##################### Troubleshooting session for AP: 94:64:24:c1:45:e4 ##################### === Troubleshooting session started === Command show tech-support takes few minutes to execute. =================================== Output Time: 2022-08-05 09:34:41 UTC COMMAND=show tech-support show clock Current Time :2022-08-05 12:34:35 end of show clock ======================================================== show cpu total: user 0% nice 0% system 0% idle 99% io 0% irq 0% softirq 1% cpu0: user 0% nice 0% system 0% idle 98% io 0% irq 0% softirq 2% cpu1: user 0% nice 0% system 0% idle 100% io 0% irq 0% softirq 0% cpu2: user 0% nice 0% system 0% idle 100% io 0% irq 0% softirq 0% cpu3: user 0% nice 0% system 0% idle 100% io 0% irq 0% softirq 0% end of show cpu ======================================================== show cpu details Mem: 603936K used, 1139164K free, 0K shrd, 19424K buff, 136032K cached Load average: 1.00 1.00 1.00 (Status: S=sleeping R=running, W=waiting) PID USER STATUS RSS PPID %CPU %MEM COMMAND 7985 root S N 23204 7908 0.1 1.3 sapd 8047 root S 4684 7908 0.1 0.2 ble_daemon 7915 root S 2308 7908 0.1 0.1 redis-server 11786 root R < 448 11785 0.1 0.0 top 7956 root S < 53460 7908 0.0 3.0 cli 6000 root S 7780 1 0.0 0.4 cnssdaemon 7995 root S < 6536 7908 0.0 0.3 stm 7953 root S N 6276 7908 0.0 0.3 awc 8025 root S 4840 7908 0.0 0.2 mdns 8081 root S 4432 7908 0.0 0.2 ble_relay 8115 root S 4272 7908 0.0 0.2 off-loader 8020 root S 4068 7908 0.0 0.2 snmpd_sap 7945 root S < 3704 7908 0.0 0.2 msgHandler 9280 root S 3532 7908 0.0 0.2 radiusd-term 8914 root S 3516 7908 0.0 0.2 radiusd 8443 root S N 3392 1 0.0 0.1 mini_httpd 8127 root S 3368 7908 0.0 0.1 telemetryd 8446 root S N 3308 1 0.0 0.1 mini_httpd 8756 root S < 3232 7956 0.0 0.1 clarity_dnsdhcp 7982 root S < 3064 7908 0.0 0.1 udmd 8041 root S 2876 7908 0.0 0.1 lldpd end of show cpu details ======================================================== show summary support Name :SetMeUp-C1:45:E4 System Location : Domain :KW VC IP Address :0.0.0.0 VC IPv6 Address ::: AP1X :NONE VC VLAN :0 VC Mask :0.0.0.0 VC Gateway :0.0.0.0 VC DNS :0.0.0.0 IP Mode :v4-only Cluster-Security DTLS:disable Content Filtering :disable Terminal Access :enable Telnet Server :disable Activate Disable :disable Organization : Disable ciphers : Airwave Server : Airwave Backup Server: Airwave Prov Backup : Number of VC transition :0 Airwave Shared Key : Airwave Config Via :DHCP Airwave :Not Set Up Aruba Central Server :device-eucentral3.central.arubanetworks.com Aruba Central :Connected Managed Via :Aruba Central Syslog Server :0.0.0.0 Syslog Server :0.0.0.0 Syslog Server :0.0.0.0 Syslog Level :warn Band :all Conductor IP Address *:192.168.2.230 IP Address :192.168.2.230 Netmask :255.255.255.0 Gateway :192.168.2.3 IPv6 Address :-- DNSDomain :aruba.lan Conductor Key :034762d6013c31eefe61fab8cffd40472c9b76645ba512325c Elected Time :2h:4m:34s Dynamic Radius Proxy :disable Dynamic Tacacs Proxy :disable NTP Server :pool.ntp.org Configuration Dirty :disable Allow New APs :enable Classification :disable Containment Confirm :disable Wireless Containment :disable Wired Containment :disable Wired Containment AP Adjacent MAC :disable Wired Containment Suspect L3 Rogue :disable Rogue Containment :disable LED Off :disable AppRF Visibility :none URL Visibility :disable WebCC Visibility :disable Image Server State :success Image Server Message :Success New Image Version : New Image URL : New DRT Version :1.0_84631 New DRT URL :https://h30326.www3.hpe.com/hpn/reg-data-1.0?merchantId=CCS_DROPBOX Factory SSID :SetMeUp Image Sync Via :Conductor AP Alerts :0 Client Alerts :0 Active Faults :0 Fault History :0 Usb Support :YES Serial Number :CNMYKYJ09J OpenDNS Status :Not connected TFTP Dump Server :0.0.0.0 Extended SSID :enable Mesh role detect :disable Inactivity-ap-timeout:60 Config Sync Status :TRUE VPN Status :Not Set Up Mobility Acccess Switch Integration :disable Deny inter user bridging :disable Deny local routing :disable Support Connection Status :Not Connected Dynamic CPU Management:auto Restrict Corporate Access:disable SLAAC IP Address:-- Link Local IP Address:-- 0 Clients --------- MAC Name IP Address ESSID Access Point --- ---- ---------- ----- ------------ 1 Network --------- Profile Name ESSID Clients Status Type ------------ ----- ------- ------ ---- HADI_WDU2 HADI_WDU2 0 Enabled employee 1 Access Point -------------- MAC IP Address Name Clients Need Antenna Config --- ---------- ---- ------- ------------------- 94:64:24:c1:45:e4 192.168.2.230 94:64:24:c1:45:e4 0 No Restricted Management Access Subnets ------------------------------------ Subnet IP Address Subnet Mask ----------------- ----------- RADIUS Servers -------------- Name IP Address Port Key Timeout Retry Count NAS IP Address NAS Identifier RFC3576 Airgroup RFC3576-ONLY Airgroup RFC3576 port DRP IP DRP Mask DRP VLAN DRP Gateway RFC5997 ---- ---------- ---- --- ------- ----------- -------------- -------------- ------- --------------------- --------------------- ------ -------- -------- ----------- ------- InternalServer 127.0.0.1 1616 047a19bf96b48edd1ada65bd21d13b1407df39e2c6eb3b49015171ca8e3121e4062fcba800ed964673129f0a7a335ccec1fa7f12967dd0466d967d7f4b361962 5 3 0 n RTLS Servers ------------ Type Address Port Key Frequency Include Unassociated Stations CM ---- ------- ---- --- --------- ----------------------------- -- Aeroscout 0 disable N/A Airwave 0 0 disable enable 1 AP Class ---------- Name APs ---- --- Norma 1 Uplink type :Ethernet Uplink status :UP OOS Hold On Time :30 Manual Denylist Count :0 Dyn Denylist Count :0 Certificate Installed: :No Internal Radius Users :0 Internal Guest Users :0 Internal User Open Slots :512 Openflow Server : Openflow Server Port:30633 Openflow Server tls-enable:False PAN Firewall Port :443 PAN Firewall Status :Disabled Auto save :Enabled Stats Sample Cnt :15 Stats Interval :5 Monitor Interval :0 Need central wizard :No Info timestamp :7553 Uplink switch native VLAN:0 Radius RFC3576 Listen Port :3799 New Password :Do not change password split 5ghz mode :disable Application monitoring :disable Airslice policy :disable end of show summary support ======================================================== show version Aruba Operating System Software. ArubaOS (MODEL: 635), Version 8.9.0.0 Website: http://www.arubanetworks.com (c) Copyright 2021 Hewlett Packard Enterprise Development LP. Compiled on 2021-08-16 at 10:15:44 PDT (build 81161) by jenkins FIPS Mode :disabled AP uptime is 2 hours 5 minutes 56 seconds Reboot Time and Cause: AP rebooted Fri Aug 5 10:28:29 UTC 2022; Cloud mgmt cmd at uptime 0D 0H 6M 38S: reload end of show version ======================================================== show ap-env Antenna Type:Internal IoT Antenna Type:Internal Need USB field:Yes standalone_mode:1 iap_zone:HADIZONE1 installation_type:indoor uap_controller_less:1 iap_rf_zone:ZONE1 radio_2_disable:disable enet1_mode:uplink end of show ap-env ======================================================== show running-config version 8.9.0.0-8.9.0 virtual-controller-country KW virtual-controller-key 034762d6013c31eefe61fab8cffd40472c9b76645ba512325c name SetMeUp-C1:45:E4 terminal-access ntp-server pool.ntp.org clock timezone Kuwait 03 00 rf-band all allow-new-aps allowed-ap 94:64:24:c1:45:e4 arm wide-bands 24ghz,5ghz 80mhz-support min-tx-power 9 max-tx-power 127 band-steering-mode balance-bands air-time-fairness-mode default-access channel-quality-aware-arm-disable client-aware scanning rf dot11g-radio-profile max-distance 0 max-tx-power 9 min-tx-power 6 disable-arm-wids-functions off free-channel-index 40 rf dot11g-radio-profile HADI zone ZONE1 max-tx-power 9 min-tx-power 6 rf dot11a-radio-profile max-distance 0 max-tx-power 18 min-tx-power 12 disable-arm-wids-functions off rf dot11a-radio-profile HADI zone ZONE1 max-tx-power 18 min-tx-power 12 syslog-level warn ap-debug syslog-level warn network syslog-level warn security syslog-level warn system syslog-level warn user syslog-level warn user-debug syslog-level warn wireless extended-ssid web-server ssl-protocol tlsv1_2 vlan-name HADI_WDU vlan HADI_WDU 47 hash-mgmt-password hash-mgmt-user admin password hash ************************************************************************** wlan access-rule default_wired_port_profile index 0 rule any any match any any any permit wlan access-rule wired-SetMeUp index 1 rule masterip 0.0.0.0 match tcp 80 80 permit rule masterip 0.0.0.0 match tcp 4343 4343 permit rule any any match udp 67 68 permit rule any any match udp 53 53 permit wlan access-rule HADI_WDU2 utf8 index 2 rule any any match any any any permit wlan ssid-profile HADI_WDU2 enable index 0 zone HADIZONE1 type employee essid HADI_WDU2 utf8 wpa-passphrase 4620b2e8605a1befbb0596cad4cb3379df4cddb2b669b170 opmode wpa3-sae-aes max-authentication-failures 0 vlan HADI_WDU auth-server InternalServer rf-band all captive-portal disable dtim-period 1 broadcast-filter arp blacklist dmo-channel-utilization-threshold 90 local-probe-req-thresh 0 max-clients-threshold 64 auth-survivability cache-time-out 24 wlan external-captive-portal server localhost port 80 url "/" auth-text "Authenticated" auto-whitelist-disable https blacklist-time 3600 auth-failure-blacklist-time 3600 ids wireless-containment none wired-port-profile wired-SetMeUp switchport-mode access allowed-vlan all native-vlan guest no shutdown access-rule-name wired-SetMeUp speed auto duplex auto no poe type guest captive-portal disable no dot1x wired-port-profile default_wired_port_profile switchport-mode trunk allowed-vlan all native-vlan 1 no shutdown access-rule-name default_wired_port_profile speed auto duplex full no poe type employee captive-portal disable no dot1x enet0-port-profile default_wired_port_profile uplink preemption enforce none failover-internet-pkt-lost-cnt 10 failover-internet-pkt-send-freq 30 failover-vpn-timeout 180 airgroup disable airgroupservice airplay disable description AirPlay airgroupservice airprint disable description AirPrint ipm enable clarity inline-sta-stats inline-auth-stats inline-dhcp-stats inline-dns-stats cluster-security allow-low-assurance-devices end of show running-config ======================================================== show swarm state AP Swarm State :swarm_config_sync_complete mesh auto eth0 bridging :no Config in flash :yes factory SSID in flash :no extended-ssid configured :yes extended-ssid active :yes advanced-zone configured :no Factory default status :no Source of system time :NTP server Config load cnt :1 VC Channel index :1 IDS Client Gateway Detect :yes Config Init success cnt for heartbeat :0 Config Init success cnt for register :0 Config Init skipping cnt for heartbeat :0 Config Init skipping cnt for register :0 Config Init last success reason :N/A Config Init last success time :N/A Radio down state :0x0 / 0x0 / 0x0 Thermal Protect state :None 6gHz VAP numbers :0 / 0 end of show swarm state ======================================================== show provision state UAP platform :yes Provisioning finished :yes Source of rule in flash :cloud Type of rule in flash :Central Central server of rule in flash :device-eucentral3.central.arubanetworks.com Valid rule retrieved :yes Cloud rule change :no Mandatory upgrade received:no Ready for Mandatory upgrade:yes mandatory upgrade url set:no Interval of provision rule check (Mins) :10080 Next round of provision remains (Mins) :9958 Max provision interval (Mins) :10080 Time elapsed from last register request :7454 Mandatory Upgrade Image Server List ----------------------------------- Domain/IP Address Protocol Type TCP Connection Status ----------------- -------- ---- --------------------- Connection Try Counts :0 end of show provision state ======================================================== show ap debug cloud-server IAP mgmt mode :athena-mgmt cloud config recved :TRUE autojoin mode :disable state diff :disable Device Cert status :SUCCESS Cert Verify :enable Domain Name Verify :enable Device info send :SUCCESS Aruba Central server :device-eucentral3.central.arubanetworks.com Aruba Central server path :/ws Aruba Central proxy server :None Aruba Central redirect from :device-eucentral3.central.arubanetworks.com Aruba Central Protocol :WSS Aruba Central uptimes :2h:2m:28s Aruba Central status :Login_done Cloud Debug Statistics ----------------------- Key Value --- ----- Connect establish success 1(1) Connect establish failed 1(1) Login done times 1(1) Connect retry times 2(2) clarity send 6(6) Device Info send 1(1) Domain list receive 1(1) Domain response send 1(1) Cloud Last connect status ------------------------- Last connect ID :2 Last connect time :2022-08-05 10:32:06 Last connect trigger :retry connect Cloud Last connect fail status ------------------------- Last fail server :device-eucentral3.central.arubanetworks.com Last fail time :2022-08-05 10:31:05 Last fail reason :dns error Cloud Last login done status ------------------------- Last connect done :2022-08-05 10:32:07 end of show ap debug cloud-server ======================================================== show ap debug subscribe Subscribe Table --------------- Subscribe ID Type Interval(Sec) Expire Time Aggr Count Aggr Interval Aggr enable Age Total Sample Pkt Total Send Pkt ------------ ---- ------------- ----------- ---------- ------------- ----------- --- ---------------- -------------- s:eucentral3.internal.decoder.iap.ext:iap.stats.client.ext.periodic Periodic Update 300 0 0 0(No) No 7348 - 25 s:eucentral3.internal.decoder.iap.ext:iap.stats.radio.ext.periodic Periodic Update 300 0 0 0(No) No 7348 - 25 s:eucentral3.internal.decoder.iap:iap.state.clients.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.clients.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.ap.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.vpn.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.mesh.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.radio.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.wlan.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.btm.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.ids.