 00:21:6A:89:51:CA
debug ip http all
debug access-session all

All Auth Manager debugging is on
SURBG-5760#debug ip admission all
All IP admission debugging is on

5760#show debugging
IP admission:
  IP admission AAA event debugging is on
  IP admission ACL event debugging is on
  IP admission session-mgr debugging is on
  IP admission development debugging is on
  IP admission denial-of-service debugging is on
  IP admission EAPoUDP posture validation debugging is on
  IP admission error debugging is on
  IP admission HTTP proxy daemon debugging is on
  IP admission L3 idle-timer debugging is on
  IP admission input-feature debugging is on
  IP admission io debugging is on
  IP admission page debugging is on
  IP admission qualify debugging is on
  IP admission session debugging is on
  IP admission state debugging is on
  IP admission timer debugging is on
  IP admission client debugging is on
  IP admission high-availability debugging is on
HTTP Server:
  HTTP Server transaction debugging is on
  HTTP Server tokens debugging is on
  HTTP Server EZSetup debugging is on
  HTTP Server URL debugging is on
  HTTP Server Authentication debugging is on
  HTTP Server Side Includes debugging is on
  HTTP Application Inout debugging is on
  HTTP Application Detail debugging is on
  HTTP Server Error debugging is on
  HTTP SSL Error debugging is on

Nova Platform:
    dot11/state debugging is on
    pem/events debugging is on
    ft/events debugging is on
    client/mac-addr debugging is on
    dot11/detail debugging is on
    mac/ filters[string 00:21:6A:89:51:C] debugging is on
    dot11/error debugging is on
    dot11/mobile debugging is on
    pem/state debugging is on


SURBG-5760#
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: Processing assoc-req
station: 0021.6a89.51ca  AP:
c8f9.f983.4260 -01 thread:-114119824
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Adding
mobile on LWAPP AP  c8f9.f983.4260 (1)
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca  Creating
WL station entry for client -  rc 0
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Association
received from mobile on AP  c8f9.f983.4260
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca qos
upstream policy is unknown and downstream policy is unknown
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca ap
Changed 0 wlanChanged 0 mscb ipAddr 0.0.0.0, apf RadiusOverride 0x0, numIPv6Addr=0
*Oct  9 04:16:37.962: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Applying
WLAN policy on MSCB.
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Applying
WLAN ACL policies to client
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca No
Interface ACL used for Wireless client in WCM(NGWC)
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Applying
site-specific IPv6 override for station  0021.6a89.51ca  - vapId 9, site
'default-group', interface 'VLAN0020'

*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Applying
local bridging Interface Policy for station  0021.6a89.51ca  - vlan 20,
interface 'VLAN0020'
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca STA - rates
(8): 140 18 152 36 176 72 96 108 0 0 0 0 0 0 0 0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca new
capwap_wtp_iif_id 45e7800000000c, sm capwap_wtp_iif_id 0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
Radio IIFID 0x6025800000000e, BSSID IIF Id 0x498f800000001b, COS 4
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: Load Balancer: Success,
Resource allocated are: Active Switch number: 1, Active Asic number : 0,
Reserve Switch number
2 Reserve Asic number 0. AP Asic num 0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
Anchor Sw  1, Doppler 0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_ALLOCATE: Client IIF Id alloc SUCCESS w/ client 58b5800000001c (state 0).
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca iifid
Clearing Ack flag
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
Platform ID allocated successfully ID:10
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
Adding opt82 len 0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
Cleaering Ack flag
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
ssid Webauth bssid c8f9.f983.4260 vlan 20 auth=ASSOCIATION(0) wlan(ap-group/global)
9/9 client 0 assoc 1 mob=Unassoc(0) radio 1 m_vlan 20 ip 0.0.0.0 src
0x45e7800000000c dst 0x0 cid 0x58b5800000001c glob rsc id 10dhcpsrv  0.0.0.0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_ADD:
mscb iifid 0x58b5800000001c msinfo iifid 0x0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
START (0) Initializing policy
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change state
to AUTHCHECK (2) last state START (0)
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change
state to L2AUTHCOMPLETE (4) last state AUTHCHECK (2)

*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: Client 1 m_vlan 20 Radio iif id 0x6025800000000e bssid iif id
0x498f800000001b, bssid c8f9.f983.4260
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_AUTH:
Adding opt82 len 0
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: WCDB_IIF: Ack Message ID:
0x58b5800000001c code 1001
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_LLM:
NoRun Prev Mob 0, Curr Mob 0 llmReq 1, return False
*Oct  9 04:16:37.963: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca auth state 1
mob state 0 setWme 0 wme 1 roam_sent 0
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: auth=L2_AUTH(1) vlan 20 radio 1 client_id 0x58b5800000001c
mobility=Unassoc(0) src_int 0x45e7800000000c dst_int 0x0 ackflag 0 reassoc_client
0 llm_notif 0 ip  0.0.0.0 ip_learn_type 0
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: In L2 auth but l2ack waiting lfag not set,so set
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
L2AUTHCOMPLETE (4) DHCP Not required on AP  c8f9.f983.4260  vapId 9 apVapId 9for
this client
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Not Using
WMM Compliance code qosCap 00
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP  c8f9.f983.4260  vapId 9
apVapId 9
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change state
to DHCP_REQD (7) last state L2AUTHCOMPLETE (4)
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: Client 1 m_vlan 20 Radio iif id 0x6025800000000e bssid iif id
0x498f800000001b, bssid c8f9.f983.4260
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_AUTH:
Adding opt82 len 0
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_CHANGE:
Suppressing SPI (Mobility state not known) pemstate 7 state LEARN_IP(2) vlan
20 client_id 0x58b5800000001c mob=Unassoc(0) ackflag 1 dropd 0
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Incrementing
the Reassociation Count 1 for client (of interface VLAN0020)
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
apfPemAddUser2 (apf_policy.c:161) Changing state for mobile  0021.6a89.51ca  on AP
c8f9.f983.4260  from Idle to Associated
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Reason code 0, Preset 4, AAA cause 1
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Scheduling
deletion of Mobile Station:  (callerId: 49) in 1800 seconds
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Ms Timeout =
1800, Session Timeout = 1800
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: Sending assoc-resp station:
0021.6a89.51ca  AP: c8f9.f983.4260 -01 thread:-114119824
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Sending Assoc
Response to station on BSSID  c8f9.f983.4260  (status 0) ApVapId 9 Slot 1
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
apfProcessAssocReq (apf_80211.c:6224) Changing state for mobile  0021.6a89.51ca
on AP c8f9.f983.4260  from Associated to Associated
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) pemAdvanceState2: MOBILITY-INCOMPLETE with state 7.
*Oct  9 04:16:37.964: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) pemAdvanceState2: MOBILITY-INCOMPLETE with state 7.
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) pemAdvanceState2: MOBILITY-COMPLETE with state 7.
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility
role=Local, client state=APF_MS_STATE_ASSOCIATED
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) pemAdvanceState2 3649, Adding TMP rule
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) Adding Fast Path rule^M   on AP  c8f9.f983.4260 , slot 1 802.1P = 0^M
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  0.0.0.0
DHCP_REQD (7) Successfully plumbed mobile rule
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WEBAUTH: Using method list Local_webauth