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.pcap.sub:iap.event.pcap.onchange Change Event - 0 0 0(No) No 7348 - 0 s:eucentral3.ce.native.upstream.airslice:iap.fw.clientappstats.periodic Periodic Update 300 0 0 0(No) No 7348 - 0 s:eucentral3.internal.decoder.iap.event.sub:iap.event.config.onchange Change Event - 0 0 0(No) No 7348 - 3 end of show ap debug subscribe ======================================================== show ap debug subscribe-event-statistics Subscribe Statistics Table -------------------------- Name Event description Total Send Pkt ---- ----------------- -------------- s:eucentral3.internal.decoder.iap.event.sub:iap.event.config.onchange config_sync_success 3 end of show ap debug subscribe-event-statistics ======================================================== show activate status IAP MAC Address :94:64:24:c1:45:e4 IAP Serial Number :CNMYKYJ09J Cloud Activation Key :ARKROORR Activate Server :device.arubanetworks.com Activate Status :success Aruba Central Server :device-eucentral3.central.arubanetworks.com Last provision time :2022-08-05 10:34:08 Provision interval :10080 minutes end of show activate status ======================================================== show aps 1 Access Point -------------- Name IP Address Mode Spectrum Clients Type IPv6 Address Mesh Role Zone Serial # radio0 Channel radio0 Power (dBm) radio0 Utilization (%) radio0 Noise Floor (dBm) radio1 Channel radio1 Power (dBm) radio1 Utilization (%) radio1 Noise Floor (dBm) radio2 Channel radio2 Power (dBm) radio2 Utilization (%) radio2 Noise Floor (dBm) Need Antenna Config From Port Config Id Config Csum Ext SSID Active Age Link Local IP Address Uplink Port Hierarchy Mode Crash Info ---- ---------- ---- -------- ------- ---- ------------ --------- ---- -------- -------------- ------------------ ---------------------- ------------------------ -------------- ------------------ ---------------------- ------------------------ -------------- ------------------ ---------------------- ------------------------ ------------------- --------- --------- ----------- --------------- --- --------------------- ----------- -------------- ---------- 94:64:24:c1:45:e4 192.168.2.230* access disable 0 635(indoor) -- N/A HADIZONE1 CNMYKYJ09J - - - - - - - - - - - - No none 24 20823 enable 2h:4m:15s -- eth0 member No end of show aps ======================================================== show ap bss-table Aruba AP BSS Table ------------------ bss ess port ip band/ht-mode/bandwidth ch/EIRP/max-EIRP type cur-cl ap name in-t(s) tot-t flags --- --- ---- -- ---------------------- ---------------- ---- ------ ------- ------- ----- ----- Channel followed by "*" indicates channel selected due to unsupported configured channel. "Spectrum" followed by "^" indicates Local Spectrum Override in effect. Num APs:0 Num Associations:0 Flags: a = Airslice policy; A = Airslice app monitoring; c = MBO Cellular Data Capable BSS; d = Deferred Delete Pending; D = VLAN Discovered; E = Enhanced-open BSS without transition mode; I = Imminent VAP Down; K = 802.11K Enabled; m = Agile Multiband (MBO) BSS; M = WPA3-SAE mixed mode BSS; o = Enhanced-open transition mode open BSS; O = Enhanced-open BSS with transition mode; r = 802.11r Enabled; t = Broadcast TWT Enabled; T = Individual TWT Enabled; W = 802.11W Enabled; x = MBSSID Tx BSS; 3 = WPA3 BSS; end of show ap bss-table ======================================================== show ap debug auth-trace-buf Auth Trace Buffer ----------------- end of show ap debug auth-trace-buf ======================================================== show ap debug mgmt-frames Traced 802.11 Management Frames ------------------------------- Timestamp stype SA DA BSS signal Misc --------- ----- -- -- --- ------ ---- end of show ap debug mgmt-frames ======================================================== show ap association The phy column shows client's operational capabilities for current association Flags: H: Hotspot(802.11u) client, K: 802.11K client, M: Mu beam formee, R: 802.11R client, W: WMM client, w: 802.11w client, V: 802.11v BSS trans capable, P: Punctured preamble, U: HE UL Mu-mimo, O: OWE client, S: SAE client, E: Enterprise client, m: Agile Multiband client, C: Cellular Data Capable - network available, c: Cellular Data Capable - network unavailable, T: Individual TWT client, t: Broadcast TWT client PHY Details: HT : High throughput; 20: 20MHz; 40: 40MHz; t: turbo-rates (256-QAM) VHT : Very High throughput; 80: 80MHz; 160: 160MHz; 80p80: 80MHz + 80MHz HE : High Efficiency; 80: 80MHz; 160: 160MHz; 80p80: 80MHz + 80MHz ss: spatial streams Association Table ----------------- Name bssid mac auth assoc aid l-int essid vlan-id phy assoc. time num assoc Flags DataReady UAC ---- ----- --- ---- ----- --- ----- ----- ------- --- ----------- --------- ----- --------- --- Num Clients:0 end of show ap association ======================================================== show ap debug client-table Client Table ------------ MAC ESSID BSSID Assoc_State HT_State AID PS_State UAPSD TWT Tx_Pkts Rx_Pkts PS_Qlen Tx_Retries Tx_Rate Rx_Rate Last_ACK_SNR Last_Rx_SNR TX_Chains Tx_Timestamp Rx_Timestamp MFP Status (C,R) Idle time Client health (C/R) Tx_Bytes Rx_Bytes --- ----- ----- ----------- -------- --- -------- ----- --- ------- ------- ------- ---------- ------- ------- ------------ ----------- --------- ------------ ------------ ---------------- --------- ------------------- -------- -------- Num of associated clients: 0 UAPSD:(VO,VI,BK,BE,Max SP,Q Len) TWT:(iTWT sessions num, bTWT groups num) HT Flags: A - LDPC Coding; B - TX STBC; D - Delayed BA; G - Greenfield I - HT40 Intolerant; M - Max A-MSDU; N - A-MPDU disabled Q - Static SM PS; R - Dynamic SM PS; S - Short GI 40; W - 40 MHz b - RX STBC; s - Short GI 20; t - turbo-rates (256-QAM) VHT Flags: C - 160MHz/80+80MHz; E - Beamformee; V - Short GI 160 c - 80MHz; e - Beamformer; v - Short GI 80 HT_State shows client's original capabilities (not operational capabilities) MFP Status: C - 1 if the station is MFP capable; R - 1 if the station has negotiated MFP end of show ap debug client-table ======================================================== show ip route default via 192.168.2.3 dev br0 172.31.98.0/23 dev br0.3333 src 172.31.98.1 192.168.2.0/24 dev br0 src 192.168.2.230 end of show ip route ======================================================== show datapath user Datapath User Table Entries --------------------------- Flags: P - Permanent R - ProxyARP to User, N - VPN, L - local, I - Intercept, D - Deny local routing M - User Media Classified, K - OS known FM(Forward Mode): S - Split, B - Bridge, N - N/A IP MAC ACLs Contract Location Age Sessions Flags Vlan FM MediaSessCnt --------------- ----------------- --------- --------- -------- ----- --------- ----- ---- -- ------------ 192.168.2.230 94:64:24:C1:45:E4 105/0/108 0/0 0 0 1/65535 P 1 B 0 172.31.98.1 94:64:24:C1:45:E4 105/0/0 0/0 0 0 0/65535 P 3333 B 0 0.0.0.0 94:64:24:C1:45:E4 105/0/108 0/0 0 0 0/65535 P 1 B 0 end of show datapath user ======================================================== show datapath subnet Flags: L - Local, G - Gateway, D - DNS, S - Static Subnet Datapath Table --------------------- VLAN IP MASK MAC IP Age MAC Age Flags ---- -- ---- --- ------ ------- ----- 1 192.168.2.3 255.255.255.0 20:4c:03:02:f2:00 130 130 G 3333 172.31.98.1 255.255.254.0 94:64:24:c1:45:e4 0 0 LG end of show datapath subnet ======================================================== show datapath bridge Datapath Bridge Devices ----------------------------- Flags: F - source-filter, T - trusted, Q - tagged, I - IP S - split-tunnel, B - bridge, M - mesh, P - PPPoE, W - WAN C - content-filter, O - corp-access, h - to HAP, f - to FAP h - dhcp-redirect b - blocked by STP, H - Hierarchy AP connected Dev Name VLANs PVID ACLs MTU FramesRx FramesTx Flags --- ------------------------ ----- ---- ----------- ----- -------- -------- -------- 7 bond0 2 1 0/0 106 1500 14179 8334 FTQBW 16 br0 0 1 105/0 0 1300 8320 0 IB Datapath Bridge Table Entries ----------------------------- Flags: P - Permanent, D - Deny, R - Route, M - Mobile, X - Xsec, A - Auth AP Flags: X - Awaiting 1X reply, B - Block all non-1X traffic, F - Force bridge role, G - Gateway MAC VLAN Assigned VLAN Destination Flags AP Flags Bridge Role ACL ----------------- ---- ------------- ----------- ----- -------- --------------- AC:1F:6B:2E:CB:51 1 1 dev7 0 80:8D:B7:C1:2E:AC 1 1 dev7 0 94:64:24:C1:45:E4 1 1 local P 0 00:00:5E:00:01:02 1 1 dev7 0 00:24:A8:42:6C:00 1 1 dev7 0 80:8D:B7:C1:2B:04 1 1 dev7 0 94:64:24:C1:45:E4 3333 3333 local P 0 20:4C:03:02:F2:00 1 1 dev7 G 0 end of show datapath bridge ======================================================== show datapath route Route Table Entries ------------------- Flags: L - Local, P - Permanent, T - Tunnel, I - IPsec, M - Mobile, A - ARP, D - Drop, U - Use Default Gateway, G - PPPoE/3G/4G Gateway IP Mask Gateway Cost VLAN Flags --------------- --------------- --------------- ---- ---- ----- 0.0.0.0 0.0.0.0 192.168.2.3 0 0 172.31.98.0 255.255.254.0 172.31.98.1 0 3333 D 192.168.2.0 255.255.255.0 192.168.2.230 0 1 LP Route Cache Entries ------------------- Flags: L - local, P - Permanent, T - Tunnel, I - IPsec, M - Mobile, A - ARP, D - Drop, G - 3G/4G IP MAC VLAN Flags TunIdx --------------- ----------------- ----------- --------- ------ 192.168.2.230 94:64:24:C1:45:E4 1 LP 172.31.98.1 94:64:24:C1:45:E4 3333 LP end of show datapath route ======================================================== show datapath session Datapath Session Table Entries ------------------------------ Flags: F - fast age, S - src NAT, N - dest NAT D - deny, R - redirect, Y - no syn H - high prio, P - set prio, T - set ToS C - client, M - mirror, V - VOIP I - Deep inspect, U - Locally destined s - media signal, m - media mon, a - rtp analysis E - Media Deep Inspect, G - media signal A - Application Firewall Inspect L - ALG session O - Session is programmed through SDN/Openflow controller p - Session is marked as permanent h - Https redirect error page X - Http/https redirect for dpi denied session RAP Flags: 0 - Q0, 1 - Q1, 2 - Q2, r - redirect to conductor, t - time based, i - in flow Flow Offload Denylist Flags: O - Openflow, E - Default, U - User os unknown, T - Tunnel R - L3 route Source IP Destination IP Prot SPort Dport Cntr Prio ToS Age Destination TAge Packets Bytes Flags Offload flags ---------------- -------------- ---- ----- ----- ---- ---- --- --- ----------- ---- ------- ----- ------ ------------- 192.168.2.1 224.0.0.18 112 0 0 0 0 48 0 dev7 1d1f 1d1f 48cd8 FC 3.66.33.77 192.168.2.230 6 443 62550 0 0 0 0 local 1cb8 835 2543e 192.168.2.230 3.66.33.77 6 62550 443 0 0 0 0 local 1cb8 838 cb969 C end of show datapath session ======================================================== show datapath session dpi verbose Datapath Session Table Entries ------------------------------ Flags: F - fast age, S - src NAT, N - dest NAT D - deny, R - redirect, Y - no syn H - high prio, P - set prio, T - set ToS C - client, M - mirror, V - VOIP I - Deep inspect, U - Locally destined s - media signal, m - media mon, a - rtp analysis E - Media Deep Inspect, G - media signal A - Application Firewall Inspect L - ALG session O - Session is programmed through SDN/Openflow controller p - Session is marked as permanent h - Https redirect error page X - Http/https redirect for dpi denied session RAP Flags: 0 - Q0, 1 - Q1, 2 - Q2, r - redirect to conductor, t - time based, i - in flow Flow Offload Denylist Flags: O - Openflow, E - Default, U - User os unknown, T - Tunnel R - L3 route DPI Flags: a - app extraction done, b - URL extraction done c - copied to dpimgr, d - dropped reverse session on bca cache miss w - waiting for classification, e - enforcement done f - app classification done, g - webcc classification done o - ofa clickstream feed in progress p - app enforcement in progress n - app enforcement done q - qosmos/bca dpi done DPI WebRep: 1 - High Risk Sites, 2 - Suspicious Sites 3 - Moderate Risk Sites, 4 - Low Risk Sites 5 - Trustworthy Sites Session idx Source IP Destination IP Prot SPort Dport Cntr Prio ToS Age Destination TAge Packets Bytes App Webcat WebRep Packets Bytes PktsDpi InnerAppID PktsAppMoni Flags Offload flags DPIFlags ----------- ---------------- -------------- ---- ----- ----- ---- ---- --- --- ----------- ---- ------- ----- -------------------------- ------------------------- ------ ------- ----- ------- ---------- ----------- ------ ------------- --------- 1170 192.168.2.1 224.0.0.18 112 0 0 0 0 48 0 dev7 1d1f 1d1f 48cd8 App-Not-Class [0 ] Web-Not-Class [0 ] 0 1d1f 48cd8 0 ff 0 FC 8689 3.66.33.77 192.168.2.230 6 443 62550 0 0 0 0 local 1cb8 835 2543e App-Not-Class [0 ] Web-Not-Class [0 ] 0 835 2543e 0 ff 0 14974 192.168.2.230 3.66.33.77 6 62550 443 0 0 0 0 local 1cb8 838 cb969 App-Not-Class [0 ] Web-Not-Class [0 ] 0 838 cb969 0 ff 0 C end of show datapath session dpi verbose ======================================================== show datapath mcast Dev Vlans -------- ---------------------- dev7 1,3333 end of show datapath mcast ======================================================== show datapath acl-all The maximum programming ACE entries per ACL is 1024 Datapath All ACL Entries ----------------------- Flags: P - permit, L - log, E - established, M/e - MAC/etype filter S - SNAT, D - DNAT, R - redirect, r - reverse redirect m - Mirror J - Route Nexthop I - Invert SA, i - Invert DA, H - high prio, O - set prio, C - Classify Media A - Disable Scanning, B - black list, T - set TOS, t - time based, o - tunnel only K - App Throttle, s - Domain SA, d - Domain DA, 4 - IPv4, 6 - IPv6 c - Custom application ---------------------------------------------------------------- ACL Name {deny-all} Number {100} 1: 0x888e 0xffff any any Pe4 2: any any any e4 3: any any any 4 4: any any any 6 ---------------------------------------------------------------- ACL Name {permit-all} Number {101} 1: any any any Pe4 2: any any any P4 3: any any any P6 ---------------------------------------------------------------- ACL Name {mac-auth} Number {103} 1: any any 17 0-65535 67-68 P4 2: any any 17 0-65535 546-547 P6 3: 0x888e 0xffff any any Pe4 4: 0x0806 0xffff any any Pe4 5: any any any e4 6: any any any 4 7: any any any 6 ---------------------------------------------------------------- ACL Name {ap} Number {105} 1: 172.31.98.0 255.255.254.0 any any 192.168.2.230 PS4 2: any any 17 0-65535 53-53 P4 3: any any 17 0-65535 514-514 P4 4: any any 17 0-65535 514-514 P6 5: any any 17 0-65535 67-68 P4 6: any any 17 0-65535 546-547 P6 7: any any 17 0-65535 69-69 P4 8: any any 17 0-65535 69-69 P6 9: any any 17 0-65535 53-53 P4 10: any any 17 0-65535 53-53 P6 11: any any 17 0-65535 123-123 P4 hits 2 new_hits 2 12: any any 17 0-65535 123-123 P6 13: any any 6 0-65535 21-21 P4 14: any any 6 0-65535 21-21 P6 15: any any 6 0-65535 443-443 P4 16: any any 6 0-65535 443-443 P6 17: any any 6 0-65535 80-80 P4 18: any any 6 0-65535 80-80 P6 19: any any 6 0-65535 8080-8080 P4 20: any any 6 0-65535 8080-8080 P6 21: any any 6 0-65535 8081-8081 P4 22: any any 6 0-65535 8081-8081 P6 23: any any 6 0-65535 4343-4343 P4 hits 20 new_hits 20 24: any any 6 0-65535 4343-4343 P6 25: any any 17 0-65535 8211-8211 P4 26: any any 17 0-65535 8211-8211 P6 27: any any 17 0-65535 161-161 P4 28: any any 17 0-65535 161-161 P6 29: any any 1 0-65535 0-65535 P4 30: any any 58 0-65535 0-65535 P6 31: any any any P4 hits 2 new_hits 2 32: any any any P6 33: any any any Pe4 ---------------------------------------------------------------- ACL Name {magic-vlan} Number {106} 1: any 192.168.2.230 255.255.255.255 6 0-65535 22-22 P4 2: any 192.168.2.230 255.255.255.255 6 0-65535 23-23 P4 3: any 192.168.2.230 255.255.255.255 6 0-65535 4343-4343 P4 hits 20 new_hits 20 4: any 172.31.98.1 255.255.255.255 6 0-65535 22-22 P4 5: any 172.31.98.1 255.255.255.255 6 0-65535 23-23 P4 6: any 172.31.98.1 255.255.255.255 6 0-65535 4343-4343 P4 7: any any 17 0-65535 67-68 P4 8: any any any P6 hits 2 new_hits 2 9: any any any P4 hits 2 new_hits 2 10: any any any Pe4 ---------------------------------------------------------------- ACL Name {hierarchy} Number {107} 1: any any any P4 2: any any any P6 3: any any any Pe4 ---------------------------------------------------------------- ACL Name {pbr} Number {108} 1: any any any P4 hits 2 new_hits 2 2: any any any P6 3: any any any Pe4 ---------------------------------------------------------------- ACL Name {default_wired_port_profile 0} Number {147} 1: any any any P6 2: any any any P4 3: any any any Pe4 ---------------------------------------------------------------- ACL Name {default_wired_port_profile 1} Number {148} 1: any any any PT6 2: any any any PT4 3: any any any Pe4 ---------------------------------------------------------------- ACL Name {wired-SetMeUp 0} Number {149} 1: any masterip 6 0-65535 80-80 P4 2: any masterip 6 0-65535 4343-4343 P4 3: any any 17 0-65535 67-68 P6 4: any any 17 0-65535 67-68 P4 5: any any 17 0-65535 53-53 P6 6: any any 17 0-65535 53-53 P4 7: any any 6 0-65535 80-80 172.31.98.2 172.31.98.1 80 PSD4 8: any any 6 0-65535 443-443 172.31.98.2 172.31.98.1 443 PSD4 9: 0x888e 0xffff any any Pe4 10: 0x0806 0xffff any any Pe4 11: any any any e4 12: any any any 4 13: any any any 6 ---------------------------------------------------------------- ACL Name {wired-SetMeUp 1} Number {150} 1: any masterip 6 0-65535 80-80 PT4 2: any masterip 6 0-65535 4343-4343 PT4 3: any any 17 0-65535 67-68 PT6 4: any any 17 0-65535 67-68 PT4 5: any any 17 0-65535 53-53 PT6 6: any any 17 0-65535 53-53 PT4 7: any any 6 0-65535 80-80 172.31.98.2 172.31.98.1 80 PSD4 8: any any 6 0-65535 443-443 172.31.98.2 172.31.98.1 443 PSD4 9: 0x888e 0xffff any any Pe4 10: 0x0806 0xffff any any Pe4 11: any any any e4 12: any any any 4 13: any any any 6 ---------------------------------------------------------------- ACL Name {HADI_WDU2 0} Number {151} 1: any any any P6 2: any any any P4 3: any any any Pe4 ---------------------------------------------------------------- ACL Name {HADI_WDU2 1} Number {152} 1: any any any PT6 2: any any any PT4 3: any any any Pe4 ---------------------------------------------------------------- end of show datapath acl-all ======================================================== show datapath acl-allocation ACL ACE Start ACE Block Size ---- ---------- --------------- 106 1 16 107 17 8 151 25 8 152 33 8 108 41 8 100 49 8 101 57 4 103 61 8 105 69 64 149 133 16 150 149 16 147 165 8 148 173 8 end of show datapath acl-allocation ======================================================== show datapath nat-pool Datapath NAT Pool Entries ------------------------- ID Begin Source IP End Source IP Destination IP Flags -- --------------- ------------- -------------- ----- 0 192.168.2.230 192.168.2.230 192.168.2.230 - 63 172.31.98.2 172.31.98.2 172.31.98.1 - end of show datapath nat-pool ======================================================== show datapath dns-id-map end of show datapath dns-id-map ======================================================== show datapath sbr Source Based Routing Datapath Table ----------------------------------- Source SBR Index Mask Gateway VLAN Used ------ --------- ---- ------- ---- ---- end of show datapath sbr ======================================================== show datapath statistics Datapath Counters --------------------- Counter Value ------- ------ Tagged frames dropped on untagged interface 0 Frames dropped for being too short 0 Frames received on port not in VLAN 0 Non-dot1x frames dropped during L2 blocking 0 Frames dropped for ingress change on permanent bridge entry 0 Frames of split tunnel dropped due to port mismatch 0 Unicast frames filtered 0 Frames dropped due to FP firewall 0 Frames that failed FP spoofing check 0 Frames dropped with logging 0 Frames dropped due to unknown FP opcode 0 Frames freed by FP 0 Frames that failed SP spoofing check 0 Frames dropped due to excessive user misses 0 Frames dropped due to no buffers 0 Frames dropped due to packet loop 0 Frames dropped due to no 'br0' device 0 Frames dropped due to no stack IP address 0 Frames dropped while user miss pending 0 Frames dropped when user entry creation failed 0 Frames dropped due to unknown FP opcode 0 Frames dropped due to initial IP route lookup failure 0 Frames dropped due to final IP route lookup failure 1 Frames dropped due to kernel IP route lookup failure 0 Frames dropped due to ARP processing failure 0 Frames dropped due to illegal ingress 0 Frames dropped due to illegal device index 0 Frames dropped due to interface being down 0 Unicast frames not bridged due to split-tunnel destination 0 Unicast frames from bridge role user dropped 0 Unicast frames that could not be bridged to split tunnel 0 Frames dropped due to missing PPP device 0 Frames dropped due to pullup failure 0 Frames dropped due to misalignment 0 Frames dropped due to loop downstream packets 0 Frames received by firewall 22474 DHCP frames on DHCP local VLAN 0 PPPOE frames to session processing 0 Frames needing bridging 22488 Mesh frames forwarded 0 Thin AP frames forwarded 0 Frames to session processing 22999 Frames to SP 694 Frames bridged by SP 14 Frames routed by SP 0 Frames for SP session processing 634 Frames for FP application processing 46 Frames bridged by FP 0 Frames for FP session processing 511 Frames routed by FP 94 FP user misses 1 Frames not tunneled from bridge role user 0 SP user misses 1 Frames to DHCP 2 Frames to DNS 0 Frames held 0 Frames needed routing 22401 Frames needed forwarding 16059 Frames redirected to CSS tunnel 0 Frames forwarded for multicast aggregation 0 Frames sent by firewall 8328 Frames delivered to stack 6426 Frames delivered to CP 0 Frames to be flooded 7719 Frames potentially needing flooding 7719 Frames not flooded - no interface or interface not up 0 Flooded frames filtered 7713 Frames not flooded - bridge interface to tunnel 0 Frames not flooded - tunnel traffic to bridge interface 0 Frames not flooded - bridge role user to tunnel 0 Frames not flooded - tunnel source 0 Frames not flooded - split dot1x traffic to bridge interface 0 Frames not flooded - failed uplink ARP check 0 Frames not flooded - no buffer 0 Frames flooded 6 Frames dropped - not on DHCP VLAN 4 Frames filtered while flooding 4 No PPP device when flooding 0 Sessions routed locally between users 0 RTCP frames cloned and sent to controller 0 No PPP device when cloning RTCP frames 0 Multicast frames dropped between bridge users 0 Umiss dropped due to max user limit reached 0 IPv6 packets to stack dropped 0 Packets going through fast forward 0 Frames dropped - corporate vlan traffic from uplink 0 Frames not flooded - corporate traffic to uplink 0 Frames not flooded - port blocked by spanning tree 0 Frames dropped - foreign client port move 0 Frames dropped - home AP tunnel to non wireless 0 Frames which required for slow path routing 2 Frames which were routed through the tunnel 0 Frames which were routed based on source 0 Frames which required ARP packet generation 0 Frames for which ARP packets where sent out 0 Frames flooded after slow path routing 0 Frames dropped as no bridge device present 0 Packet dpi session id and session idx mismatch 0 Packet dpi cloud session id invalid 0 Packet dpi session pkt send to dpimgr 0 Packet dpi session copy to dpimgr failed 0 Packet dpi session prepare data failed 0 Packet dpi session unclassified count 0 Packet dpi unclassified cloud session count 0 Packet dpi bca cache miss drop 0 Packet dpi session classified with one pkt 0 Packet dpi session classified with two pkt 0 Packet dpi session classified with three pkt 0 Packet dpi session classified with four pkt 0 Packet dpi session classified with five pkt 0 Packet dpi session rate in 10 sec 0 Packet dpi session incomplete 0 Packet dpi session cpu usage in 10 sec 0 Frames dropped from self seen on unexpected port 0 Frames not flooded - DHCP response to tunnel 0 Frames not flooded - wrong subnet to tunnel 0 Frames not flooded - wrong subnet from tunnel 0 Packet reached firewall multiple times 0 Airgroup packet from stack without bridge entry 0 SSL packet to stack dropped - too many in progress 0 SSL packet to stack dropped - duplicate in progress 0 GRE Failover detection Ping packet received 0 Frames dropped - duplicate proxy arp response from tunnel 0 L2 Mobility checksum failure drop count 13 Invalid IP session add failure drop count 0 DHCP frames from server dropped due to mistmacth in VLAN 0 DPI deny page dropped due to small skb length 0 Clickstream data extract ignored due to max cpu limit 0 DNS frames dropped due to invalid len 0 Drop mobility packet rx 0 end of show datapath statistics ======================================================== show datapath vlan-mcast Datapath VLAN Multicast Entries --------------------------- VLAN Destinations ---- ------------ 1 dev7 3333 dev7 end of show datapath vlan-mcast ======================================================== show flow-offload status Flow offload is disabled end of show flow-offload status ======================================================== show ap debug flow-offload IPv4 bom connections -------------------- success=0 fail=0 nack=0 Connection Database: count=0 Serial Proto Flow pkt_rx/tx Return pkt_rx/tx refresh smac/dmac indev/outdev in_vlanid(prio)/out_vlanid(prio) drop mode refcount IPv6 bom connections -------------------- success=0 fail=0 nack=0 Connection Database: count=0 Serial Proto Flow pkt_rx/tx Return pkt_rx/tx refresh smac/dmac indev/outdev in_vlanid(prio)/out_vlanid(prio) drop mode refcount end of show ap debug flow-offload ======================================================== show dpi debug status DPIMGR is not enabled end of show dpi debug status ======================================================== show dpi debug statistics DPIMGR is not enabled end of show dpi debug statistics ======================================================== show dpi-stats session DPIMGR is not enabled end of show dpi-stats session ======================================================== show ap debug system-status Reboot Information ------------------ AP rebooted Fri Aug 5 10:28:29 UTC 2022; Cloud mgmt cmd at uptime 0D 0H 6M 38S: reload -------------------------------------------------------------------------------------- Rebootstrap Information ----------------------- Date Time PID ZoneID Current LMS Next LMS Last Recv Msg Last Send Msg Reason (Latest 10) ---------------------------------------------------------------------------------------------------------------------------------------------- (none found) Rebootstrap LMS --------------- (none found) ------------ Crash Information ----------------- (none found) ------------ CPU and Memory Usage -------------------- Timestamp CPU Util(%) Memory Util(%) --------- ----------- -------------- 2022-08-05 12:34:37 1 35 2022-08-05 12:34:27 0 35 2022-08-05 12:34:17 1 35 2022-08-05 12:34:07 1 35 2022-08-05 12:33:57 0 35 2022-08-05 12:33:47 1 35 2022-08-05 12:33:37 1 35 Peak CPU Util in the last one hour ---------------------------------- Timestamp CPU Util(%) Memory Util(%) --------- ----------- -------------- 2022-08-05 12:03:04 2 35 NSS CPU 0 average over 1 second utilization ------------------------------------------- Min Average Max --- ------- --- 6% 9% 10% Output of top ------------- Mem: 603872K used, 1139228K free, 0K shrd, 19424K buff, 136084K cached Load average: 1.00 1.00 1.00 (Status: S=sleeping R=running, W=waiting) PID USER STATUS RSS PPID %CPU %MEM COMMAND 8047 root S 4684 7908 0.4 0.2 ble_daemon 11792 root R N 424 11791 0.4 0.0 busybox 9798 root SW 0 2 0.4 0.0 kworker/3:0 7956 root S < 53480 7908 0.0 3.0 cli 7985 root S N 23204 7908 0.0 1.3 sapd 6000 root S 7780 1 0.0 0.4 cnssdaemon 7995 root S < 6820 7908 0.0 0.3 stm 7953 root S N 6276 7908 0.0 0.3 awc 8025 root S 4840 7908 0.0 0.2 mdns 8081 root S 4432 7908 0.0 0.2 ble_relay 8115 root S 4272 7908 0.0 0.2 off-loader 8020 root S 4068 7908 0.0 0.2 snmpd_sap 7945 root S < 3704 7908 0.0 0.2 msgHandler 8127 root S 3644 7908 0.0 0.2 telemetryd 9280 root S 3532 7908 0.0 0.2 radiusd-term 8914 root S 3516 7908 0.0 0.2 radiusd 8443 root S N 3392 1 0.0 0.1 mini_httpd 8446 root S N 3308 1 0.0 0.1 mini_httpd 8756 root S < 3232 7956 0.0 0.1 clarity_dnsdhcp 7982 root S < 3064 7908 0.0 0.1 udmd 8041 root S 2876 7908 0.0 0.1 lldpd Heartbeat Stats of Serving Controller ------------------------------------- Heartbeats Sent Sent Seqnum Heartbeats Received Rcvd Seqnum MTUs sent Misc sent Measurement Duration --------------- ----------- ------------------- ----------- --------- --------- -------------------- 0 n/a 0 n/a 0 0 total since bootup Firewall Stats -------------- Firewall Queue scheduled 17443 Firewall Queue scheduled 854 Firewall Queue scheduled 847 Firewall Queue scheduled 3331 ----------------------------------------------------------------------------------------------------------------------- Firewall Rx Queue: length 0, dropped 0 Firewall Tx Queue: length 0, dropped 0 Firewall netif rx drop dropped 0 Firewall netif rx recv counter 0 Firewall gre tx drop dropped 0 Firewall gre tx recv counter 0 Firewall gre tx queue length 0 DMO queue: size:512, dropped:0, rescheduled:0, length:0, high-water:0 Flow Offload Statistics: BOM not enabled CPU 0: Tlet Calls=0 Rx=0/0 SJRx=0/0 Tx=0 yields=0/0 EthIn=14155 CPU 1: Tlet Calls=0 Rx=0/0 SJRx=0/0 Tx=0 yields=0/0 EthIn=0 CPU 2: Tlet Calls=0 Rx=0/0 SJRx=0/0 Tx=0 yields=0/0 EthIn=0 CPU 3: Tlet Calls=0 Rx=0/14155 SJRx=0/0 Tx=8320 yields=0/0 EthIn=0 GMAC 0 Statistics: RX Frames: 00000000 TX Frames: 00000000 RX Failures: 000057cb TX Failures: 00000000 GMAC 1 Statistics: RX Frames: 00000000 TX Frames: 00000000 GMAC 2 Statistics: RX Frames: 00000000 TX Frames: 00000000 Maintenance Statistics: TKIP Decr Bad Keys: 0, TKIP Decr No Keys: 0 TKIP Encr Bad Keys: 0, TKIP Encr No Keys: 0 AESCCM Decr Bad Keys: 0, AESCCM Decr No Keys: 0 AESCCM Encr Bad Keys: 0, AESCCM Encr No Keys: 0 AESGCM Decr Bad Keys: 0, AESGCM Decr No Keys: 0 AESGCM Encr Bad Keys: 0, AESGCM Encr No Keys: 0 Num Pkt Descr Used in SAE: 0 Application Statistics: RX ICMP Errors: 0000002c RX ICMP Denied: 00000000 Bridge Statistics: Cur Entries: 00000008 High Entries: 00000011 Max Entries: 00004000 Total Entries: 0000002c IP Reassembly Statistics: cpu| cur | high | max | tot | full |ageidx| IP Reverse Fragment Statistics: cpu| cur | high | max | tot | full | ctx_w_buf | aged | IPv6 Reassembly Statistics: cpu| cur | high | max | tot | full |ageidx| IPv6 Reverse Fragment Statistics: cpu| cur | high | max | tot | full | ctx_w_buf | aged | WiFi Reassembly Statistics: cpu| cur | high | max | tot | full |ageidx| 0| 0000 | 0000 | 0000 | 0000 | 0000 | 0000 | 1| 0000 | 0000 | 0000 | 0000 | 0000 | 0000 | Route Cache Statistics: Cur Entries(v4/v6): 00000002/00000000 High Entries: 00000003 Max Entries: 00001000 Total Entries: 00000006 session_fib 0 session_fib_routed 0 session_fib_stale 0 session_fib_rt_fallback 0 session_fib_race 0 Route Table Statistics: Cur Entries(v4/v6): 00000003/00000000 High Entries: 00000003 Max Entries: 00000100 Total Entries: 00000007 Patricia: Cur 00000004 Full 00000000 Dup 00000000 Ignore 00000000 Null: Cur 00000000 Full 00000000 ECMP Full 00000000 Session Statistics: Cur Entries: 00000003/00000000 High Entries: 00000037/00000004 Max Entries: 00008000 Total Entries: 000003f9/00000004 Aged Entries: 000003f3/00000004 Max link length : Cur Entries: 00000001 High Entries: 00000001 User Statistics: Uke Cur Entries: 00000003/00000001/00000002/00000000 High Entries: 00000003 Max Entries: 00007fff Total Entries: 00000006 Full: 00000000 Denied: 00000000/00000000 Uae Cur Entries: 00000002 High Entries: 00000003 Station list Statistics: Cur Entries: 00000000 High Entries: 00000000 Max Entries: 00003fff Total Entries: 00000002 Descriptor Usage ---------------- Interface Queue Alloc Free In-use Max Failed --------- ----- ----- ---- ------ --- ------ Fast Recovery report -------------------- Interface mode events start end PC --------- ---- ------ ----- --- -- wifi0 legacy 0 N/A N/A N/A wifi1 legacy 0 N/A N/A N/A wifi2 legacy 0 N/A N/A N/A Interface counters ------------------ Interface Rx_pkts Rx_errors Rx drops Tx_pkts Tx_errors Tx_drops Resets --------- ------- --------- -------- ------- --------- -------- ------ wifi0 0 4095 0 0 0 0 0 wifi1 0 4095 0 0 0 0 0 wifi2 0 0 0 0 0 0 0 MTU Discovery ------------- IP Probes Responses Last Sent Last Rcvd jumbo:tx/rx 9KB: tx/rx -- ------ --------- --------- --------- ----------- ---------- Switch MTU, Update sent time, Ack receive time, Current time (Time in seconds since AP booted) No GRE tunnel yet ARP Cache --------- IP address HW type Flags HW -- ------- -- ---- ----- -- 172.31.98.2 0x1 0x6 94:64:24:c1:45:e4 * br0.3333 192.168.2.3 0x1 0x2 20:4c:03:02:f2:00 * br0 Route Table ----------- Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT ----- ----------- ------- ----- ------ --- ------ ---- --- ------ ---- br0 00000000 0302A8C0 0003 0 0 0 00000000 0 0 0 br0.3333 00621FAC 00000000 0001 0 0 0 00FEFFFF 0 0 0 br0 0002A8C0 00000000 0001 0 0 0 00FFFFFF 0 0 0 Interface Information --------------------- Iface Rx_bytes Rx_packets Rx_errs Rx_drop Rx_fifo Rx_frame Rx_compressed Rx_multicast Tx_bytes Tx_packets Tx_errs Tx_drop Tx_fifo Tx_colls Tx_carrier Tx_compressed reset ----- -------- ---------- ------- ------- ------- -------- ------------- ------------ -------- ---------- ------- ------- ------- -------- ---------- ------------- ----- gre4 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 gre0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 br0.3333 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 lo 23219 227 0 0 0 0 0 0 23219 227 0 0 0 0 0 0 0 br0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 ipsecdummy 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 soc1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 gre3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ip6tnl0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 gre2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 soc0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 apsos0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 bond0 1718244 16065 0 13 0 0 0 9519 5235039 8637 0 0 0 0 0 0 0 anul0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 am0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 miireg 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 wuplink0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ap0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 eth1 107676 1472 0 5 0 0 0 1461 9229 49 0 0 0 0 0 0 0 wifi2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 gre1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 wifi1 0 0 4095 0 0 0 0 0 0 0 0 0 0 0 0 0 0 tsgw 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 eth0 1610568 14593 0 2 0 0 0 8058 5225810 8588 0 0 0 0 0 0 0 wifi0 0 0 4095 0 0 0 0 0 0 0 0 0 0 0 0 0 0 WARNING: 802.11b protection disabled on wifi2 ifconfig output for eth0 ------------------------ eth0 Link encap:Ethernet HWaddr 94:64:24:C1:45:E4 --------------------------------------------------------- UP BROADCAST RUNNING SLAVE MULTICAST MTU:1500 Metric:1 RX packets:14593 errors:0 dropped:2 overruns:0 frame:0 TX packets:8588 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1610568 (1.5 MiB) TX bytes:5225810 (4.9 MiB) Base address:0x1600 Rx broadcast packet:0 Rx broadcast packet per second:0 Rx multicast packet:0 Rx multicast packet per second:0 Tx broadcast packet:0 Tx broadcast packet per second:0 Tx multicast packet:0 Tx multicast packet per second:0 ifconfig output for eth1 ------------------------ eth1 Link encap:Ethernet HWaddr 94:64:24:C1:45:E4 --------------------------------------------------------- UP BROADCAST SLAVE MULTICAST MTU:1500 Metric:1 RX packets:1472 errors:0 dropped:5 overruns:0 frame:0 TX packets:49 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:107676 (105.1 KiB) TX bytes:9229 (9.0 KiB) Base address:0x1800 Rx broadcast packet:0 Rx broadcast packet per second:0 Rx multicast packet:0 Rx multicast packet per second:0 Tx broadcast packet:0 Tx broadcast packet per second:0 Tx multicast packet:0 Tx multicast packet per second:0 ifconfig output for bond0 ------------------------- bond0 Link encap:Ethernet HWaddr 94:64:24:C1:45:E4 --------------------------------------------------------- UP BROADCAST RUNNING MASTER MULTICAST MTU:1500 Metric:1 RX packets:16065 errors:0 dropped:13 overruns:0 frame:0 TX packets:8637 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:1718244 (1.6 MiB) TX bytes:5235039 (4.9 MiB) Rx broadcast packet:0 Rx broadcast packet per second:0 Rx multicast packet:0 Rx multicast packet per second:0 Tx broadcast packet:0 Tx broadcast packet per second:0 Tx multicast packet:0 Tx multicast packet per second:0 ifconfig output for br0 ----------------------- br0 Link encap:Ethernet HWaddr 94:64:24:C1:45:E4 --------------------------------------------------------- inet addr:192.168.2.230 Bcast:192.168.2.