*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WEBAUTH: Using webAuth profile name web

*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Using webAuth Max Logins 3
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Calling Auth Mgr to authenticate client 58b5800000001c
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
apfMsWebAuthInitiated is not true. So not updating SM
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
At the End of webAuthClientAuthNotify mscb->apfMsOldSmwtp_iif_id =  0
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: Client 1 m_vlan 20 Radio iif id 0x6025800000000e bssid iif id
0x498f800000001b, bssid c8f9.f983.4260
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_AUTH:
Adding opt82 len 0
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_LLM:
NoRun Prev Mob 0, Curr Mob 1 llmReq 1, return False
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: Suppressing SPI (ACK message not recvd) pemstate 7 state LEARN_IP(2)
vlan 20 client_id 0x58b5800000001c mob=Local(1) ackflag 1 dropd 1
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Error
updating wcdb on mobility complete
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing
msg Epm spi response(12)
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca aaa
attribute list length is 79
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Sending SPI spi_epm_epm_session_create successfull
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg
Add SCB(3)
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca 0.0.0.0,
auth_state 7 mmRole Local !!!
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca 0.0.0.0,
auth_state 7 mmRole Local, updating wcdb not needed
*Oct  9 04:16:37.965: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Tclas
Plumb needed: 0
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB
SPI response msg handler client code 0 mob state 0
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WcdbClientUpdate: L2 Auth ACK from WCDB
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_L2ACK: wcdbAckRecvdFlag updated
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: Client 1 m_vlan 20 Radio iif id 0x6025800000000e bssid iif id
0x498f800000001b, bssid c8f9.f983.4260
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_AUTH: Adding opt82 len 0
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_LLM: NoRun Prev Mob 0, Curr Mob 1 llmReq 1, return False
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
auth state 2 mob state 1 setWme 0 wme 1 roam_sent 0
*Oct  9 04:16:37.966: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: auth=LEARN_IP(2) vlan 20 radio 1 client_id 0x58b5800000001c
mobility=Local(1) src_int 0x45e7800000000c dst_int 0x0 ackflag 2
reassoc_client 0 llm_notif 0 ip  0.0.0.0 ip_learn_type 0
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Session
create resp - client handle 58b5800000001c session 10000015
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Netflow
session create
resp - client handle 58b5800000001c sess 10000015
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing
msg Epm spi response(12)
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
session_create_response for client handle 24969359310979100
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
session_create_response with EPM session handle 268435477
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Web-Auth
client, checking if pre-auth policies are needed to be plumbed
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Trying to
create a preauth policy for the client
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Send
request to EPM
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca aaa
attribute list length is 34
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Sending
Activate request for session handle 268435477 successful
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Pre-auth
policy request sent! Now wait for pre-auth policy ACK from EPM
*Oct  9 04:16:37.967: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Setting
the epmSendAclDone flag.
*Oct  9 04:16:37.968: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Init feature,
client handle 58b5800000001c session 10000015 authz 1f000015
*Oct  9 04:16:37.968: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Activate feature
client handle 58b5800000001c sess 10000015 authz 1f000015
*Oct  9 04:16:37.968: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg
Epm spi response(12)
*Oct  9 04:16:37.968: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
activate_features_resp for client handle 24969359310979100
*Oct  9 04:16:37.968: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
activate_features_resp for EPM session handle 268435477
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_IP_BIND:
w/ IPv4 20.20.20.6 ip_learn_type DHCP add_delete 1,options_length 0

*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WcdbClientUpdate: IP Binding from WCDB ip_learn_type 1, add_or_delete 1
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca IPv4 Addr:
20:20:20:6
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca MS got
the IP, resetting the Reassociation Count 0 for client
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change state
to WEBAUTH_REQD (8) last state DHCP_REQD (7)
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_CHANGE:
Client 1 m_vlan 20 Radio iif id 0x6025800000000e bssid iif id 0x498f800000001b,
bssid c8f9.f983.4260
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_AUTH:
Adding opt82 len 0
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_LLM:
NoRun Prev Mob 1, Curr Mob 1 llmReq 5, return False
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca auth state 3
mob state 1 setWme 0 wme 1 roam_sent 0
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_CHANGE:
auth=L3_AUTH(3) vlan 20 radio 1 client_id 0x58b5800000001c mobility=Local(1) src_int
0x45e7800000000c dst_int 0x0 ackflag 2 reassoc_client 0 llm_notif 0 ip  20.20.20.6
ip_learn_type DHCP
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Using method list Local_webauth

*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Using webAuth profile name web

*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Using webAuth Max Logins 3
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Calling Auth Mgr to authenticate client 58b5800000001c
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Called SM start with apfMswtp_iif_id  45e7800000000c, mscb->apfMswtp_iif_id
58b5800000001c
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
At the End of webAuthClientAuthNotify mscb->apfMsOldSmwtp_iif_id =  45e7800000000c
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
WEBAUTH_REQD (8) pemAdvanceState2 4382, Adding TMP rule
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
WEBAUTH_REQD (8) Replacing Fast Path rule^M   on AP  c8f9.f983.4260 , slot 1
802.1P = 0^M
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
WEBAUTH_REQD (8) Successfully plumbed mobile rule