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1300 Metric:1 RX packets:0 errors:0 dropped:1 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Rx broadcast packet:0 Rx broadcast packet per second:0 Rx multicast packet:0 Rx multicast packet per second:0 Tx broadcast packet:0 Tx broadcast packet per second:0 Tx multicast packet:0 Tx multicast packet per second:0 IP Information -------------- Reassemble Timeout packet 0 ----------------------------------- Reassemble required packet 0 Reassemble ok packet 0 Reassemble failed packet 0 Fragments received ok packet 0 Fragments failed packet 0 Fragments created packet 0 AP Uptime --------- 2 hours 5 mins 57 secs ----------------------- Process Table ------------- PID VmSize VmRSS State Command --- ------ ----- ----- ------- 1 1644 kB 932 kB S openrc-init 1560 3572 kB 1220 kB S cli_console 5994 872 kB 48 kB S qrtr-ns 6000 19656 kB 7780 kB S cnssdaemon 6850 876 kB 44 kB S rdnssd 6851 880 kB 52 kB S rdnssd 7063 3572 kB 208 kB S udhcpc 7908 4800 kB 2512 kB S nanny 7915 15960 kB 2308 kB S redis-server 7941 3228 kB 1272 kB S tinyproxy 7944 3228 kB 236 kB S tinyproxy 7945 5580 kB 3704 kB S msgHandler 7950 2636 kB 1292 kB S syslogd 7953 8392 kB 6276 kB S awc 7956 57468 kB 53488 kB S cli 7961 3572 kB 452 kB S klogd 7977 3484 kB 244 kB S sshd 7982 8500 kB 3064 kB S udmd 7985 30196 kB 23328 kB R sapd 7988 9348 kB 236 kB S wdg 7995 10300 kB 6820 kB S stm 8020 7048 kB 4068 kB S snmpd_sap 8025 7836 kB 4840 kB S mdns 8030 2560 kB 1328 kB S lhm 8035 2312 kB 468 kB S resolv_hostname 8038 6608 kB 2712 kB S ap_cert_mgr 8041 5620 kB 2876 kB S lldpd 8044 6272 kB 2684 kB S ctb 8047 9156 kB 4684 kB S ble_daemon 8081 11320 kB 4432 kB S ble_relay 8115 9152 kB 4272 kB S off-loader 8123 6940 kB 1996 kB S wpa3_sae 8127 6292 kB 3644 kB S telemetryd 8440 5612 kB 852 kB S mini_httpd 8443 5584 kB 3392 kB S mini_httpd 8446 5656 kB 3308 kB S mini_httpd 8756 6740 kB 3232 kB S clarity_dnsdhcp 8913 888 kB 156 kB S dhcp-helper 8914 5896 kB 3516 kB S radiusd 8919 3576 kB 1200 kB S aruba_ntpdate 8960 5704 kB 2552 kB S ucm 9019 2672 kB 1064 kB S ntpd 9280 5900 kB 3532 kB S radiusd-term 11029 1072 kB 200 kB S dnsmasq 11677 3564 kB 424 kB S busybox Memory Usage ------------ MemTotal: 1743100 kB --------------------------- MemFree: 1139088 kB MemAvailable: 1262936 kB Buffers: 19424 kB Cached: 136084 kB SwapCached: 0 kB Active: 153576 kB Inactive: 83068 kB Active(anon): 82028 kB Inactive(anon): 23348 kB Active(file): 71548 kB Inactive(file): 59720 kB Unevictable: 0 kB Mlocked: 0 kB SwapTotal: 0 kB SwapFree: 0 kB Dirty: 0 kB Writeback: 0 kB AnonPages: 81088 kB Mapped: 44584 kB Shmem: 24252 kB Slab: 58744 kB SReclaimable: 11412 kB SUnreclaim: 47332 kB KernelStack: 3008 kB PageTables: 1160 kB NFS_Unstable: 0 kB Bounce: 0 kB WritebackTmp: 0 kB CommitLimit: 871548 kB Committed_AS: 170808 kB VmallocTotal: 263061440 kB VmallocUsed: 0 kB VmallocChunk: 0 kB CmaTotal: 0 kB CmaFree: 0 kB Kernel slab statistics ---------------------- Kernel slab statistics ---------------------- slabinfo - version: 2.1 # name : tunables : slabdata ext4_groupinfo_1k 30 30 136 30 1 : tunables 0 0 0 : slabdata 1 1 0 ext4_groupinfo_4k 84 84 144 28 1 : tunables 0 0 0 : slabdata 3 3 0 ubifs_inode_slab 0 0 664 24 4 : tunables 0 0 0 : slabdata 0 0 0 RAWv6 60 60 1088 30 8 : tunables 0 0 0 : slabdata 2 2 0 UDPLITEv6 0 0 1088 30 8 : tunables 0 0 0 : slabdata 0 0 0 UDPv6 120 120 1088 30 8 : tunables 0 0 0 : slabdata 4 4 0 tw_sock_TCPv6 68 68 240 17 1 : tunables 0 0 0 : slabdata 4 4 0 request_sock_TCPv6 0 0 296 27 2 : tunables 0 0 0 : slabdata 0 0 0 TCPv6 64 64 1984 16 8 : tunables 0 0 0 : slabdata 4 4 0 cfq_queue 68 68 232 17 1 : tunables 0 0 0 : slabdata 4 4 0 mqueue_inode_cache 38 38 832 19 4 : tunables 0 0 0 : slabdata 2 2 0 fuse_request 0 0 400 20 2 : tunables 0 0 0 : slabdata 0 0 0 fuse_inode 0 0 704 23 4 : tunables 0 0 0 : slabdata 0 0 0 squashfs_inode_cache 700 700 640 25 4 : tunables 0 0 0 : slabdata 28 28 0 jbd2_transaction_s 64 64 256 16 1 : tunables 0 0 0 : slabdata 4 4 0 jbd2_journal_handle 340 340 48 85 1 : tunables 0 0 0 : slabdata 4 4 0 jbd2_journal_head 136 136 120 34 1 : tunables 0 0 0 : slabdata 4 4 0 jbd2_revoke_table_s 1024 1024 16 256 1 : tunables 0 0 0 : slabdata 4 4 0 jbd2_revoke_record_s 256 256 32 128 1 : tunables 0 0 0 : slabdata 2 2 0 ext4_inode_cache 352 352 976 16 4 : tunables 0 0 0 : slabdata 22 22 0 ext4_free_data 256 256 64 64 1 : tunables 0 0 0 : slabdata 4 4 0 ext4_allocation_context 128 128 128 32 1 : tunables 0 0 0 : slabdata 4 4 0 ext4_system_zone 306 306 40 102 1 : tunables 0 0 0 : slabdata 3 3 0 ext4_io_end 224 224 72 56 1 : tunables 0 0 0 : slabdata 4 4 0 ext4_extent_status 408 408 40 102 1 : tunables 0 0 0 : slabdata 4 4 0 dnotify_struct 0 0 32 128 1 : tunables 0 0 0 : slabdata 0 0 0 dio 0 0 640 25 4 : tunables 0 0 0 : slabdata 0 0 0 pid_namespace 0 0 2216 14 8 : tunables 0 0 0 : slabdata 0 0 0 posix_timers_cache 0 0 216 18 1 : tunables 0 0 0 : slabdata 0 0 0 UNIX 224 224 1152 28 8 : tunables 0 0 0 : slabdata 8 8 0 Kernel slab statistics ---------------------- Kernel slab statistics ---------------------- UDP-Lite 0 0 896 18 4 : tunables 0 0 0 : slabdata 0 0 0 flow_cache 144 144 112 36 1 : tunables 0 0 0 : slabdata 4 4 0 PING 0 0 832 19 4 : tunables 0 0 0 : slabdata 0 0 0 UDP 72 72 896 18 4 : tunables 0 0 0 : slabdata 4 4 0 tw_sock_TCP 17 17 240 17 1 : tunables 0 0 0 : slabdata 1 1 0 request_sock_TCP 27 27 296 27 2 : tunables 0 0 0 : slabdata 1 1 0 TCP 72 72 1792 18 8 : tunables 0 0 0 : slabdata 4 4 0 eventpoll_pwq 224 224 72 56 1 : tunables 0 0 0 : slabdata 4 4 0 blkdev_queue 54 54 1808 18 8 : tunables 0 0 0 : slabdata 3 3 0 blkdev_requests 92 92 344 23 2 : tunables 0 0 0 : slabdata 4 4 0 blkdev_ioc 156 156 104 39 1 : tunables 0 0 0 : slabdata 4 4 0 QIPCRTR 92 92 704 23 4 : tunables 0 0 0 : slabdata 4 4 0 sock_inode_cache 364 364 576 28 4 : tunables 0 0 0 : slabdata 13 13 0 configfs_dir_cache 46 46 88 46 1 : tunables 0 0 0 : slabdata 1 1 0 file_lock_cache 114 114 208 19 1 : tunables 0 0 0 : slabdata 6 6 0 file_lock_ctx 292 292 56 73 1 : tunables 0 0 0 : slabdata 4 4 0 net_namespace 0 0 3712 8 8 : tunables 0 0 0 : slabdata 0 0 0 shmem_inode_cache 648 648 600 27 4 : tunables 0 0 0 : slabdata 24 24 0 proc_inode_cache 2093 2240 584 28 4 : tunables 0 0 0 : slabdata 80 80 0 sigqueue 100 100 160 25 1 : tunables 0 0 0 : slabdata 4 4 0 bdev_cache 63 63 768 21 4 : tunables 0 0 0 : slabdata 3 3 0 kernfs_node_cache 19414 19414 120 34 1 : tunables 0 0 0 : slabdata 571 571 0 mnt_cache 24522 24822 384 21 2 : tunables 0 0 0 : slabdata 1182 1182 0 inode_cache 7440 7440 528 31 4 : tunables 0 0 0 : slabdata 240 240 0 dentry 12874 12957 192 21 1 : tunables 0 0 0 : slabdata 617 617 0 buffer_head 19266 19266 104 39 1 : tunables 0 0 0 : slabdata 494 494 0 nsproxy 340 340 48 85 1 : tunables 0 0 0 : slabdata 4 4 0 vm_area_struct 3278 3542 176 23 1 : tunables 0 0 0 : slabdata 154 154 0 files_cache 336 336 768 21 4 : tunables 0 0 0 : slabdata 16 16 0 signal_cache 576 576 896 18 4 : tunables 0 0 0 : slabdata 32 32 0 sighand_cache 255 255 2112 15 8 : tunables 0 0 0 : slabdata 17 17 0 task_struct 306 324 2688 12 8 : tunables 0 0 0 : slabdata 27 27 0 Kernel slab statistics ---------------------- Kernel slab statistics ---------------------- cred_jar 1365 1365 192 21 1 : tunables 0 0 0 : slabdata 65 65 0 anon_vma_chain 4672 4672 64 64 1 : tunables 0 0 0 : slabdata 73 73 0 anon_vma 1744 1989 80 51 1 : tunables 0 0 0 : slabdata 39 39 0 radix_tree_node 1148 1148 584 28 4 : tunables 0 0 0 : slabdata 41 41 0 idr_layer_cache 304 330 2096 15 8 : tunables 0 0 0 : slabdata 22 22 0 dma-kmalloc-8192 0 0 8192 4 8 : tunables 0 0 0 : slabdata 0 0 0 dma-kmalloc-4096 0 0 4096 8 8 : tunables 0 0 0 : slabdata 0 0 0 dma-kmalloc-2048 0 0 2048 16 8 : tunables 0 0 0 : slabdata 0 0 0 dma-kmalloc-1024 0 0 1024 16 4 : tunables 0 0 0 : slabdata 0 0 0 dma-kmalloc-512 0 0 512 16 2 : tunables 0 0 0 : slabdata 0 0 0 dma-kmalloc-256 0 0 256 16 1 : tunables 0 0 0 : slabdata 0 0 0 dma-kmalloc-128 0 0 128 32 1 : tunables 0 0 0 : slabdata 0 0 0 kmalloc-8192 88 88 8192 4 8 : tunables 0 0 0 : slabdata 22 22 0 kmalloc-4096 3084 3120 4096 8 8 : tunables 0 0 0 : slabdata 390 390 0 kmalloc-2048 3542 3600 2048 16 8 : tunables 0 0 0 : slabdata 225 225 0 kmalloc-1024 2016 2016 1024 16 4 : tunables 0 0 0 : slabdata 126 126 0 kmalloc-512 1184 1184 512 16 2 : tunables 0 0 0 : slabdata 74 74 0 kmalloc-256 16611 17104 256 16 1 : tunables 0 0 0 : slabdata 1069 1069 0 kmalloc-128 20064 20064 128 32 1 : tunables 0 0 0 : slabdata 627 627 0 kmem_cache_node 192 192 128 32 1 : tunables 0 0 0 : slabdata 6 6 0 kmem_cache 128 128 256 16 1 : tunables 0 0 0 : slabdata 8 8 0 Interrupts ---------- CPU0 CPU1 CPU2 CPU3 ------------------------------------------------------- 3: 922073 3430773 3623464 1916614 GIC 20 Edge arch_timer 5: 101877 0 0 0 GIC 140 Level msm_serial1 6: 28 0 0 0 GIC 338 Level msm_serial0 8: 0 0 0 0 GIC 239 Level bam_dma 10: 0 0 0 0 GIC 84 Edge qcom-pcie-msi 11: 10 0 0 0 GIC 448 Edge mhi 12: 14 0 0 0 GIC 449 Edge mhi 13: 1001 0 0 0 GIC 450 Edge mhi 14: 3 0 0 0 GIC 451 Edge pci0_wlan_ce_0, pci0_wlan_ce_5 15: 4 0 0 0 GIC 452 Edge pci0_wlan_ce_1 16: 390 0 0 0 GIC 453 Edge pci0_wlan_ce_2 17: 67 0 0 0 GIC 454 Edge pci0_wlan_ce_3 22: 20723 0 0 0 GIC 459 Edge pci0_wlan_grp_dp_3 23: 0 0 0 0 GIC 460 Edge pci0_wlan_grp_dp_4 24: 0 0 0 0 GIC 461 Edge pci0_wlan_grp_dp_5 27: 658 0 0 0 GIC 270 Level bam_dma 28: 294028 0 0 0 GIC 128 Level i2c_qup 29: 647 0 0 0 GIC 127 Level 78b5000.spi 30: 12374 0 0 0 GIC 331 Level 78b9000.spi 31: 2458 0 0 0 GIC 353 Edge glink-native 33: 4 0 0 0 GIC 354 Edge smp2p 34: 0 0 0 0 GIC 357 Edge q6_wdog_interrupt 36: 2876 0 0 0 GIC 155 Edge mmc0 37: 3 0 0 0 GIC 170 Edge 7804000.sdhci 42: 170462 0 0 0 GIC 434 Edge nss_empty_buf_sos 43: 5911 0 0 0 GIC 433 Edge nss_empty_buf_queue 44: 0 0 0 0 GIC 432 Edge nss-tx-unblock 45: 7760465 0 0 0 GIC 431 Edge nss_queue0 46: 2002 0 0 0 GIC 430 Edge nss_queue1 47: 369 0 0 0 GIC 429 Edge nss_queue2 48: 1379 0 0 0 GIC 428 Edge nss_queue3 49: 0 0 0 0 GIC 427 Edge nss_coredump_complete 50: 0 0 0 0 GIC 426 Edge nss_paged_empty_buf_sos 51: 0 0 0 0 GIC 425 Edge nss_profile_dma 133: 0 0 0 0 GIC 35 Level watchdog bark 135: 1 0 0 0 GIC 351 Edge 137: 4 0 0 0 GIC 348 Edge ce0 138: 10 0 0 0 GIC 347 Edge ce1 139: 786 0 0 0 GIC 346 Edge ce2 140: 80 0 0 0 GIC 343 Edge ce3 142: 0 0 0 0 GIC 443 Edge ce5 144: 76 0 0 0 GIC 72 Edge ce7 146: 0 0 0 0 GIC 334 Edge ce9 147: 0 0 0 0 GIC 333 Edge ce10 148: 0 0 0 0 GIC 69 Edge ce11 153: 4 0 0 0 GIC 325 Edge host2rxdma-monitor-ring2 154: 5 0 0 0 GIC 324 Edge host2rxdma-monitor-ring1 156: 0 0 0 0 GIC 322 Edge wbm2host-rx-release 157: 4 0 0 0 GIC 321 Edge reo2host-status 163: 6779044 0 0 0 GIC 265 Edge rxdma2host-monitor-destination-mac2 164: 77068 0 0 0 GIC 264 Edge rxdma2host-monitor-destination-mac1 166: 1768748 0 0 0 GIC 262 Edge ppdu-end-interrupts-mac2 167: 19649 0 0 0 GIC 261 Edge ppdu-end-interrupts-mac1 169: 6 0 0 0 GIC 256 Edge rxdma2host-monitor-status-ring-mac2 170: 6 0 0 0 GIC 255 Edge rxdma2host-monitor-status-ring-mac1 175: 0 0 0 0 GIC 210 Edge rxdma2host-destination-ring-mac2 176: 0 0 0 0 GIC 209 Edge rxdma2host-destination-ring-mac1 185: 0 0 0 0 GIC 276 Edge tzerror 186: 0 0 0 0 GIC 198 Edge tmc-etr 187: 0 0 0 0 GIC 216 Edge tsens_interrupt 189: 0 2 0 0 smp2p 1 Edge q6v5 ready 190: 0 0 0 0 smp2p 2 Edge q6v5 handover 191: 0 0 0 0 smp2p 0 Edge err_fatal_interrupt 192: 0 0 0 0 smp2p 3 Edge stop_ack_interrupt 193: 0 0 0 0 GIC 131 Edge xhci-hcd:usb1 IPI0: 71527 133816 117243 122682 Rescheduling interrupts IPI1: 25 34 36 27 Function call interrupts IPI2: 0 0 0 0 CPU stop interrupts IPI3: 0 0 0 0 CPU stop (for crash dump) interrupts IPI4: 0 0 0 0 Timer broadcast interrupts IPI5: 0 0 0 0 IRQ work interrupts IPI6: 0 0 0 0 CPU wake-up interrupts IPI7: 0 0 0 0 CPU dump interrupts Err: 0 Modules ------- wifi_3_0 913372 0 - Live 0xffffff8002734000 ------------------------------------------- wifi_2_0 692638 0 - Live 0xffffff8002689000 qca_ol 1464066 2 wifi_3_0,wifi_2_0, Live 0xffffff8002522000 qca_spectral 97545 1 qca_ol, Live 0xffffff800082c000 diagchar 192347 0 - Live 0xffffff8002278000 ath_pktlog 11316 0 - Live 0xffffff8002255000 (P) umac 3533426 5 wifi_3_0,wifi_2_0,qca_ol,qca_spectral,ath_pktlog, Live 0xffffff8001e8e000 mem_manager 15410 3 wifi_2_0,qca_ol,umac, Live 0xffffff8001e87000 (P) asf 6890 2 qca_ol,umac, Live 0xffffff8001e82000 (P) qdf 142571 8 wifi_3_0,wifi_2_0,qca_ol,qca_spectral,ath_pktlog,umac,mem_manager,asf, Live 0xffffff8001e50000 crc_ccitt 1767 1 diagchar, Live 0xffffff8001dd8000 fips_tool 25106 0 - Live 0xffffff8001dce000 xhci_plat_hcd 4996 0 - Live 0xffffff8001dc9000 dwc3_qcom 12010 0 - Live 0xffffff8001dc3000 dwc3 24432 1 dwc3_qcom, Live 0xffffff8001dba000 dbm 9192 1 dwc3_qcom, Live 0xffffff8001db4000 ipm 20313 0 - Live 0xffffff8001dab000 isl28022 6941 0 - Live 0xffffff8001da6000 bom 41557 0 - Live 0xffffff8001d97000 (P) anul 1894641 6 qca_ol,qca_spectral,umac, Live 0xffffff8001bb9000 (P) asap_mod 17483598 7 qca_ol,umac,bom,anul, Live 0xffffff8000aea000 (P) drvlog_mod 16693 4 qca_ol,umac,anul,asap_mod, Live 0xffffff8000ae2000 (P) uol 152203 3 umac,anul,asap_mod, Live 0xffffff8000ab6000 (P) bonding 124428 0 - Live 0xffffff8000a90000 qca_nss_ipsecmgr 45966 1 uol, Live 0xffffff8000a80000 qca_nss_cfi_cryptoapi 47520 1 qca_nss_ipsecmgr, Live 0xffffff8000a70000 qca_nss_crypto 37059 1 qca_nss_cfi_cryptoapi, Live 0xffffff8000a62000 qca_nss_drv 1634964 9 wifi_3_0,wifi_2_0,qca_ol,umac,bom,anul,uol,qca_nss_ipsecmgr,qca_nss_crypto, Live 0xffffff80008ba000 qca_nss_dp 48296 3 asap_mod,uol,qca_nss_drv, Live 0xffffff80008aa000 qca_ssdk 1945361 2 qca_nss_ipsecmgr,qca_nss_dp, Live 0xffffff8000650000 Ethernet bonding ---------------- BondMode NumMembers LinkPollIntvl(ms) -------- ---------- ----------------- active-backup 2 400 Member bonding info ------------------- MemberId Name Link State #LinkFails -------- ---- ---- ----- ---------- 0 eth0 UP ACTIVE 0 1 eth1 DOWN STANDBY 1 DHCP Information ================== listen-address=127.0.0.1 addn-hosts=/etc/ld_eth_hosts addn-hosts=/etc/ld_ppp_hosts dhcp-src=172.31.98.1 dhcp-leasefile=/tmp/dnsmasq.leases dhcp-authoritative aruba-raw-socket-mode #magic-vlan { vlan-id=3333 dhcp-range=172.31.98.3,172.31.99.254,255.255.254.0,12h dhcp-option=1,255.255.254.0 dhcp-option=3,172.31.98.1 dhcp-option=15,aruba.lan } role:1 ipaddr#127.0.0.1 get_dhcp_relay_config:168 The role(1) is conductor get_dhcp_relay_config:185 vc_ip is:127.0.0.1 get_dhcp_relay_config:219 End of the file get_dhcp_relay_config:221 end of file reached, returning with entries 1 main:607 Total db entry present 1 main:611 0 3333 7f000001 0 5 DHCP VLAN Id: 3333 DHCP Server Id: 172.31.98.1 DHCP Server Mask: 