*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Plumbing
web-auth redirect rule due to user logout
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca   Sending
IPv4 update to Controller 10.105.135.178  
*Oct  9 04:16:38.019: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Assigning
Address 20.20.20.6 to mobile
*Oct  9 04:16:38.020: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg
Add SCB(3)
*Oct  9 04:16:38.020: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
20.20.20.6, auth_state 8 mmRole Local !!!
*Oct  9 04:16:38.020: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
20.20.20.6, auth_state 8 mmRole Local, updating wcdb not needed
*Oct  9 04:16:38.020: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Tclas
Plumb needed: 0
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Received session event
'SESSION_START' from client
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Session start for
0021.6a89.51ca
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Using stored AAA ID
0x00000015
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Retrieved Client IIF ID
58B5800000001C
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Allocated new Auth
Manager context
(handle 0x10000016)
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method Session
Mgr IPDT Shim to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method SVM state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method SVM to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method Switch
PI to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method Session
Mgr SISF Shim to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method iaf state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method iaf to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method Tag state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method Tag to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method dct state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method dct to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method SM Reauth Plugin state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method SM
Reauth Plugin to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method SM Accounting Feature state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method SM
Accounting Feature to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method  state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method Session
Mgr FFCP Shim to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method  state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method AIM to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method dot1x state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method dot1x to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method mab state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method mab to
runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Initialising Method webauth state to 'Not run'
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Adding method webauth
to runnable list for session 0x10000016
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing SM CB request
for 0x10000016: Event: New client notification (201)
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Create attr list,
session 0x10000016:
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding MAC
0021.6a89.51ca
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding Swidb
0x9745F750
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding AAA_ID=15
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding Audit_sid=
0a6987b25254d8a500000015
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding IIF ID=
0x58B5800000001C
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] New client 0021.6a89.51ca -
client handle 0x00000001 for SVM
*Oct  9 04:16:38.020: AUTH-EVENT: [0021.6a89.51ca, Ca1] Added record to DB - hdl
0x10000016 / 0021.6a89.51ca. 1 session(s) on IDB
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Add record - adding MAC
0021.6a89.51ca
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Add record - adding
SWIDB Capwap1
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Add record - adding
AAA-ID 15
*Oct  9 04:16:38.020: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Add record - adding
AUDIT-ID 0a6987b25254d8a500000015
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Add record - adding
IIF-ID 0x58B5800000001C
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Add record - adding
TARGET_SCOPE (Client)
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] No policy handle to
bind session
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] Create attr list, session
0x10000016:
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding MAC 0021.6a89.51ca
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding Swidb 0x9745F750
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding AAA_ID=15
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding Audit_sid=
0a6987b25254d8a500000015
*Oct  9 04:16:38.021: AUTH-DETAIL: [0021.6a89.51ca, Ca1] - adding IIF ID=
0x58B5800000001C
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing SM CB request for
0x10000016: Event: Start a method (200)
*Oct  9 04:16:38.021: WA-SM   : Ca1         [0.0.0.0        ] Start CB, info hdl
00000000 [0x0], SM hdl 10000016, flags 0x0
*Oct  9 04:16:38.021: WA-SM   : Ca1         [0.0.0.0        ] Start CB, Rcvd ID
attrs mac 0021.6a89.51ca, IIF 58B5800000001C  , audit-ID 0a6987b25254d8a500000015
*Oct  9 04:16:38.021: WA-SM   : Ca1                           Creating idb subblock (1)
*Oct  9 04:16:38.021: WA-SESSN:             [0.0.0.0        ] Create session, hdl
3D00000B [0x96FD5A50]
*Oct  9 04:16:38.021: WA-STATE:             [0.0.0.0        ] State Invalid
State -> INIT
*Oct  9 04:16:38.021: WA-SESSN: Ca1         [0.0.0.0        ] Create session, Add
address 0.0.0.0 [0021.6a89.51ca]
*Oct  9 04:16:38.021: WA-STATE: Ca1         [0.0.0.0        ] State INIT -> INIT
*Oct  9 04:16:38.021: WA-TIMER: Ca1         [0.0.0.0        ] State timer start
(120 secs)
*Oct  9 04:16:38.021: WA-SM   : Ca1         [0.0.0.0        ] Initiate session,
SM initd sessions 1
*Oct  9 04:16:38.021: WA-STATE: Ca1         [0.0.0.0        ] State INIT -> INIT
*Oct  9 04:16:38.021: WA-TIMER: Ca1         [0.0.0.0        ] State timer restart
(120 secs)
*Oct  9 04:16:38.021: WA-ACL  : Ca1         [0.0.0.0        ] Add IPv4 intecept
ACL via FFM, name "IP-Adm-V4-Int-ACL-global", pri 50, IIF 58B5800000001C  
*Oct  9 04:16:38.021: WA-ACL  : Ca1         [0.0.0.0        ] Add IPv6 intercept
ACL via FFM, name "IP-Adm-V6-Int-ACL-global", pri 52, IIF 58B5800000001C  
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Context changing state from 'Idle' to 'Running'
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Method webauth changing state from 'Not run' to 'Running'
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] Received internal event
SINGLE_ID_UPDATE (handle 0x10000016)
*Oct  9 04:16:38.021: WA-SM   : Ca1         [0.0.0.0        ] Change notif CB,
ADD, info hdl 3D00000B, SM hdl 10000016
*Oct  9 04:16:38.021: WA-SM   : Ca1         [20.20.20.6     ] Change notif CB,
Add IPv4 address
*Oct  9 04:16:38.021: WA-SESSN: Ca1         [20.20.20.6     ] Change notif CB,
Add address
20.20.20.6 [0021.6a89.51ca]
*Oct  9 04:16:38.021: WA-SESSN: Ca1         [20.20.20.6     ] Adding ARP Table
entry [Notify CB] Vlan20 20.20.20.6 0021.6a89.51ca
*Oct  9 04:16:38.021: AUTH-SYNC: [0021.6a89.51ca, Ca1] Delay add sync of addr
for 0021.6a89.51ca / 0x10000016
*Oct  9 04:16:38.021: AUTH-EVENT: Handling client event SESSION_STARTED (8) for
PRE, handle 0x10000016
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] SM will not apply policy
for SESSION_STARTED on 0x10000016 / 0021.6a89.51ca
*Oct  9 04:16:38.021: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing default action(s)
for event SESSION_STARTED for session 0x10000016.
*Oct  9 04:16:38.021: AUTH-DETAIL: No default action(s) for event SESSION_STARTED.
*Oct  9 04:16:38.472: AUTH-EVENT: Raising ext evt Template Activated (8) on session
0x10000015, client (unknown) (0), hdl 0x00000000, attr_list 0x41000336
*Oct  9 04:16:38.472: AUTH-EVENT: SM will not send event Template Activated to PRE
for 0x10000015
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Policy enforcement -
client handle 58b5800000001c session 7600000b authz 1f000015
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Netflow policy
enforcement - client handle 58b5800000001c sess 7600000b authz 1f000015 msg_type
0 policy_status 0 attr len 0
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing
msg Epm spi response(12)
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Received policy_enforcement_response for client handle 24969359310979100
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Received policy_enforcement_response for EPM session handle 1979711499
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Received response for _EPM_SPI_ACTIVATE_FEATURES request sent for client
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Received _EPM_SPI_STATUS_SUCCESS for request sent for client
*Oct  9 04:16:38.472: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
Pre-auth policy ACK recvd from EPM, unset flag on MSCB
*Oct  9 04:16:51.143: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:51.143: WA-INFT : Ca1         [20.20.20.6     ] 50164 TCP SYN [1],
dport 80, INIT state
*Oct  9 04:16:51.147: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:51.147: WA-HTTPD: Ca1         [20.20.20.6     ] 50164/0 HTTP
Intercept, New fd 0, sport [50164], info hdl [0x3D00000B], mac [0021.6a89.51ca]
*Oct  9 04:16:51.147: WA-HTTPD: Ca1         [20.20.20.6     ] 50164/0 Create
IO ctx, id [6B00002B], pid 208
*Oct  9 04:16:51.147: WA-CLNT : Ca1         [20.20.20.6     ] 50164 Client
conn add [0021.6a89.51ca] ioctx [6B00002B] #1 pid 208
*Oct  9 04:16:51.147: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 IO state
NEW -> READING
*Oct  9 04:16:51.147: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Read event,
read buffer addr 0x97546DF4, length 2048, cursor 0
*Oct  9 04:16:51.147: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Read event,
Read blocked, cursor 0
*Oct  9 04:16:51.147: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:51.147: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Read event,
read buffer addr 0x97546DF4, length 2048, cursor 0
*Oct  9 04:16:51.147: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Read event,
Read blocked, cursor 416
*Oct  9 04:16:51.147: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Read event,
Message ready
*Oct  9 04:16:51.147: HTTP: token [STRING] len 3: 'GET'
*Oct  9 04:16:51.147: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.147: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.147: HTTP: token [STRING] len 8: 'wireless'
*Oct  9 04:16:51.147: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.147: HTTP: token [STRING] len 4: 'HTTP'
*Oct  9 04:16:51.147: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:51.148: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 6: 'Accept'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: 'image'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 4: 'jpeg'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: 'x'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 2: 'ms'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: 'image'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 3: 'gif'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 4: 'xaml'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '+'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 3: 'xml'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: 'image'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: 'pjpeg'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: 'x'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 2: 'ms'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 4: 'xbap'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '*'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '*'
*Oct  9 04:16:51.148: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 6: 'Accept'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 8: 'Language'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 2: 'en'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 2: 'US'
*Oct  9 04:16:51.148: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 4: 'User'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: 'Agent'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 7: 'Mozilla'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '4'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '('
*Oct  9 04:16:51.148: HTTP: token [STRING] len 10: 'compatible'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 4: 'MSIE'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '8'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 7: 'Windows'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 2: 'NT'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '6'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 7: 'Trident'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '4'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: 'SLCC2'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 3: 'NET'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 3: 'CLR'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '2'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 5: '50727'
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.148: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.148: HTTP: token [STRING] len 3: 'NET'
*Oct  9 04:16:51.148: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 3: 'CLR'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '3'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '5'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 5: '30729'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 3: 'NET'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 3: 'CLR'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '3'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 5: '30729'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 5: 'Media'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 6: 'Center'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 2: 'PC'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '6'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: ')'
*Oct  9 04:16:51.149: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 6: 'Accept'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 8: 'Encoding'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 4: 'gzip'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 7: 'deflate'
*Oct  9 04:16:51.149: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 4: 'Host'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:51.149: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:51.149: HTTP: token [STRING] len 3: '192'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 3: '168'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 3: '200'