255.255.254.0 Ethernet Duplex/Speed Settings ------------------------------ Autoneg Speed (Mbps) Duplex Iface ------- ------------ ------ ----- on 1000 Full eth0 on 10 Half eth1 Conductor discovered by:(none found) Boot Version ------------ 2.6.2.3 (80087) --------------- Power Status ------------ Item Value ---- ----- Power Supply : POE-AT LLDP Power : Successfully negotiated at 25.5W Current Operational State : No restrictions (Overridden by LLDP) Eth0 HW POE status : POE AF, LLDP power: 25.5W Eth1 HW POE status : NONE, LLDP power: 0.0W POE Mode : Failover Bandwidth Contracts Information ------------------------------- Received BWM Config: -------------------- -------------------- ACL DIR Contract-ID PerUser UseCount Rate Allocated Contracts: -------------------- Contract-ID Rate UseCount ACL Available-Bytes Max-Bytes Policed-Bytes Queued-Bytes Queued-Pkts Dropped-pkts Bandwidth Contracts for BWM type 0 has 0 contracts BWM divisor for type:0 : 32(32) Bandwidth Contracts for cpu type 0 has 0 cp contracts total queued in CPU 0 total queing fail 0 Queued pkts in cpus: Power Monitoring Information ---------------------------- Current(mW) Average(mW) Minimum(mW) Maximum(mW) ----------- ----------- ----------- ----------- 9001 8461 8222 9102 Note : Avg, Min and Max power are calculated using values sampled over the previous 60 seconds System Status Script First --------------------------- Script Output ------------- aruba_dbg_system_status_first Start time: Fri Aug 5 12:34:39 UTC 2022 ====== netstat -nltuw ====== Active Internet connections (only servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 0.0.0.0:8080 0.0.0.0:* LISTEN tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN tcp 0 0 :::4343 :::* LISTEN tcp 0 0 :::443 :::* LISTEN tcp 0 0 :::80 :::* LISTEN tcp 0 0 :::22 :::* LISTEN udp 0 0 0.0.0.0:8080 0.0.0.0:* udp 0 0 0.0.0.0:1067 0.0.0.0:* udp 0 0 0.0.0.0:67 0.0.0.0:* udp 0 0 172.31.98.1:123 0.0.0.0:* udp 0 0 192.168.2.230:123 0.0.0.0:* udp 0 0 127.0.0.1:123 0.0.0.0:* udp 0 0 0.0.0.0:123 0.0.0.0:* udp 0 0 0.0.0.0:5363 0.0.0.0:* udp 0 0 0.0.0.0:53536 0.0.0.0:* udp 0 0 0.0.0.0:8612 0.0.0.0:* udp 0 0 127.0.0.1:2628 0.0.0.0:* udp 0 0 127.0.0.1:1616 0.0.0.0:* udp 0 0 :::8211 :::* udp 0 0 :::123 :::* udp 0 0 :::161 :::* udp 0 0 :::4434 :::* aruba_dbg_system_status_first Finished time: Fri Aug 5 12:34:39 UTC 2022 aruba_dbg_system_status_first: Read 2310 bytes in 28 lines. Truncated:FALSE System Status Script Last -------------------------- Script Output ------------- aruba_dbg_system_status_last Start time: Fri Aug 5 12:34:39 UTC 2022 ====== netstat -nx ====== Active UNIX domain sockets (w/o servers) Proto RefCnt Flags Type State I-Node Path unix 2 [ ] DGRAM 28421 /tmp/cli_l2tpv3_comm.sock unix 2 [ ] DGRAM 24841 /tmp/.sock/8359.sock unix 2 [ ] DGRAM 24843 /tmp/.sock/9359.sock unix 2 [ ] DGRAM 19229 /tmp/.sock/8476.sock unix 2 [ ] DGRAM 19231 /tmp/.sock/9476.sock unix 2 [ ] DGRAM 21035 /tmp/wpa_sapd_sock unix 2 [ ] DGRAM 19243 /tmp/.sock/8522.sock unix 2 [ ] DGRAM 19245 /tmp/.sock/9522.sock unix 2 [ ] DGRAM 20014 /tmp/.sock/17103.sock unix 2 [ ] DGRAM 20016 /tmp/.sock/18103.sock unix 2 [ ] DGRAM 19257 /tmp/.sock/15208.sock unix 2 [ ] DGRAM 19259 /tmp/.sock/16208.sock unix 2 [ ] DGRAM 20290 /tmp/.sock/8225.sock unix 2 [ ] DGRAM 20292 /tmp/.sock/9225.sock unix 2 [ ] DGRAM 19275 /tmp/.sock/8995.sock unix 2 [ ] DGRAM 19277 /tmp/.sock/9995.sock unix 2 [ ] DGRAM 19078 /tmp/.sock/8370.sock unix 2 [ ] DGRAM 19080 /tmp/.sock/9370.sock unix 2 [ ] DGRAM 19354 /tmp/.sock/8393.sock unix 2 [ ] DGRAM 19356 /tmp/.sock/9393.sock unix 2 [ ] DGRAM 24995 /tmp/.sock/17104.sock unix 2 [ ] DGRAM 19363 /tmp/.sock/8571.sock unix 2 [ ] DGRAM 24997 /tmp/.sock/18104.sock unix 2 [ ] DGRAM 19365 /tmp/.sock/9571.sock unix 2 [ ] DGRAM 19368 /tmp/.sock/8996.sock unix 2 [ ] DGRAM 19370 /tmp/.sock/9996.sock unix 2 [ ] DGRAM 19884 /tmp/msghdlr_comm unix 2 [ ] DGRAM 19887 /tmp/.sock/8210.sock unix 2 [ ] DGRAM 19893 /tmp/syslogcmd unix 2 [ ] DGRAM 21942 /tmp/.sock/8515.sock unix 2 [ ] DGRAM 21944 /tmp/.sock/9515.sock unix 2 [ ] DGRAM 19134 /tmp/.sock/15200.sock unix 2 [ ] DGRAM 19136 /tmp/.sock/16200.sock unix 24 [ ] DGRAM 19904 /dev/log unix 2 [ ] DGRAM 19139 /tmp/.sock/15199.sock unix 2 [ ] DGRAM 20164 /tmp/.sock/8497.sock unix 2 [ ] DGRAM 19141 /tmp/.sock/16199.sock unix 2 [ ] DGRAM 20166 /tmp/.sock/9497.sock unix 2 [ ] DGRAM 19911 /tmp/.sock/15207.sock unix 2 [ ] DGRAM 19913 /tmp/.sock/16207.sock unix 2 [ ] DGRAM 19407 /tmp/.sock/8223.sock unix 2 [ ] DGRAM 19409 /tmp/.sock/9223.sock unix 2 [ ] DGRAM 21735 /tmp/.sock/8236.sock unix 2 [ ] DGRAM 21737 /tmp/.sock/9236.sock unix 2 [ ] DGRAM 20210 /tmp/.sock/8514.sock unix 2 [ ] DGRAM 21747 /tmp/.sock/15566.sock unix 2 [ ] DGRAM 20212 /tmp/.sock/9514.sock unix 2 [ ] DGRAM 19188 /tmp/.sock/8451.sock unix 2 [ ] DGRAM 21749 /tmp/.sock/16566.sock unix 2 [ ] DGRAM 19190 /tmp/.sock/9451.sock unix 2 [ ] DGRAM 19192 /tmp/.sock/8452.sock unix 2 [ ] DGRAM 19194 /tmp/.sock/9452.sock unix 2 [ ] DGRAM 23777 unix 3 [ ] STREAM CONNECTED 19199 unix 3 [ ] STREAM CONNECTED 19279 unix 3 [ ] STREAM CONNECTED 20267 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 19198 unix 3 [ ] STREAM CONNECTED 20265 /tmp/redis.sock unix 2 [ ] DGRAM 19910 unix 3 [ ] STREAM CONNECTED 19281 unix 3 [ ] STREAM CONNECTED 19280 unix 2 [ ] DGRAM 22383 unix 3 [ ] STREAM CONNECTED 19261 unix 3 [ ] STREAM CONNECTED 21015 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 20966 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 16671 unix 2 [ ] DGRAM 113362 unix 3 [ ] STREAM CONNECTED 20968 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 21019 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 20970 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 21017 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 19262 unix 2 [ ] DGRAM 21588 unix 2 [ ] DGRAM 31961 unix 2 [ ] DGRAM 134381 unix 3 [ ] STREAM CONNECTED 19249 unix 3 [ ] STREAM CONNECTED 21021 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 19248 unix 3 [ ] STREAM CONNECTED 24947 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 20263 /tmp/redis.sock unix 2 [ ] DGRAM 20285 unix 3 [ ] STREAM CONNECTED 19247 unix 3 [ ] SEQPACKET CONNECTED 19318 unix 3 [ ] STREAM CONNECTED 20400 unix 2 [ ] DGRAM 19282 unix 3 [ ] STREAM CONNECTED 28903 unix 2 [ ] DGRAM 134383 unix 2 [ ] DGRAM 19206 unix 3 [ ] STREAM CONNECTED 20401 unix 3 [ ] SEQPACKET CONNECTED 19320 unix 3 [ ] STREAM CONNECTED 19200 unix 3 [ ] STREAM CONNECTED 28902 unix 3 [ ] STREAM CONNECTED 20183 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 19375 unix 3 [ ] STREAM CONNECTED 21598 /tmp/redis.sock unix 2 [ ] DGRAM 21741 unix 2 [ ] DGRAM 24856 unix 3 [ ] STREAM CONNECTED 19374 unix 3 [ ] STREAM CONNECTED 21596 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 21403 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 20187 /tmp/redis.sock unix 2 [ ] DGRAM 24632 unix 3 [ ] STREAM CONNECTED 20185 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 19915 unix 2 [ ] DGRAM 23802 unix 2 [ ] DGRAM 19152 unix 3 [ ] STREAM CONNECTED 19412 unix 2 [ ] DGRAM 30756 unix 3 [ ] STREAM CONNECTED 19916 unix 3 [ ] STREAM CONNECTED 21758 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 16672 unix 3 [ ] STREAM CONNECTED 19411 unix 3 [ ] STREAM CONNECTED 19917 unix 3 [ ] STREAM CONNECTED 19415 unix 3 [ ] STREAM CONNECTED 20181 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 20402 unix 3 [ ] STREAM CONNECTED 19414 unix 3 [ ] STREAM CONNECTED 20179 /tmp/redis.sock unix 2 [ ] DGRAM 19426 unix 3 [ ] STREAM CONNECTED 21756 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 21754 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 19373 unix 2 [ ] DGRAM 28401 unix 2 [ ] DGRAM 19242 unix 3 [ ] SEQPACKET CONNECTED 19317 unix 2 [ ] DGRAM 28869 unix 2 [ ] DGRAM 28949 unix 3 [ ] STREAM CONNECTED 21600 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 21399 /tmp/redis.sock unix 3 [ ] STREAM CONNECTED 21401 /tmp/redis.sock unix 3 [ ] SEQPACKET CONNECTED 19319 unix 3 [ ] STREAM CONNECTED 24945 /tmp/redis.sock /proc/net/softnet_stat: 000004ea 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000033 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000052 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00003866 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 cat /proc/net/anul_ap_stats ANUL AP stats TX-txnid:0 RX-txnid:0 TX-Tot:0 TX-Err:0 RX-Tot:0 RX-Err:0 RX-Throttle:0 RX-Non-80211:0 RX-Mgmt-tot:0 RX-CTL:0 RX-Data:0 RX-Other:0 RX-Mgmt-err:0 RX-Mgmt-subtypes: aruba_dbg_system_status_last Finished time: Fri Aug 5 12:34:39 UTC 2022 aruba_dbg_system_status_last: Read 9985 bytes in 162 lines. Truncated:FALSE end of show ap debug system-status ======================================================== show ap debug client-match Client Match is disabled:Client match is not configured end of show ap debug client-match ======================================================== show ap client-probe-report 0 end of show ap client-probe-report 0 ======================================================== show ap client-probe-report 1 end of show ap client-probe-report 1 ======================================================== show ap client-match-refused 0 Last Refused Clients Table -------------------------- MAC RSSI Refused Count Last Refused Time --- ---- ------------- ----------------- end of show ap client-match-refused 0 ======================================================== show ap client-match-refused 1 Last Refused Clients Table -------------------------- MAC RSSI Refused Count Last Refused Time --- ---- ------------- ----------------- end of show ap client-match-refused 1 ======================================================== show ap client-view Client Match is disabled:Client match is not configured end of show ap client-view ======================================================== show ap virtual-beacon-report Client Match is disabled:Client match is not configured end of show ap virtual-beacon-report ======================================================== show ap client-match-live Client Match is disabled:Client match is not configured end of show ap client-match-live ======================================================== show ap client-match-history Client Match is disabled:Client match is not configured end of show ap client-match-history ======================================================== show ap client-match-actions Client Match is disabled:Client match is not configured end of show ap client-match-actions ======================================================== show ap client-match-triggers Client Match is disabled:Client match is not configured end of show ap client-match-triggers ======================================================== show clock Current Time :2022-08-05 12:34:39 end of show clock ======================================================== show ap arm rf-summary Channel Summary --------------- phy-type channel retry phy-err mac-err noise util(Qual) cov-idx(Total) intf_idx(Total) -------- ------- ----- ------- ------- ----- ---------- -------------- --------------- Columns:util(Qual): ch-util/rx/tx/ext-ch-util/quality Noise followed by "*" indicates that the last scan on this channel was a split-scan, which was triggered by high channel noise. Check show ap arm split-scan-history. HT/VHT Channel Summary ---------------------- Phy-Type Bandwidth Channel range Total interference index -------- --------- ------------- ------------------------ Interface Name :wifi0 Phy-Type :5GHz Current ARM Assignment :0/127.0 Covered channels 5/2.4/6GHz :0/0/0 Free channels 5/2.4/6GHz :0/0/0 ARM Edge State :disable Last check channel/pwr :2h:1m:7s/2h:1m:7s Last change channel/pwr :2h:1m:7s/2h:1m:7s Next Check channel/pwr :0s/0s Assignment Mode :Single Band Interface Name :wifi1 Phy-Type :2.4GHz Current ARM Assignment :0/127.0 Covered channels 5/2.4/6GHz :0/0/0 Free channels 5/2.4/6GHz :0/0/0 ARM Edge State :disable Last check channel/pwr :2h:1m:7s/2h:1m:7s Last change channel/pwr :2h:1m:7s/2h:1m:7s Next Check channel/pwr :0s/0s Assignment Mode :Single Band Interface Name :wifi2 Phy-Type :6GHz Current ARM Assignment :0/127.0 Covered channels 5/2.4/6GHz :0/0/0 Free channels 5/2.4/6GHz :0/0/0 ARM Edge State :disable Last check channel/pwr :2h:1m:7s/2h:1m:7s Last change channel/pwr :2h:1m:7s/2h:1m:7s Next Check channel/pwr :0s/0s Assignment Mode :Single Band CCA stats history:wifi0 Phy-Type:5GHz Channel quality history:wifi0 CCA stats history:wifi1 Phy-Type:2.4GHz Channel quality history:wifi1 CCA stats history:wifi2 Phy-Type:6GHz Channel quality history:wifi2 end of show ap arm rf-summary ======================================================== show ap arm history Interface :wifi0 Phy-Type :5GHz Interface :wifi1 Phy-Type :2.4GHz Interface :wifi2 Phy-Type :6GHz I: Interference, R: Radar detection, N: Noise exceeded, Q: Bad Channel Quality E: Error threshold exceeded, INV: Invalid Channel, G: Rogue AP Containment, M: Empty Channel, P+: Increase Power, P-: Decrease Power, 40INT: 40MHZ intol detected on 2.4G, NO40INT: 40MHz intol cleared on 2.4G, OFF(R): Turn off Radio due to Radar, OFF(MA): Turn off Radio due to Mode Aware, ON: Turn on Radio, D: Dynamic Bandwidth Switch, AIRMATCH: AirMatch Event, I*: CCA Interference, C: Radar cleared, NC: Noise Cleared, Random: Random Channel, RMC: Radio Mode Change, RCP: Radio Client Preference Change, OFF(C) : Turn off Radio due to config, U: UTB end of show ap arm history ======================================================== show ap monitor ap-list Monitored AP Table ------------------ bssid essid band/chan/ch-width/ht-type 6GHz capable ap-type transition-type confirmed dos dt/mt ut/it encr nstas avg-snr curr-snr avg-rssi curr-rssi wmacs ibss cl-delay bss-color partial bss color bss color disabled ----- ----- -------------------------- ------------ ------- --------------- --------- --- ----- ----- ---- ----- ------- -------- -------- --------- ----- ---- -------- --------- ----------------- ------------------ b8:c3:85:02:e1:97 HUAWEI nova 3i 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/1 wpa2-psk-aes 2 10 12 84 83 0 no 0 --- --- --- 80:8d:b7:92:bc:c1 Hadi_WDU 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 16 17 78 78 0 no 0 --- --- --- 80:8d:b7:92:bc:c2 HCVOICE 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 16 17 78 78 0 no 0 --- --- --- 80:8d:b7:92:ed:e1 Hadi_WDU 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 36 37 58 58 0 no 0 --- --- --- 80:8d:b7:92:ed:e2 HCVOICE 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 36 37 58 58 0 no 0 --- --- --- 80:8d:b7:92:ed:01 Hadi_WDU 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 56 57 38 38 0 no 0 --- --- --- 80:8d:b7:92:ed:02 HCVOICE 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 1 56 57 38 38 67 no 0 --- --- --- 80:8d:b7:92:ed:05 GUEST 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 open 0 56 56 38 39 0 no 0 --- --- --- 80:8d:b7:92:eb:a1 Hadi_WDU 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 31 34 63 61 0 no 0 --- --- --- 80:8d:b7:92:eb:a2 HCVOICE 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 31 33 63 62 0 no 0 --- --- --- 80:8d:b7:92:f9:01 Hadi_WDU 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/1 wpa2-psk-aes 0 14 15 80 80 0 no 0 --- --- --- 80:8d:b7:92:f9:02 HCVOICE 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/0 wpa2-psk-aes 0 14 15 80 80 0 no 0 --- --- --- 98:9c:57:6a:6e:85 HUAWEI Mate 10 Pro 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 0/2 wpa2-psk-aes 2 9 9 85 86 0 no 0 --- --- --- 80:8d:b7:93:41:62 HCVOICE 2.4GHz/1/20MHz/HT no interfering interfering no disable 7237/4704 2/2 wpa2-psk-aes 0 10 11 84 84 0 no 0 --- --- --- 80:8d:b7:93:41:61 Hadi_WDU 2.4GHz/1/20MHz/HT no interfering interfering no disable 7202/4704 0/2 wpa2-psk-aes 0 10 10 84 85 0 no 0 --- --- --- 62:e6:f0:d7:2b:06 DIRECT-11-AndroidAP 2.4GHz/1/20MHz/HT no interfering interfering no disable 1119/783 1115/779 wpa2-psk-aes 1 0 11 0 84 0 no 0 --- --- --- 82:ce:b9:c3:3c:41 Galaxy A7 (2018)3C41 2.4GHz/1/20MHz/HT no interfering interfering no disable 834/579 834/579 wpa2-psk-aes 0 0 9 0 86 0 no 0 --- --- --- c4:9f:4c:71:8a:7c VIVA-4G-LTE-8A7C 2.4GHz/1/20MHz/HT no interfering interfering no disable 690/482 689/481 wpa2-psk-aes 0 0 9 0 86 0 no 0 --- --- --- 52:57:1a:85:c7:99 Srilanka Lady 2.4GHz/1/20MHz/HT no interfering interfering no disable 499/351 244/170 wpa2-psk-aes 1 0 7 0 88 0 no 0 --- --- --- b2:c7:be:7d:9b:00 