*Oct  9 04:16:51.149: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:51.149: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:51.149: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:51.149: WA-HTTPD: Ca1         [20.20.20.6     ] Parse GET,
src [20.20.20.6] dst [192.168.200.1] url [http://192.168.200.1/wireless]
*Oct  9 04:16:51.149: WA-STATE: Ca1         [20.20.20.6     ] State
INIT -> LOGIN
*Oct  9 04:16:51.149: WA-TIMER: Ca1         [20.20.20.6     ] State timer
restart (120 secs)
*Oct  9 04:16:51.149: WA-PAGE : Ca1         [20.20.20.6     ] 50164 Sending
Consent login form, len 1477
*Oct  9 04:16:51.149: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 IO
state READING -> WRITING
*Oct  9 04:16:51.149: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Write
event, buffer addr 0x975629F0, length 1641, cursor 0
*Oct  9 04:16:51.149: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Write
event, Write blocked, cursor 1460
*Oct  9 04:16:51.353: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:51.353: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 Write
event, buffer addr 0x975629F0, length 1641, cursor 1460
*Oct  9 04:16:51.354: WA-IO   : Ca1         [20.20.20.6     ] 50164/0 IO state
WRITING -> END
*Oct  9 04:16:51.354: WA-HTTPD: Ca1         [20.20.20.6     ] 50164/0 Remove
IO ctx and close socket, id [6B00002B]
*Oct  9 04:16:51.354: WA-CLNT : Ca1         [20.20.20.6     ] 50164 Client conn
timer start   [0021.6a89.51ca] ioctx [6B00002B]
*Oct  9 04:16:51.360: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:51.360: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:51.361: WA-INFT : Ca1         [20.20.20.6     ] 50164 TCP FIN,
dport 80
*Oct  9 04:16:53.460: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:53.460: WA-INFT : Ca1         [20.20.20.6     ] 50165 TCP SYN [2],
dport 443, LOGIN state
*Oct  9 04:16:53.464: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:53.464: WA-HTTPD: Ca1         [20.20.20.6     ] 50165/0 HTTP
Intercept, New fd 0, sport [50165], info hdl [0x3D00000B], mac [0021.6a89.51ca]
*Oct  9 04:16:53.464: WA-HTTPD: Ca1         [20.20.20.6     ] 50165/0 Create
IO ctx, id [AB00002C], pid 208
*Oct  9 04:16:53.464: WA-CLNT : Ca1         [20.20.20.6     ] 50165 Client
conn add [0021.6a89.51ca] ioctx [AB00002C] #2 pid 208
*Oct  9 04:16:53.464: WA-IO   : Ca1         [20.20.20.6     ] 50165/0 IO state
NEW -> SSL_HANDSHAKING
*Oct  9 04:16:53.470: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:53.474: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:53.478: WA-IO   : Ca1         [20.20.20.6     ] 50165/0 IO state
SSL_HANDSHAKING -> READING
*Oct  9 04:16:53.478: WA-IO   : Ca1         [20.20.20.6     ] 50165/0 Read event,
read buffer addr 0x97546DF4, length 2048, cursor 0
*Oct  9 04:16:53.478: WA-IO   : Ca1         [20.20.20.6     ] 50165/0 Read event,
Read blocked, cursor 0
*Oct  9 04:16:53.622: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy, Session
found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:53.622: WA-INFT : Ca1         [20.20.20.6     ] 50165 TCP FIN,
dport 443
*Oct  9 04:16:53.622: WA-IO   : Ca1         [20.20.20.6     ] 50165/0 Read event,
read buffer addr 0x97546DF4, length 2048, cursor 0
*Oct  9 04:16:53.622: %HTTPS: SSL read fail (-6992)
*Oct  9 04:16:53.622: WA-ERROR: Ca1         [20.20.20.6     ] 50165/0 Read event,
Socket read error [ERROR] errno=5
*Oct  9 04:16:53.622: WA-HTTPD: Ca1         [20.20.20.6     ] 50165/0 Remove IO
ctx and close
socket, id [AB00002C]
*Oct  9 04:16:53.622: WA-HTTPD: Ca1         [20.20.20.6     ] 50165/0 Remove IO
ctx - Closed
SSL connection
*Oct  9 04:16:53.623: WA-CLNT : Ca1         [20.20.20.6     ] 50165 Client conn
timer start
[0021.6a89.51ca] ioctx [AB00002C]
*Oct  9 04:16:53.635: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.943: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.943: WA-INFT : Ca1         [20.20.20.6     ] 50166 TCP SYN [3],
dport 443, LOGIN state
*Oct  9 04:16:54.947: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.947: WA-HTTPD: Ca1         [20.20.20.6     ] 50166/0 HTTP
Intercept, New fd 0, sport [50166], info hdl [0x3D00000B], mac [0021.6a89.51ca]
*Oct  9 04:16:54.947: WA-HTTPD: Ca1         [20.20.20.6     ] 50166/0 Create
IO ctx, id [E300002D], pid 208
*Oct  9 04:16:54.947: WA-CLNT : Ca1         [20.20.20.6     ] 50166 Client conn add
[0021.6a89.51ca] ioctx [E300002D] #3 pid 208
*Oct  9 04:16:54.947: WA-IO   : Ca1         [20.20.20.6     ] 50166/0 IO state
NEW -> SSL_HANDSHAKING
*Oct  9 04:16:54.947: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.952: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.955: WA-IO   : Ca1         [20.20.20.6     ] 50166/0 IO state
SSL_HANDSHAKING -> READING
*Oct  9 04:16:54.955: WA-IO   : Ca1         [20.20.20.6     ] 50166/0 Read event,
read buffer addr 0x97577F50, length 2048, cursor 0
*Oct  9 04:16:54.956: WA-IO   : Ca1         [20.20.20.6     ] 50166/0 Read event,
Read blocked, cursor 0
*Oct  9 04:16:54.971: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.971: WA-INFT : Ca1         [20.20.20.6     ] 50166 TCP FIN,
dport 443
*Oct  9 04:16:54.971: WA-IO   : Ca1         [20.20.20.6     ] 50166/0 Read event,
read buffer addr 0x97577F50, length 2048, cursor 0
*Oct  9 04:16:54.971: %HTTPS: SSL read fail (-6992)
*Oct  9 04:16:54.971: WA-ERROR: Ca1         [20.20.20.6     ] 50166/0 Read event,
Socket read error [ERROR] errno=5
*Oct  9 04:16:54.971: WA-HTTPD: Ca1         [20.20.20.6     ] 50166/0 Remove IO
ctx and close socket, id [E300002D]
*Oct  9 04:16:54.971: WA-HTTPD: Ca1         [20.20.20.6     ] 50166/0 Remove IO
ctx - Closed SSL connection
*Oct  9 04:16:54.971: WA-CLNT : Ca1         [20.20.20.6     ] 50166 Client conn
timer start [0021.6a89.51ca] ioctx [E300002D]
*Oct  9 04:16:54.972: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.972: WA-INFT : Ca1         [20.20.20.6     ] 50167 TCP SYN [4],
dport 443, LOGIN state
*Oct  9 04:16:54.978: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.978: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.978: WA-HTTPD: Ca1         [20.20.20.6     ] 50167/0 HTTP
Intercept, New fd 0, sport [50167], info hdl [0x3D00000B], mac [0021.6a89.51ca]
*Oct  9 04:16:54.978: WA-HTTPD: Ca1         [20.20.20.6     ] 50167/0 Create IO
ctx, id [3B00002E], pid 208
*Oct  9 04:16:54.978: WA-CLNT : Ca1         [20.20.20.6     ] 50167 Client conn
add [0021.6a89.51ca] ioctx [3B00002E] #4 pid 208
*Oct  9 04:16:54.978: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 IO state
NEW -> SSL_HANDSHAKING
*Oct  9 04:16:54.978: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.985: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:54.988: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 IO state
SSL_HANDSHAKING -> READING
*Oct  9 04:16:54.988: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 Read event,
read buffer addr 0x97546DF4, length 2048, cursor 0
*Oct  9 04:16:54.989: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 Read event,
Read blocked, cursor 0
*Oct  9 04:16:55.004: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:55.004: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 Read event,
read buffer addr 0x97546DF4, length 2048, cursor 0
*Oct  9 04:16:55.004: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 Read event,
Read blocked, cursor 555
*Oct  9 04:16:55.004: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 Read event,
Message ready
*Oct  9 04:16:55.004: HTTP: token [STRING] len 4: 'POST'
*Oct  9 04:16:55.004: WA-CLNT : Ca1         [20.20.20.6     ] 50167 Client conn
set authc ctx [0021.6a89.51ca] ioctx [3B00002E]
*Oct  9 04:16:55.004: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.004: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.004: HTTP: token [STRING] len 4: 'HTTP'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.004: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.004: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:55.004: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.004: HTTP: token [STRING] len 6: 'Accept'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.004: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.004: HTTP: token [STRING] len 5: 'image'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.004: HTTP: token [STRING] len 4: 'jpeg'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.004: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.004: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.004: HTTP: token [STRING] len 1: 'x'
*Oct  9 04:16:55.004: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.004: HTTP: token [STRING] len 2: 'ms'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: 'image'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'gif'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 4: 'xaml'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '+'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'xml'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: 'image'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: 'pjpeg'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: 'x'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 2: 'ms'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 4: 'xbap'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '*'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '*'
*Oct  9 04:16:55.005: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 4: 'User'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: 'Agent'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 7: 'Mozilla'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '4'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '('
*Oct  9 04:16:55.005: HTTP: token [STRING] len 10: 'compatible'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 4: 'MSIE'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '8'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 7: 'Windows'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 2: 'NT'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '6'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 7: 'Trident'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '4'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: 'SLCC2'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'NET'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'CLR'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '2'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: '50727'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'NET'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'CLR'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '3'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '5'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: '30729'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'NET'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 3: 'CLR'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '3'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: '30729'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ';'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 5: 'Media'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 6: 'Center'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 2: 'PC'
*Oct  9 04:16:55.005: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '6'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 1: '0'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: ')'
*Oct  9 04:16:55.005: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 7: 'Content'
*Oct  9 04:16:55.005: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.005: HTTP: token [STRING] len 4: 'Type'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 11: 'application'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '/'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 1: 'x'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 3: 'www'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 4: 'form'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 10: 'urlencoded'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 6: 'Accept'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 8: 'Encoding'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 4: 'gzip'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ','
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 7: 'deflate'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 4: 'Host'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 3: '192'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 3: '168'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 3: '200'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '.'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 1: '1'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 7: 'Content'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 6: 'Length'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: '52'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 10: 'Connection'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 4: 'Keep'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 5: 'Alive'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 5: 'Cache'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 7: 'Control'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: 'no'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 5: 'cache'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 6: 'Accept'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 8: 'Language'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: ':'
*Oct  9 04:16:55.006: HTTP: token [SPACE ] len 1: ' '
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: 'en'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '-'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: 'US'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [CRLF  ] len 2: '\15\12'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: 'au'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '_'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 10: 'pxytimetag'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '='
*Oct  9 04:16:55.006: HTTP: token [STRING] len 10: '1023410187'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '&'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 7: 'consent'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '_'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 6: 'status'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '='
*Oct  9 04:16:55.006: HTTP: token [STRING] len 6: 'accept'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '&'
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: 'ok'
*Oct  9 04:16:55.006: HTTP: token [OTHER ] len 1: '='
*Oct  9 04:16:55.006: HTTP: token [STRING] len 2: 'OK'
*Oct  9 04:16:55.006: WA-HTTPD: Ca1         [20.20.20.6     ] 50167 Parse Consent
POST, au_pxytimetag [0x3D00000B]
*Oct  9 04:16:55.006: WA-HTTPD: Ca1         [20.20.20.6     ] 50167 Parse Consent
POST, consent status [accept]
*Oct  9 04:16:55.006: WA-HTTPD: Ca1         [20.20.20.6     ] Convey consent result
to SM, Attr mac: 0021.6a89.51ca
*Oct  9 04:16:55.006: AUTH-EVENT: [0021.6a89.51ca, Ca1] Authc success from
WebAuth (3), status OK (0) / event success (0)