HUAWEI Mate 20 X (5G) 2.4GHz/1/20MHz/VHT no interfering interfering no disable 146/106 136/106 wpa2-psk-aes 0 7 8 88 87 0 no 0 --- --- --- Start:0 Length:20 Total:20 Current max monitor size:2048 (*): Non-transmitted BSSID end of show ap monitor ap-list ======================================================== show ap spectrum device-duty-cycle Spectrum Monitoring is not supported for the AP type end of show ap spectrum device-duty-cycle ======================================================== show ap spectrum device-list Spectrum Monitoring is not supported for the AP type end of show ap spectrum device-list ======================================================== show ap spectrum device-history Spectrum Monitoring is not supported for the AP type end of show ap spectrum device-history ======================================================== show ap spectrum device-log Spectrum Monitoring is not supported for the AP type end of show ap spectrum device-log ======================================================== show cert all Default Server Certificate: Version :2 Serial Number :3D Issuer :/CN=Aruba635-CNMYKYJ09J/ST=California/O=Aruba Networks/OU=Instant/C=US Subject :/CN=securelogin.arubanetworks.com/L=Sunnyvale/ST=California/O=Aruba Networks/OU=Instant/C=US Issued On :Aug 5 05:56:07 2022 GMT Expires On :Aug 2 05:56:10 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Current CP Server Certificate: Version :2 Serial Number :0D82A2BE28FE912199C29B49E8583EBF Issuer :/C=US/O=DigiCert Inc/CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 Subject :/C=US/ST=California/L=Palo Alto/O=Hewlett Packard Enterprise Company/CN=securelogin.hpe.com Issued On :Nov 8 00:00:00 2021 GMT Expires On :Nov 8 23:59:59 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :085F94C02D857BE8CC14FF53EDA23E2A Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Subject :/C=US/O=DigiCert Inc/CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 Issued On :Sep 24 00:00:00 2020 GMT Expires On :Sep 23 23:59:59 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :033AF1E6A711A9A0BB2864B11D09FAE5 Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Current Web UI Server Certificate: Version :2 Serial Number :0D82A2BE28FE912199C29B49E8583EBF Issuer :/C=US/O=DigiCert Inc/CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 Subject :/C=US/ST=California/L=Palo Alto/O=Hewlett Packard Enterprise Company/CN=securelogin.hpe.com Issued On :Nov 8 00:00:00 2021 GMT Expires On :Nov 8 23:59:59 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :085F94C02D857BE8CC14FF53EDA23E2A Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Subject :/C=US/O=DigiCert Inc/CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1 Issued On :Sep 24 00:00:00 2020 GMT Expires On :Sep 23 23:59:59 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :033AF1E6A711A9A0BB2864B11D09FAE5 Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 IoT Operations CA Certificate: Version :2 Serial Number :9B1F072626878672 Issuer :/C=US/ST=CA/L=Sunnyvale/O=HPE Aruba Networks/CN=*.test.pdt1.arubathena.com/emailAddress='' Subject :/C=US/ST=CA/L=Sunnyvale/O=HPE Aruba Networks/CN=*.test.pdt1.arubathena.com/emailAddress='' Issued On :Nov 1 16:54:34 2016 GMT Expires On :Mar 19 16:54:34 2044 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :7FCA90A09238929F485E8F5154C67AA2 Issuer :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Platform Root CA 1.0 Subject :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Platform Root CA 1.0 Issued On :Apr 6 22:59:05 2017 GMT Expires On :Apr 6 23:05:11 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :3800000009AF9A9FE60ECF990B000000000009 Issuer :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Platform Root CA 1.0 Subject :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Policy CA 1.1 Issued On :May 10 19:30:49 2017 GMT Expires On :Apr 6 23:05:11 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :6100000006A4FF835CFF438D09000000000006 Issuer :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Policy CA 1.1 Subject :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Issuing CA dev Issued On :May 12 20:01:06 2017 GMT Expires On :Apr 6 23:05:11 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :61000000077633EE5299404FC0000000000007 Issuer :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Policy CA 1.1 Subject :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Issuing CA 1.1 Issued On :May 24 21:18:43 2017 GMT Expires On :Apr 6 23:05:11 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :61000000084D5A5C46363A311D000000000008 Issuer :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Policy CA 1.1 Subject :/C=US/O=Aruba Networks/OU=DeviceTrust/OU=Operations/CN=Aruba Networks Central Issuing CA 1.2 Issued On :May 24 21:57:07 2017 GMT Expires On :Apr 6 23:05:11 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Device Certificate: Version :2 Serial Number :4460E1FC000200FA0341 Issuer :/DC=com/DC=arubanetworks/DC=devicesign/CN=Aruba Networks Trusted Computing Issuing CA 3 Subject :/CN=CNMYKYJ09J::94:64:24:c1:45:e4 Issued On :Dec 1 04:27:25 2021 GMT Expires On :Sep 14 03:21:14 2032 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 end of show cert all ======================================================== show captive-portal-domains Internal Captive Portal Domain: securelogin.hpe.com External Captive Portal Domains: end of show captive-portal-domains ======================================================== show ap allowed-channels Allowed Channels for AP Type 635 Country Code KW ------------------------------------------------ PHY Type Allowed Channels -------- ---------------- 2.4GHz (indoor) None 5GHz (indoor) None 2.4GHz (outdoor) None 5GHz (outdoor) None 2.4GHz 40MHz (indoor) None 5GHz 40MHz (indoor) None 2.4GHz 40MHz (outdoor) None 5GHz 40MHz (outdoor) None 5GHz 80MHz (indoor) None 5GHz 80MHz (outdoor) None 5GHz 160MHz (indoor) None 5GHz 160MHz (outdoor) None 5GHz (DFS) None 5GHz (ZWDFS) disable 6GHz (indoor) None 6GHz (LP indoor) None 6GHz (outdoor) None 6GHz 40MHz (indoor) None 6GHz 40MHz (LP indoor) None 6GHz 40MHz (outdoor) None 6GHz 80MHz (indoor) None 6GHz 80MHz (LP indoor) None 6GHz 80MHz (outdoor) None 6GHz 160MHz (indoor) None 6GHz 160MHz (LP indoor) None 6GHz 160MHz (outdoor) None end of show ap allowed-channels ======================================================== show log driver [ 45.288783] cnss[27]: INFO: Target capability: chip_id: 0x0, chip_family: 0x0, board_id: 0xa7, soc_id: 0xffffffff, fw_version: 0x2408085e, fw_build_timestamp: 2021-08-16 09:43, otp_version: 0x0 eeprom_caldata_read_timeout 0s [ 45.288959] BDF preload check begin: file qcn9000/bdwlan.ba7 len 131072 bdf_type 5 is_bypass 0 [ 45.289092] Update the UTB filter version: type 0 A1-A4 1 1 1 1 channel space 210 [ 45.289098] Update the target power table: src offset 25688 dest offset 25688 len 4020 [ 45.289120] BDF preload check is done, ret 0 [ 45.289123] cnss[27]: INFO: Downloading BDF: qcn9000/bdwlan.ba7, size: 131072 [ 45.304184] BDF preload check begin: file qcn9000/caldata_1.bin len 131072 bdf_type 6 is_bypass 0 [ 45.304484] BDF preload check is done, ret 0 [ 45.304487] cnss[27]: INFO: Downloading BDF: qcn9000/caldata_1.bin, size: 131072 [ 45.379808] cnss[27]: INFO: FW ready received for device 0x1104 [ 45.380664] cnss[27]: INFO: Sending mode message, mode: MISSION(0), state: 0x17 [ 45.401836] wlan: [7105:E:QDF] CONFIG creation failed [ 45.401852] __ol_ath_attach 4564 ini config hw_mode 0 preferred_hw_mode 0 target_type 26 board_id a7 [ 45.419757] wlan: [56:F:DP] dp_rx_enable_mon_dest_frag: Feature DP_RX_MON_MEM_FRAG for mon_dest is enabled [ 46.034572] wlan: [7105:E:NSS] [nss-wifili]: pdev:ffffff801d801a00 radio_ifnum:30 scheme_id:2 radio_priority:1 [ 46.039135] wlan: [7105:E:TIF] target_if_lro_hash_config: pdev with id 0 is NULL [ 46.040090] wlan: [7105:I:MSCS] qca_mscs_module_init: [ 46.040090] ****QCA MSCS Initialization Done**** SoC ffffffc061b80a00 [ 46.041602] wlan: [7105:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 46.042041] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: config_low: 0x88888888 [ 46.042046] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: config_high: 0x8888888 [ 46.042051] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 1 is 0 [ 46.042056] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 2 is 0 [ 46.042060] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 3 is 0 [ 46.042065] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 4 is 0 [ 46.042176] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 5 is 0 [ 46.042181] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 6 is 0 [ 46.042185] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 7 is 0 [ 46.042190] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 8 is 0 [ 46.042195] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 9 is 0 [ 46.042200] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 10 is 0 [ 46.042308] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 11 is 0 [ 46.042313] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 12 is 0 [ 46.042318] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 13 is 0 [ 46.042322] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 14 is 0 [ 46.042327] wlan: [7105:I:MBSSIE] ieee80211_allocate_beacon_pos_for_mbss_cache_nodes: beacon position for mbss cache node with bssidx: 15 is 0 [ 46.042332] wlan: [7105:I:MBSSIE] ieee80211_determine_max_non_transmit_vaps: :< 16 [ 46.043664] wlan: [0:E:NSS] [nss-wifili]: NSS Wifili DBDC Repeater enable message passed [ 46.047125] Wed Dec 1 12:36:43 2021:7 32.527239 Client Match: IAP client match init on wifi2 [ 46.049701] wlan: [7105:I:Dynamic Mode Change] ol_ath_check_and_reconfig_hw_mode: Running with HW mode = 0 [ 46.050109] wlan: [7105:E:QLD] qld_register: Handle or address is NULL [ 46.050139] aruba_mods_radio_attach: dev: ic:ffffff801d801a00 osdev:ffffff801d801000 phy:2 [ 46.050150] wifi2: Base BSSID 94:64:24:94:5e:50, 16 available BSSID(s) processor ID: 0 [ 46.050154] eth0 address=94:64:24:c1:45:e4 [ 46.050160] br0 address=94:64:24:c1:45:e4 [ 46.050164] wifi2: AP type AP-635, radio 2, max_bssids 16 [ 46.050168] aruba_mods_radio_attach() INT setting antenna polarization to 1 radio 2 [ 46.050420] wlan: [7105:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 46.050475] ***rx board limit event:radio_id 2 pdev id 0 band 0 psoc 60dc3000 [ 46.050501] ***rx board limit event:radio_id 2 pdev id 0 band 1 psoc 60dc3000 [ 46.050528] Wed Dec 1 12:36:43 2021:8 32.530560 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 46.050550] ***rx board limit event:radio_id 2 pdev id 0 band 2 psoc 60dc3000 [ 46.111610] Wed Dec 1 12:36:43 2021:9 32.591721 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 8.0 Min EIRP 0.0 [ 46.112204] aruba_am_copy_rx_ring_init r2 am-copy rx ring init done [ 46.115428] aruba_am_copy_tx_ring_init r2 am-copy tx ring init done [ 46.115546] Event 0x3 is registered for RC 0 [ 71.595837] Fri Aug 5 07:29:53 2022:10 21322422.280426 wifi0: Effective External Antenna Gain set to 4.9 (connector loss 0.0) [ 71.596712] Fri Aug 5 07:29:53 2022:11 21322422.281307 Radio0: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 71.597271] wmi_unified_vdev_create_send: ID = 0 Type = 4, Subtype = 0, nss_2g = 3, nss_5g = 3, pdev ID = 0 VAP Addr = 94:64:24:94:5e:6f [ 71.597517] wlan: [7985:F:DP] dp_vdev_register_tx_handler: Configure tx_vdev_id_chk_handler Feature Flag: 0 and mode:4 for vdev_id:0 [ 71.597575] wlan_vap_create 1761 radio_id 0 force promisc_mode(promisc_mode_enabled 1) to 1 [ 71.598961] Fri Aug 5 07:29:53 2022:vap_device_event: dev aruba015 (0:15) has been registered [ 71.599046] asap_vap_attach: asap_vaps[0][15] attached, vap: ffffffc059625800, dev: aruba015 ffffffc061954000 [ 71.601926] wlan: [0:E:NSS] [nss-wifili]: peer create config msg failed with error = 18 peer id 0 [ 71.602059] nss_vap_set_cfg:1318 tunnel_id=0x82f0 wdev=aruba015, msg_code 2 [ 71.602082] nss_vap_set_wmm_dscp_mapping:1291 Set nss vap dscp mapping config: 31->1 !!! [ 71.602144] vap dev: aruba015, forward mode change from 0 to 1 [ 71.607283] 8021q: adding VLAN 0 to HW filter on device aruba015 [ 71.607457] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba015 (0:15) is up [ 71.610369] _anul_radio_sysctl_integer: MODE override - enable vht for monitor mode [ 71.619949] Fri Aug 5 07:29:53 2022:12 21322422.304525 wifi1: Effective External Antenna Gain set to 2.9 (connector loss 0.0) [ 71.680445] Fri Aug 5 07:29:53 2022:13 21322422.365033 Radio1: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 10.9 Min EIRP -4.1 [ 71.681049] wmi_unified_vdev_create_send: ID = 1 Type = 4, Subtype = 0, nss_2g = 3, nss_5g = 3, pdev ID = 1 VAP Addr = 94:64:24:94:5e:4f [ 71.681222] wlan: [7985:F:DP] dp_vdev_register_tx_handler: Configure tx_vdev_id_chk_handler Feature Flag: 0 and mode:4 for vdev_id:1 [ 71.681297] wlan_vap_create 1761 radio_id 1 force promisc_mode(promisc_mode_enabled 1) to 1 [ 71.682862] Fri Aug 5 07:29:53 2022:vap_device_event: dev aruba115 (1:15) has been registered [ 71.682946] asap_vap_attach: asap_vaps[1][15] attached, vap: ffffffc059492000, dev: aruba115 ffffffc05944a000 [ 71.683138] wlan: [0:E:NSS] [nss-wifili]: peer create config msg failed with error = 18 peer id 1 [ 71.685421] nss_vap_set_cfg:1318 tunnel_id=0x83f0 wdev=aruba115, msg_code 2 [ 71.685450] nss_vap_set_wmm_dscp_mapping:1291 Set nss vap dscp mapping config: 33->1 !!! [ 71.685525] vap dev: aruba115, forward mode change from 0 to 1 [ 71.692455] wlan: [0:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_is_stadfs_enabled: dfs is NULL [ 71.692655] 8021q: adding VLAN 0 to HW filter on device aruba115 [ 71.692730] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba115 (1:15) is up [ 71.730970] Key: 2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c +~..(.........O< [ 71.730980] Plain text: 6b c1 be e2 2e 40 9f 96 e9 3d 7e 11 73 93 17 2a k....@...=~.s..* [ 71.731154] Handler Data: 3a d7 7b b4 0d 7a 36 60 a8 9e ca f3 24 66 ef 97 :.{..z6`....$f.. [ 71.731158] Cipher text: 3a d7 7b b4 0d 7a 36 60 a8 9e ca f3 24 66 ef 97 :.{..z6`....