*Oct  9 04:16:55.006: AUTH-EVENT: [0021.6a89.51ca, Ca1] Highest prio method:
INVALID, Authz method: INVALID, Conn hdl: webauth
*Oct  9 04:16:55.006: AUTH-EVENT: Raised event APPLY_USER_PROFILE (13) on handle
0x10000016
*Oct  9 04:16:55.006: AUTH-EVENT: Raised event RX_METHOD_AUTHC_SUCCESS (3)
on handle 0x10000016
*Oct  9 04:16:55.006: AUTH-EVENT: [0021.6a89.51ca, Ca1] Queued AUTHC SUCCESS
from WebAuth for session 0x10000016 (0021.6a89.51ca)
*Oct  9 04:16:55.006: WA-HTTPD: Ca1         [20.20.20.6     ] Convey consent result
to SM, [OK]
*Oct  9 04:16:55.006: WA-STATE: Ca1         [20.20.20.6     ] State LOGIN ->
AUTHC_SUCCESS

*Oct  9 04:16:55.006: WA-TIMER: Ca1         [20.20.20.6     ] State timer stop
*Oct  9 04:16:55.006: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 IO state
READING -> AUTHENTICATING
*Oct  9 04:16:55.006: AUTH-EVENT: [0021.6a89.51ca, Ca1] Received internal event
APPLY_USER_PROFILE (handle 0x10000016)
*Oct  9 04:16:55.006: AUTH-EVENT: [0021.6a89.51ca, Ca1] Clearing AAA data for:
0021.6a89.51ca
*Oct  9 04:16:55.006: AUTH-SYNC: [0021.6a89.51ca, Ca1] Delay add/update sync of
username for 0021.6a89.51ca / 0x10000016
*Oct  9 04:16:55.006: AUTH-EVENT: [0021.6a89.51ca, Ca1] Received User-Name
0021.6a89.51ca for client 0021.6a89.51ca
*Oct  9 04:16:55.007: AUTH-SYNC: [0021.6a89.51ca, Ca1] Delay add/update sync of
auth-domain for 0021.6a89.51ca / 0x10000016
*Oct  9 04:16:55.007: AUTH-SYNC: [0021.6a89.51ca, Ca1] Delay add/update sync of
target-scope for 0021.6a89.51ca / 0x10000016
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Existing AAA ID: 0x00000015
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Method webauth changing state from 'Running' to 'Authc Success'
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Context changing state from 'Running' to 'Authc Success'
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Non-SM policy applied for
0x10000016. Authz_attrs not freed
*Oct  9 04:16:55.007: AUTH-EVENT: Handling client event RX_METHOD_AUTHC_SUCCESS
(3) for PRE, handle 0x10000016
*Oct  9 04:16:55.007: AUTH-SYNC: [0021.6a89.51ca, Ca1] Delay add/update sync of method
for 0021.6a89.51ca / 0x10000016
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] SM will not apply policy for
RX_METHOD_AUTHC_SUCCESS on 0x10000016 / 0021.6a89.51ca
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing default action(s)
for event RX_METHOD_AUTHC_SUCCESS for session 0x10000016.
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Executing default action
handler for AUTHC SUCCESS (0x10000016)
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] AUTHC_SUCCESS -
authorize by default
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Signalling Authz success for
client 0021.6a89.51ca
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Client 0021.6a89.51ca,
Context changing state from 'Authc Success' to 'Authz Success'
*Oct  9 04:16:55.007: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing SM CB request for
0x10000016: Event: Authorize request (216)
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
received authentication response, status=0 AAA ID=0 protocol=0
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Received message from webauth queue: 1
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
IOS Auth Event - Authentication Success!
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Final flag
values are, epmSendAcl 1, epmSendAclDone 0
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca  client
incoming attribute size are 43
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
received RADIUS attr type 450
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Username
entry (0021.6a89.51ca) created for mobile
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
Requesting post-auth policy application to EPM
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Send
request to EPM
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca aaa
attribute list length is 43
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Sending
Activate request for session handle 268435477 successful
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Post-auth
policy request sent! Now wait for post-auth policy ACK from EPM
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Setting the
epmSendAclDone flag.
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change state
to WEBAUTH_NOL3SEC (14) last state WEBAUTH_REQD (8)
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
PEM_UPDATE_STATE to RUN, EPM POLICY ACK not received yet, moving client to
AUTHZ_WAIT state
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change state
to AUTHZ_WAIT (19) last state WEBAUTH_NOL3SEC (14)
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: wcdb_is_auth_changed: Client
in AUTHZ_WAIT state, Not changing WCDB auth state
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Stopping
deletion of Mobile Station: (callerId: 74)
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Session
Timeout is 1800 - starting session timer for the mobile
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
AUTHZ_WAIT (19) Reached PLUMBFASTPATH: from line 4289
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
AUTHZ_WAIT (19) Replacing Fast Path rule^M   on AP  c8f9.f983.4260 , slot 1 802.1P =
0^M
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
AUTHZ_WAIT (19) Successfully plumbed mobile rule
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WEBAUTH:
callback status - authentication succeeded
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg
Add SCB(3)
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca 20.20.20.6,
auth_state 19 mmRole Local !!!
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca 20.20.20.6,
auth_state 19 mmRole Local, updating wcdb not needed
*Oct  9 04:16:55.007: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Tclas Plumb
needed: 0
*Oct  9 04:16:55.008: AUTH-EVENT: Raising ext evt Template Deactivated (10) on
session 0x10000015, client (unknown) (0), hdl 0x00000000, attr_list 0x5A00033F
*Oct  9 04:16:55.008: AUTH-EVENT: SM will not send event Template Deactivated
to PRE for 0x10000015
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Init feature, client
handle 58b5800000001c session 10000015 authz 1f000015
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Activate feature
client handle 58b5800000001c sess 10000015 authz 1f000015
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Policy
enforcement -  client handle 58b5800000001c session 7600000b authz 1f000015
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: EPM: Netflow policy
enforcement - client handle 58b5800000001c sess 7600000b authz 1f000015 msg_type 0
policy_status 0 attr len 0