$f.. [ 71.853168] asap_vap_gone: vap gone notification for 0:15 dev ffffffc061954000 fw_mode 1 [ 71.853202] asap_vap_gone: asap_vaps[0][15] gone, vap: ffffffc059625800 dev: aruba015 ffffffc061954000 [ 71.853244] ASAP_FIREWALL_REM_MCAST: 1 0 15 1, no vap [ 71.853341] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba015 (0:15) is going down [ 71.853686] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba015 (0:15) is down [ 71.853784] Fri Aug 5 07:29:53 2022:vap_device_event: dev aruba015 (0:15) has been unregistered [ 71.860464] wlan: [0:E:NSS] osif_nss_wifili_event_receive: [nss-wifili]:peer delete configuration message failed with error = 26 peer_id = 0 [ 72.862037] wlan_stop 2181 radio_id 0 force promisc_mode(promisc_mode_enabled 0) to 0 [ 72.940942] asap_vap_gone: vap gone notification for 1:15 dev ffffffc05944a000 fw_mode 1 [ 72.940974] asap_vap_gone: asap_vaps[1][15] gone, vap: ffffffc059492000 dev: aruba115 ffffffc05944a000 [ 72.941094] Fri Aug 5 07:29:54 2022: vap_device_event: dev aruba115 (1:15) is going down [ 72.941415] Fri Aug 5 07:29:54 2022: vap_device_event: dev aruba115 (1:15) is down [ 72.941495] Fri Aug 5 07:29:54 2022:vap_device_event: dev aruba115 (1:15) has been unregistered [ 72.949716] wlan: [0:E:NSS] osif_nss_wifili_event_receive: [nss-wifili]:peer delete configuration message failed with error = 26 peer_id = 1 [ 73.939880] wlan_stop 2181 radio_id 1 force promisc_mode(promisc_mode_enabled 0) to 0 [ 78.889809] i am conductor now [ 78.889829] (07:30:00) !!! Init ---> Conductor [ 78.889855] asap_send_elected_conductor: sent successfully [ 80.943493] aruba_commit_radio 4965 ffffff801d801a00 [ 80.946972] aruba_commit_radio 4965 ffffff801d801a00 [ 80.950555] aruba_commit_radio 4965 ffffff801d801a00 [ 99.868808] debug:num of 6g omni channel 0, [ 99.869133] Fri Aug 5 07:30:21 2022:14 21322450.553725 wifi2: Effective External Antenna Gain set to 4.3 (connector loss 0.0) [ 99.930167] Fri Aug 5 07:30:21 2022:15 21322450.614753 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 5772.915528] nss-dp 3a001800.dp2 eth1: PHY Link up speed: 1000 [ 5772.915695] Slave eth1 with speed 1000 Mbps full duplex [ 5772.915703] ethernet_device_event: dev eth1 is changed, carrier: 1 [ 5773.275477] bond0: link status definitely up for interface eth1, 1000 Mbps full duplex [ 5773.275514] ethernet_device_event: dev eth1 others: 25 [ 5773.275521] ethernet_device_event: dev eth1 others: 25 [ 7054.935037] Enabling USB power [ 7054.935070] Unable to set Tx Chainmask (48) in FW pdev for Radio 0 [ 7054.935075] Unable to set Rx Chainmask (48) in FW pdev for Radio 0 [ 7054.935087] Fri Aug 5 09:26:16 2022:16 21329405.625748 Radio0: Tx power 127.5dBm, Chainmask 2x2 [ 7054.936235] Fri Aug 5 09:26:16 2022:17 21329405.626892 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7054.936288] Fri Aug 5 09:26:16 2022:18 21329405.626952 Radio1: Tx power 127.5dBm, Chainmask 2x2 [ 7054.996945] Fri Aug 5 09:26:16 2022:19 21329405.687597 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 [ 7054.997044] Fri Aug 5 09:26:16 2022:20 21329405.687707 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 7055.058240] Fri Aug 5 09:26:16 2022:21 21329405.748892 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 7059.051287] Disabling USB power [ 7059.051316] Unable to set Tx Chainmask (16) in FW pdev for Radio 0 [ 7059.051321] Unable to set Rx Chainmask (16) in FW pdev for Radio 0 [ 7059.051333] Fri Aug 5 09:26:20 2022:22 21329409.742000 Radio0: Tx power 1.0dBm, Chainmask 2x2 [ 7059.052176] Fri Aug 5 09:26:20 2022:23 21329409.742843 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7059.052238] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7059.052249] Fri Aug 5 09:26:20 2022:24 21329409.742920 Radio1: Tx power 1.0dBm, Chainmask 1x1 [ 7059.112743] Fri Aug 5 09:26:20 2022:25 21329409.803403 Radio1: User EIRP 127.0 Actual EIRP 3.9 Max EIRP 3.9 Min EIRP -7.1 [ 7059.112857] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7059.112868] Fri Aug 5 09:26:20 2022:26 21329409.803539 Radio2: Tx power 1.0dBm, Chainmask 1x1 [ 7059.173919] Fri Aug 5 09:26:20 2022:27 21329409.864578 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 5.3 Min EIRP -5.7 [ 7065.008185] Enabling USB power [ 7065.008218] Unable to set Tx Chainmask (48) in FW pdev for Radio 0 [ 7065.008223] Unable to set Rx Chainmask (48) in FW pdev for Radio 0 [ 7065.008235] Fri Aug 5 09:26:26 2022:28 21329415.698911 Radio0: Tx power 127.5dBm, Chainmask 2x2 [ 7065.009091] Fri Aug 5 09:26:26 2022:29 21329415.699765 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7065.009157] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7065.009169] Fri Aug 5 09:26:26 2022:30 21329415.699849 Radio1: Tx power 127.5dBm, Chainmask 2x2 [ 7065.013829] Unable to set Tx Chainmask (48) in FW pdev for Radio 0 [ 7065.013834] Unable to set Rx Chainmask (48) in FW pdev for Radio 0 [ 7065.013842] Fri Aug 5 09:26:26 2022:31 21329415.704521 Radio0: Tx power 127.5dBm, Chainmask 2x2 [ 7065.014604] Fri Aug 5 09:26:26 2022:32 21329415.705282 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7065.014628] Fri Aug 5 09:26:26 2022:33 21329415.705307 Radio1: Tx power 127.5dBm, Chainmask 2x2 [ 7065.069638] Fri Aug 5 09:26:26 2022:34 21329415.760306 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 [ 7065.069727] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7065.069739] Fri Aug 5 09:26:26 2022:35 21329415.760418 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 7065.075058] Fri Aug 5 09:26:26 2022:36 21329415.765735 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 [ 7065.075089] Fri Aug 5 09:26:26 2022:37 21329415.765769 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 7065.130725] Fri Aug 5 09:26:26 2022:38 21329415.821392 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 7065.134031] POE power conditions have improved: the new condition is 'POE-AT: No restrictions' [ 7065.136061] Fri Aug 5 09:26:26 2022:39 21329415.826728 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 7174.913649] nss-dp 3a001800.dp2 eth1: PHY Link is down [ 7174.913965] Slave eth1 with speed 10 Mbps half duplex [ 7174.913977] ethernet_device_event: dev eth1 is changed, carrier: 0 [ 7175.283529] bond0: link status definitely down for interface eth1, disabling it [ 7175.283566] ethernet_device_event: dev eth1 others: 25 [ 7175.283574] ethernet_device_event: dev eth1 others: 25 Driver Log -------------------------------------------------------- Current Log Level 3 Log Counter 40 Timestamp 21329908.518222 1 31.495996 Client Match: IAP client match init on wifi0 2 31.504224 Client Match: IAP client match init on wifi1 3 31.517112 Radio0: Tx power 127.5dBm, Chainmask 2x2 4 31.518001 Radio0: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP 0.0 5 31.522044 Radio1: Tx power 127.5dBm, Chainmask 2x2 6 31.582519 Radio1: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 8.0 Min EIRP 0.0 7 32.527239 Client Match: IAP client match init on wifi2 8 32.530560 Radio2: Tx power 127.5dBm, Chainmask 2x2 9 32.591721 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 8.0 Min EIRP 0.0 10 21322422.280426 wifi0: Effective External Antenna Gain set to 4.9 (connector loss 0.0) 11 21322422.281307 Radio0: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 12 21322422.304525 wifi1: Effective External Antenna Gain set to 2.9 (connector loss 0.0) 13 21322422.365033 Radio1: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 10.9 Min EIRP -4.1 14 21322450.553725 wifi2: Effective External Antenna Gain set to 4.3 (connector loss 0.0) 15 21322450.614753 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 16 21329405.625748 Radio0: Tx power 127.5dBm, Chainmask 2x2 17 21329405.626892 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 18 21329405.626952 Radio1: Tx power 127.5dBm, Chainmask 2x2 19 21329405.687597 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 20 21329405.687707 Radio2: Tx power 127.5dBm, Chainmask 2x2 21 21329405.748892 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 22 21329409.742000 Radio0: Tx power 1.0dBm, Chainmask 2x2 23 21329409.742843 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 24 21329409.742920 Radio1: Tx power 1.0dBm, Chainmask 1x1 25 21329409.803403 Radio1: User EIRP 127.0 Actual EIRP 3.9 Max EIRP 3.9 Min EIRP -7.1 26 21329409.803539 Radio2: Tx power 1.0dBm, Chainmask 1x1 27 21329409.864578 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 5.3 Min EIRP -5.7 28 21329415.698911 Radio0: Tx power 127.5dBm, Chainmask 2x2 29 21329415.699765 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 30 21329415.699849 Radio1: Tx power 127.5dBm, Chainmask 2x2 31 21329415.704521 Radio0: Tx power 127.5dBm, Chainmask 2x2 32 21329415.705282 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 33 21329415.705307 Radio1: Tx power 127.5dBm, Chainmask 2x2 34 21329415.760306 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 35 21329415.760418 Radio2: Tx power 127.5dBm, Chainmask 2x2 36 21329415.765735 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 37 21329415.765769 Radio2: Tx power 127.5dBm, Chainmask 2x2 38 21329415.821392 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 39 21329415.826728 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 end of show log driver ======================================================== show log kernel [ 71.682946] asap_vap_attach: asap_vaps[1][15] attached, vap: ffffffc059492000, dev: aruba115 ffffffc05944a000 [ 71.683138] wlan: [0:E:NSS] [nss-wifili]: peer create config msg failed with error = 18 peer id 1 [ 71.685421] nss_vap_set_cfg:1318 tunnel_id=0x83f0 wdev=aruba115, msg_code 2 [ 71.685450] nss_vap_set_wmm_dscp_mapping:1291 Set nss vap dscp mapping config: 33->1 !!! [ 71.685525] vap dev: aruba115, forward mode change from 0 to 1 [ 71.692455] wlan: [0:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_is_stadfs_enabled: dfs is NULL [ 71.692655] 8021q: adding VLAN 0 to HW filter on device aruba115 [ 71.692730] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba115 (1:15) is up [ 71.730970] Key: 2b 7e 15 16 28 ae d2 a6 ab f7 15 88 09 cf 4f 3c +~..(.........O< [ 71.730980] Plain text: 6b c1 be e2 2e 40 9f 96 e9 3d 7e 11 73 93 17 2a k....@...=~.s..* [ 71.731154] Handler Data: 3a d7 7b b4 0d 7a 36 60 a8 9e ca f3 24 66 ef 97 :.{..z6`....$f.. [ 71.731158] Cipher text: 3a d7 7b b4 0d 7a 36 60 a8 9e ca f3 24 66 ef 97 :.{..z6`....$f.. [ 71.853168] asap_vap_gone: vap gone notification for 0:15 dev ffffffc061954000 fw_mode 1 [ 71.853202] asap_vap_gone: asap_vaps[0][15] gone, vap: ffffffc059625800 dev: aruba015 ffffffc061954000 [ 71.853244] ASAP_FIREWALL_REM_MCAST: 1 0 15 1, no vap [ 71.853341] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba015 (0:15) is going down [ 71.853686] Fri Aug 5 07:29:53 2022: vap_device_event: dev aruba015 (0:15) is down [ 71.853784] Fri Aug 5 07:29:53 2022:vap_device_event: dev aruba015 (0:15) has been unregistered [ 71.860464] wlan: [0:E:NSS] osif_nss_wifili_event_receive: [nss-wifili]:peer delete configuration message failed with error = 26 peer_id = 0 [ 72.862037] wlan_stop 2181 radio_id 0 force promisc_mode(promisc_mode_enabled 0) to 0 [ 72.940942] asap_vap_gone: vap gone notification for 1:15 dev ffffffc05944a000 fw_mode 1 [ 72.940974] asap_vap_gone: asap_vaps[1][15] gone, vap: ffffffc059492000 dev: aruba115 ffffffc05944a000 [ 72.941094] Fri Aug 5 07:29:54 2022: vap_device_event: dev aruba115 (1:15) is going down [ 72.941415] Fri Aug 5 07:29:54 2022: vap_device_event: dev aruba115 (1:15) is down [ 72.941495] Fri Aug 5 07:29:54 2022:vap_device_event: dev aruba115 (1:15) has been unregistered [ 72.949716] wlan: [0:E:NSS] osif_nss_wifili_event_receive: [nss-wifili]:peer delete configuration message failed with error = 26 peer_id = 1 [ 73.939880] wlan_stop 2181 radio_id 1 force promisc_mode(promisc_mode_enabled 0) to 0 [ 78.889809] i am conductor now [ 78.889829] (07:30:00) !!! Init ---> Conductor [ 78.889855] asap_send_elected_conductor: sent successfully [ 80.943493] aruba_commit_radio 4965 ffffff801d801a00 [ 80.946972] aruba_commit_radio 4965 ffffff801d801a00 [ 80.950555] aruba_commit_radio 4965 ffffff801d801a00 [ 99.868808] debug:num of 6g omni channel 0, [ 99.869133] Fri Aug 5 07:30:21 2022:14 21322450.553725 wifi2: Effective External Antenna Gain set to 4.3 (connector loss 0.0) [ 99.930167] Fri Aug 5 07:30:21 2022:15 21322450.614753 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 5772.915528] nss-dp 3a001800.dp2 eth1: PHY Link up speed: 1000 [ 5772.915695] Slave eth1 with speed 1000 Mbps full duplex [ 5772.915703] ethernet_device_event: dev eth1 is changed, carrier: 1 [ 5773.275477] bond0: link status definitely up for interface eth1, 1000 Mbps full duplex [ 5773.275514] ethernet_device_event: dev eth1 others: 25 [ 5773.275521] ethernet_device_event: dev eth1 others: 25 [ 7054.935037] Enabling USB power [ 7054.935070] Unable to set Tx Chainmask (48) in FW pdev for Radio 0 [ 7054.935075] Unable to set Rx Chainmask (48) in FW pdev for Radio 0 [ 7054.935087] Fri Aug 5 09:26:16 2022:16 21329405.625748 Radio0: Tx power 127.5dBm, Chainmask 2x2 [ 7054.936235] Fri Aug 5 09:26:16 2022:17 21329405.626892 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7054.936288] Fri Aug 5 09:26:16 2022:18 21329405.626952 Radio1: Tx power 127.5dBm, Chainmask 2x2 [ 7054.996945] Fri Aug 5 09:26:16 2022:19 21329405.687597 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 [ 7054.997044] Fri Aug 5 09:26:16 2022:20 21329405.687707 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 7055.058240] Fri Aug 5 09:26:16 2022:21 21329405.748892 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 7059.051287] Disabling USB power [ 7059.051316] Unable to set Tx Chainmask (16) in FW pdev for Radio 0 [ 7059.051321] Unable to set Rx Chainmask (16) in FW pdev for Radio 0 [ 7059.051333] Fri Aug 5 09:26:20 2022:22 21329409.742000 Radio0: Tx power 1.0dBm, Chainmask 2x2 [ 7059.052176] Fri Aug 5 09:26:20 2022:23 21329409.742843 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7059.052238] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7059.052249] Fri Aug 5 09:26:20 2022:24 21329409.742920 Radio1: Tx power 1.0dBm, Chainmask 1x1 [ 7059.112743] Fri Aug 5 09:26:20 2022:25 21329409.803403 Radio1: User EIRP 127.0 Actual EIRP 3.9 Max EIRP 3.9 Min EIRP -7.1 [ 7059.112857] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7059.112868] Fri Aug 5 09:26:20 2022:26 21329409.803539 Radio2: Tx power 1.0dBm, Chainmask 1x1 [ 7059.173919] Fri Aug 5 09:26:20 2022:27 21329409.864578 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 5.3 Min EIRP -5.7 [ 7065.008185] Enabling USB power [ 7065.008218] Unable to set Tx Chainmask (48) in FW pdev for Radio 0 [ 7065.008223] Unable to set Rx Chainmask (48) in FW pdev for Radio 0 [ 7065.008235] Fri Aug 5 09:26:26 2022:28 21329415.698911 Radio0: Tx power 127.5dBm, Chainmask 2x2 [ 7065.009091] Fri Aug 5 09:26:26 2022:29 21329415.699765 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7065.009157] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7065.009169] Fri Aug 5 09:26:26 2022:30 21329415.699849 Radio1: Tx power 127.5dBm, Chainmask 2x2 [ 7065.013829] Unable to set Tx Chainmask (48) in FW pdev for Radio 0 [ 7065.013834] Unable to set Rx Chainmask (48) in FW pdev for Radio 0 [ 7065.013842] Fri Aug 5 09:26:26 2022:31 21329415.704521 Radio0: Tx power 127.5dBm, Chainmask 2x2 [ 7065.014604] Fri Aug 5 09:26:26 2022:32 21329415.705282 Radio0: User EIRP 127.0 Actual EIRP 0.0 Max EIRP 0.0 Min EIRP -2.1 [ 7065.014628] Fri Aug 5 09:26:26 2022:33 21329415.705307 Radio1: Tx power 127.5dBm, Chainmask 2x2 [ 7065.069638] Fri Aug 5 09:26:26 2022:34 21329415.760306 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 [ 7065.069727] wlan: [850:E:dfs] WLAN_DEBUG_DFS_ALWAYS : tgt_dfs_set_fw_adfs_support: dfs is NULL [ 7065.069739] Fri Aug 5 09:26:26 2022:35 21329415.760418 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 7065.075058] Fri Aug 5 09:26:26 2022:36 21329415.765735 Radio1: User EIRP 127.0 Actual EIRP 10.9 Max EIRP 10.9 Min EIRP -4.1 [ 7065.075089] Fri Aug 5 09:26:26 2022:37 21329415.765769 Radio2: Tx power 127.5dBm, Chainmask 2x2 [ 7065.130725] Fri Aug 5 09:26:26 2022:38 21329415.821392 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 7065.134031] POE power conditions have improved: the new condition is 'POE-AT: No restrictions' [ 7065.136061] Fri Aug 5 09:26:26 2022:39 21329415.826728 Radio2: User EIRP 0.0 Actual EIRP 0.0 Max EIRP 12.3 Min EIRP -2.7 [ 7174.913649] nss-dp 3a001800.dp2 eth1: PHY Link is down [ 7174.913965] Slave eth1 with speed 10 Mbps half duplex [ 7174.913977] ethernet_device_event: dev eth1 is changed, carrier: 0 [ 7175.283529] bond0: link status definitely down for interface eth1, disabling it [ 7175.283566] ethernet_device_event: dev eth1 others: 25 [ 7175.283574] ethernet_device_event: dev eth1 others: 25 end of show log kernel ======================================================== show log debug Aug 5 12:33:17 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:33:17 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:33:27 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:33:27 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:33:27 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:33:27 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:33:27 cli[7956]: swarm_timer_handler,check_ssh Aug 5 12:33:31 claritylive[8756]: SAMI: send_amp_payload dhcp_cnt:0, dns_cnt:0, sta_dns_cnt:0, g_dns_stats_enable:1 Aug 5 12:33:37 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:33:37 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:33:37 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:33:37 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:33:41 mini_httpd[11522]: handle_request, 3392: 10.2.3.36, 59689, size 592 Aug 5 12:33:41 mini_httpd[11522]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:33:41 mini_httpd[11523]: handle_request, 3392: 10.2.3.36, 59690, size 592 Aug 5 12:33:41 mini_httpd[11523]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:33:41 mini_httpd[11524]: handle_request, 3392: 10.2.3.36, 59691, size 592 Aug 5 12:33:41 syslog: main, 3437: opcode is show Aug 5 12:33:41 mini_httpd[11524]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:33:41 syslog: main, 3437: opcode is show Aug 5 12:33:41 mini_httpd[11531]: handle_request, 3392: 10.2.3.36, 59692, size 592 Aug 5 12:33:41 mini_httpd[11531]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:33:41 syslog: main, 3437: opcode is show Aug 5 12:33:48 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:33:48 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:33:48 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:33:48 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:33:51 