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg
Epm spi response(12)
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
activate_features_resp for client handle 24969359310979100
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
activate_features_resp for EPM session handle 268435477
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg Epm
spi response(12)
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
policy_enforcement_response for client handle 24969359310979100
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
policy_enforcement_response for EPM session handle 1979711499
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
response for _EPM_SPI_ACTIVATE_FEATURES request sent for client
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Received
_EPM_SPI_STATUS_SUCCESS for request sent for client
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Post-auth
policy ACK recvd from EPM, unset flag on MSCB
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Client in
AUTHZ_WAIT state, advance to RUN
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Change
state to RUN (20) last state AUTHZ_WAIT (19)
*Oct  9 04:16:55.008: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca
WCDB_CHANGE: Client 1 m_vlan 20 Radio iif id 0x6025800000000e bssid iif id
0x498f800000001b, bssid c8f9.f983.4260
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_AUTH:
Adding opt82 len 0
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_LLM:
prev Mob state 1 curr Mob State 1 llReq flag 0
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca auth state 4
mob state 1 setWme 0 wme 1 roam_sent 0
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca WCDB_CHANGE:
auth=RUN(4) vlan 20 radio 1 client_id 0x58b5800000001c mobility=Local(1) src_int
0x45e7800000000c dst_int 0x0 ackflag 2 reassoc_client 0 llm_notif 0 ip  20.20.20.6
ip_learn_type DHCP
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
RUN (20) Reached PLUMBFASTPATH: from line 3862
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
RUN (20) Replacing Fast Path rule^M   on AP  c8f9.f983.4260 , slot 1 802.1P = 0^M
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm:  0021.6a89.51ca  20.20.20.6
RUN (20) Successfully plumbed mobile rule
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: PEM recv processing msg
Add SCB(3)
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca 20.20.20.6,
auth_state 20 mmRole Local !!!
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca 20.20.20.6,
auth_state 20 mmRole Local, updating wcdb not needed
*Oct  9 04:16:55.009: %IOSXE-7-PLATFORM: 1 process wcm: 0021.6a89.51ca Tclas Plumb
needed: 0
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] Authz complete (SUCCESS)
for client 0021.6a89.51ca/0x10000016 reported
*Oct  9 04:16:55.010: AUTH-EVENT: Raised event AUTHZ_SUCCESS (10) on handle
0x10000016
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] Received internal event
AUTHZ_SUCCESS (handle 0x10000016)
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing AUTHZ_CB RESULT
(success) for 0x10000016
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] Processing SM CB request for
0x10000016: Event: Authz result processed (215)
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] Authz result processed,
result: 0
*Oct  9 04:16:55.010: WA-SM   : Ca1         [20.20.20.6     ] AAA result procd,
[SUCCESS] [NO FAILURE], info hdl 3D00000B, SM hdl 10000016
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] SM Reauth Plugin:
Client authz change, result=Success
*Oct  9 04:16:55.010: AUTH-EVENT: [0021.6a89.51ca, Ca1] Signalling Authz complete
(success) for client 0x10000016
*Oct  9 04:16:55.010: WA-HTTPD: Ca1         [20.20.20.6     ] 50167/0 AAA result [7],
info hdl 3D00000B
*Oct  9 04:16:55.010: WA-AAA  : Ca1         [20.20.20.6     ] 50167/0 AAA reply
Successful
*Oct  9 04:16:55.010: WA-STATE: Ca1         [20.20.20.6     ] State
AUTHC_SUCCESS -> HTTP_FIN_WAIT
*Oct  9 04:16:55.010: WA-TIMER: Ca1         [20.20.20.6     ] FIN-wait timer
start (3 secs)
*Oct  9 04:16:55.011: WA-PAGE : Ca1         [20.20.20.6     ] 50167 Sending Consent
logout page, logout [https://192.168.200.1/logout.html] final [-]
*Oct  9 04:16:55.011: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 IO state
AUTHENTICATING -> WRITING
*Oct  9 04:16:55.011: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 Write event,
buffer addr 0x97577F9C, length 1567, cursor 0
*Oct  9 04:16:55.011: WA-IO   : Ca1         [20.20.20.6     ] 50167/0 IO state
WRITING -> END
*Oct  9 04:16:55.011: WA-HTTPD: Ca1         [20.20.20.6     ] 50167/0 Remove IO
ctx and close socket,
id [3B00002E]
*Oct  9 04:16:55.011: WA-HTTPD: Ca1         [20.20.20.6     ] 50167/0 Remove IO
ctx - Closed SSL connection
*Oct  9 04:16:55.011: WA-CLNT : Ca1         [20.20.20.6     ] 50167 Client conn
timer start [0021.6a89.51ca] ioctx [3B00002E]
*Oct  9 04:16:55.017: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:55.017: WA-QLFY : Ca1         [20.20.20.6     ] Ingress qlfy,
Session found, ACL in-place, mac [0021.6a89.51ca], intercept
*Oct  9 04:16:55.017: WA-INFT : Ca1         [20.20.20.6     ] 50167 TCP FIN,
dport 443
*Oct  9 04:16:58.010: WA-TIMER: Ca1         [20.20.20.6     ] FIN-wait timer timeout
*Oct  9 04:16:58.010: WA-STATE: Ca1         [20.20.20.6     ] State
HTTP_FIN_WAIT -> AUTHZ
*Oct  9 04:16:58.010: WA-ACL  : Ca1         [20.20.20.6     ] Remove IPv4
intecept ACL via FFM, name
"IP-Adm-V4-Int-ACL-global", pri 50, IIF 58B5800000001C  
*Oct  9 04:16:58.011: WA-ACL  : Ca1         [20.20.20.6     ] Remove IPv6
intecept ACL via FFM, name
"IP-Adm-V6-Int-ACL-global", pri 52, IIF 58B5800000001C  
*Oct  9 04:16:58.011: WA-ACL  : Ca1         [20.20.20.6     ] Add IPv4 logout
ACL via FFM, name
"IP-Adm-V4-LOGOUT-ACL-1027", pri 51, IIF 58B5800000001C  
*Oct  9 04:17:01.354: WA-CLNT :             [20.20.20.6     ] 50164 Client conn
timer exp [0021.6a89.51ca] ioctx [6B00002B]
*Oct  9 04:17:01.354: WA-CLNT :             [20.20.20.6     ] 50164 Client conn
del [0021.6a89.51ca] ioctx [6B00002B] #3
*Oct  9 04:17:03.623: WA-CLNT : [20.20.20.6     ] 50165 Client conn timer exp
[0021.6a89.51ca] ioctx [AB00002C]
*Oct  9 04:17:03.623: WA-CLNT [20.20.20.6     ] 50165 Client conn del
[0021.6a89.51ca] ioctx [AB00002C] #2
*Oct  9 04:17:04.971: WA-CLNT :             [20.20.20.6     ] 50166 Client conn
timer exp [0021.6a89.51ca] ioctx [E300002D]
*Oct  9 04:17:04.971: WA-CLNT :             [20.20.20.6     ] 50166 Client conn
del [0021.6a89.51ca] ioctx [E300002D] #1
*Oct  9 04:17:05.012: WA-CLNT :             [20.20.20.6
[0021.6a89.51ca] ioctx [3B00002E]
*Oct  9 04:17:05.012: WA-CLNT :             [20.20.20.6     ] 50167 Client conn
del [0021.6a89.51ca] ioctx [3B00002E] #0

Updated: Dec 17, 2013
Document ID: 116879