claritylive[8756]: SAMI: send_amp_payload dhcp_cnt:0, dns_cnt:0, sta_dns_cnt:0, g_dns_stats_enable:1 Aug 5 12:33:58 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:33:58 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:33:58 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:33:58 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:33:58 cli[7956]: [cloud] wsc: central_ap_info_callback(1240) reset diff flag Aug 5 12:33:58 cli[7956]: [cloud] wsc: prepare_and_send_IapState_data(2308) state bytes size=1880 Aug 5 12:33:58 cli[7956]: [cloud] wsc: cli_encode_msg_and_send_to_wsc(1525) topic: state.sync. Aug 5 12:33:58 cli[7956]: [cloud] wsc: send papi message to awc, srvid 1, type POST_REQUEST(11), raw message len 1902. use_payloadfile=0 Aug 5 12:33:58 awc[7953]: [cloud] wsc: receive message from application CLI0, len 1902 Aug 5 12:33:58 snmp[8020]: snmp: central_trap_entry_encode(692) trap entry message no update. Aug 5 12:33:58 awc[7953]: [cloud] wsc: receive a post request from application, topic state.sync, data len 1880, ce_ctx , len 0. Aug 5 12:33:58 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.state.sync, msg_len=1899. Aug 5 12:33:58 cli[7956]: [cloud] wsc: prepare_and_send_IapTrap_data(3977) trap data get from snmp, length 0. Aug 5 12:33:58 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:33:58 cli[7956]: [cloud] wsc: prepare_and_send_IapClitrap_data(4198) No CLI trap data, return Aug 5 12:33:58 cli[7956]: swarm_timer_handler,check_ssh Aug 5 12:33:58 awc[7953]: [cloud] wsc: lws_write send len 1899 return n= 1899 Aug 5 12:33:59 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:34:04 awc[7953]: [cloud] wsc: lws_write send len 29 return n= 29 Aug 5 12:34:08 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:34:08 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:34:08 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:34:08 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:34:11 claritylive[8756]: SAMI: send_amp_payload dhcp_cnt:0, dns_cnt:0, sta_dns_cnt:0, g_dns_stats_enable:1 Aug 5 12:34:11 mini_httpd[11679]: handle_request, 3392: 10.2.3.36, 59694, size 592 Aug 5 12:34:11 mini_httpd[11678]: handle_request, 3392: 10.2.3.36, 59693, size 592 Aug 5 12:34:11 mini_httpd[11678]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:34:11 mini_httpd[11680]: handle_request, 3392: 10.2.3.36, 59695, size 592 Aug 5 12:34:11 mini_httpd[11679]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:34:11 mini_httpd[11680]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:34:11 syslog: main, 3437: opcode is show Aug 5 12:34:11 mini_httpd[11687]: handle_request, 3392: 10.2.3.36, 59696, size 592 Aug 5 12:34:11 mini_httpd[11687]: handle_request, 3411: Try to check post auth user 10.2.3.36, dst 172.31.98.1 Aug 5 12:34:11 syslog: main, 3437: opcode is show Aug 5 12:34:18 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:34:18 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:34:18 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:34:18 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:34:28 cli[7956]: send_register_local,member send defaultcert checksum at heartbeat,cs_defaultcert_csum= 865950087 Aug 5 12:34:28 cli[7956]: recv_heartbeat_local,compare defaultcert checksum,cs_defaultcert_csum= 865950087 ,received defaultcert_csum =865950087 Aug 5 12:34:28 cli[7956]: recv_heartbeat_local, AP(127.0.0.1) config has taken effect Aug 5 12:34:28 cli[7956]: receive ap 127.0.0.1 with drt status 0 Aug 5 12:34:28 cli[7956]: swarm_timer_handler,check_ssh Aug 5 12:34:31 claritylive[8756]: SAMI: send_amp_payload dhcp_cnt:0, dns_cnt:0, sta_dns_cnt:0, g_dns_stats_enable:1 Aug 5 12:34:35 awc[7953]: [cloud] wsc: receive server message topic iap.cmd.debug.req Aug 5 12:34:35 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:34:35 awc[7953]: [cloud] wsc: get application CLI0. Aug 5 12:34:35 awc[7953]: [cloud] wsc: send papi message to application CLI0, srvid 1, type COMMAND_REQUEST(9), raw message len 54. Aug 5 12:34:35 cli[7956]: [cloud] wsc: parse_wsc_msg(1984) receive message type COMMAND_REQUEST(9), message size 32 Aug 5 12:34:35 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| athena_debug_execute: 12056: topic='cmd.debug.req', payload len=32 Aug 5 12:34:35 cli[7956]: [cloud] wsc: receive central debug command count 1 Aug 5 12:34:35 cli[7956]: [cloud] wsc: getting debug MAC=00:00:00:00:00:00 show tech-support result Aug 5 12:34:35 cli[7956]: [cloud] cli_get_debug_result(6186): getting result for url MAC=00:00:00:00:00:00 show tech-support Aug 5 12:34:35 cli[7956]: cli_execute_command_status_no_io: 726: executing '/aruba/bin/cpu -e -m 1>&2' Aug 5 12:34:35 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:34:36 cli[7956]: cli_execute_command_status_no_io: 726: executing '/usr/bin/top -n 1 -d 0 -N 1>&2' Aug 5 12:34:37 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 141 Aug 5 12:34:37 cli[7956]: cli_execute_command_status_no_io: 726: executing 'ip -f inet route show 1>&2' Aug 5 12:34:37 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 125 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 118 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 147 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 120 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 307 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 304 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 305 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 318 Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing 'echo 1>&2' Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing 'echo Internal Captive Portal Domain: 1>&2' Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing 'cat /proc/sys/net/fw/captive_portal_domain 1>&2' Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing 'echo 1>&2' Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing 'echo External Captive Portal Domains: 1>&2' Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing 'cat /proc/sys/net/fw/filtered_domain 1>&2' Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 142 Aug 5 12:34:39 cli[7956]: cli_execute_command_status_no_io: 726: executing '/bin/dmesg 1>&2' Aug 5 12:34:39 sapd[7985]: sapd_papi_rcv_cb: Received AMAPI Packet from 127.0.0.1:24635 to 127.0.0.1:7968 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 100 Aug 5 12:34:39 sapd[7985]: sapd_papi_rcv_cb: Received AMAPI Packet from 127.0.0.1:24635 to 127.0.0.1:7968 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 100 Aug 5 12:34:39 sapd[7985]: sapd_papi_rcv_cb: Received AMAPI Packet from 127.0.0.1:24635 to 127.0.0.1:7968 Aug 5 12:34:39 sapd[7985]: executeCommandObject: Executing AMAPI Command Type: 100 end of show log debug ======================================================== show log system Aug 5 12:25:35 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Clear awc_available flag Aug 5 12:25:37 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_command_execute: 11749: topic='config.delta', payload len=108 Aug 5 12:25:37 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_delta_config Aug 5 12:25:37 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:25:37 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-no rf dot11-6ghz-radio-profile. Aug 5 12:25:37 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-rf-band all. Aug 5 12:25:37 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:25:37 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Do CLI wlan factory Aug 5 12:25:37 cli[7956]: <341072> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| AP could not find post auth role __wired__eth1. Aug 5 12:25:37 cli[7956]: <341072> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| AP could not find post auth role __wired__eth2. Aug 5 12:25:37 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:25:37 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:25:37 cli[7956]: <341254> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC add delta configuration id 17 to msg CLI_EXECUTE_CONFIG_COMMAND. Aug 5 12:25:37 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 17 current 17 top 14 len 62 port 15200 flags 1 seq 0 Aug 5 12:25:37 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| config got from central, set flag to flash. Aug 5 12:25:37 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_config_audit: 10808: size=3714 Aug 5 12:26:16 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_command_execute: 11749: topic='config.delta', payload len=114 Aug 5 12:26:16 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_delta_config Aug 5 12:26:16 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:26:16 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-no rf dot11-6ghz-radio-profile. Aug 5 12:26:16 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-ipm. Aug 5 12:26:16 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-enable. Aug 5 12:26:16 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-exit. Aug 5 12:26:16 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:26:16 cli[7956]: <341254> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC add delta configuration id 18 to msg CLI_EXECUTE_CONFIG_COMMAND. Aug 5 12:26:16 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 18 current 18 top 14 len 66 port 15200 flags 1 seq 0 Aug 5 12:26:16 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| config got from central, set flag to flash. Aug 5 12:26:16 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_config_audit: 10808: size=3726 Aug 5 12:26:20 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| POE mode changes from POE_AT to POE_AF Aug 5 12:26:26 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| POE mode changes from POE_AF to POE_AT Aug 5 12:28:22 cli[7956]: <341271> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| ethernet eth1 link down. Aug 5 12:29:12 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_command_execute: 11749: topic='config.delta', payload len=132 Aug 5 12:29:12 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_delta_config Aug 5 12:29:12 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:29:12 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-no rf dot11-6ghz-radio-profile. Aug 5 12:29:12 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-arm. Aug 5 12:29:12 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-no client-match slb-mode. Aug 5 12:29:12 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-exit. Aug 5 12:29:12 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:29:12 cli[7956]: <341254> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC add delta configuration id 19 to msg CLI_EXECUTE_CONFIG_COMMAND. Aug 5 12:29:12 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 19 current 19 top 14 len 84 port 15200 flags 1 seq 0 Aug 5 12:29:12 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| config got from central, set flag to flash. Aug 5 12:29:12 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_config_audit: 10808: size=3701 Aug 5 12:30:36 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Management server connected success, sync primary to backup Aug 5 12:30:36 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Sending config sync success event to central Aug 5 12:30:36 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 20 current 20 top 14 len 20 port 15200 flags 1 seq 0 Aug 5 12:30:48 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_command_execute: 11749: topic='config.delta', payload len=143 Aug 5 12:30:48 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 21 current 21 top 14 len 15 port 15200 flags 1 seq 0 Aug 5 12:30:48 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_delta_config Aug 5 12:30:48 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:30:48 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-virtual-controller-ip 0.0.0.0. Aug 5 12:30:48 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-name SetMeUp-C1:45:E4. Aug 5 12:30:48 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-virtual-controller-ipv6 ::. Aug 5 12:30:48 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:30:48 cli[7956]: <341254> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC add delta configuration id 22 to msg CLI_EXECUTE_CONFIG_COMMAND. Aug 5 12:30:48 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 22 current 22 top 14 len 97 port 15200 flags 1 seq 0 Aug 5 12:30:48 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| config got from central, set flag to flash. Aug 5 12:30:48 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_config_audit: 10808: size=3701 Aug 5 12:30:49 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Set Auto backup and restore flag on flash Aug 5 12:30:49 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Clear awc_available flag Aug 5 12:30:51 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_command_execute: 11749: topic='config.delta', payload len=96 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:30:51 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-no rf dot11-6ghz-radio-profile. Aug 5 12:30:51 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:30:51 cli[7956]: <341254> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC add delta configuration id 23 to msg CLI_EXECUTE_CONFIG_COMMAND. Aug 5 12:30:51 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 23 current 23 top 14 len 50 port 15200 flags 1 seq 0 Aug 5 12:30:51 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| config got from central, set flag to flash. Aug 5 12:30:51 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_config_audit: 10808: size=3701 Aug 5 12:31:47 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_command_execute: 11749: topic='config.delta', payload len=96 Aug 5 12:31:47 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_delta_config Aug 5 12:31:47 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-configure terminal. Aug 5 12:31:47 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-no rf dot11-6ghz-radio-profile. Aug 5 12:31:47 cli[7956]: <341101> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| Execute command-end. Aug 5 12:31:47 cli[7956]: <341254> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC add delta configuration id 24 to msg CLI_EXECUTE_CONFIG_COMMAND. Aug 5 12:31:47 cli[7956]: <341251> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| VC record new delta configuration entry. cfg_id 24 current 24 top 14 len 50 port 15200 flags 1 seq 0 Aug 5 12:31:47 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| config got from central, set flag to flash. Aug 5 12:31:47 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| wsc_config_audit: 10808: size=3701 Aug 5 12:34:35 cli[7956]: <341004> |AP 94:64:24:c1:45:e4@192.168.2.230 cli| athena_debug_execute: 12056: topic='cmd.debug.req', payload len=32 end of show log system ======================================================== show log ap-debug Aug 5 12:29:54 awc[7953]: [cloud] wsc: lws_write send len 1899 return n= 1899 Aug 5 12:30:11 syslog: main, 3437: opcode is login Aug 5 12:30:11 syslog: User admin IP 10.2.3.36 login by web UI successfully Aug 5 12:30:11 syslog: main, 3437: opcode is show Aug 5 12:30:36 awc[7953]: [cloud] wsc: tm_redis_event_handle:368 Receive message /ipc/event/awc/telemetryd from application telemetryd Aug 5 12:30:36 awc[7953]: [cloud] wsc: receive message from application telemetryd, len 331 Aug 5 12:30:36 awc[7953]: [cloud] wsc: receive a post request from application, topic sub.publish, data len 237, ce_ctx s:eucentral3.internal.decoder.iap.event.sub:iap.event.config.onchange, len 69. Aug 5 12:30:36 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.sub.publish, msg_len=328. Aug 5 12:30:36 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:30:36 awc[7953]: [cloud] wsc: lws_write send len 328 return n= 328 Aug 5 12:30:39 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:30:41 syslog: main, 3437: opcode is show Aug 5 12:30:48 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:30:48 awc[7953]: [cloud] wsc: lws_write send len 29 return n= 29 Aug 5 12:30:48 awc[7953]: [cloud] wsc: receive server message topic iap.config.delta Aug 5 12:30:48 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:30:48 awc[7953]: [cloud] wsc: get application CLI0. Aug 5 12:30:48 awc[7953]: [cloud] wsc: send papi message to application CLI0, srvid 1, type COMMAND_REQUEST(9), raw message len 165. Aug 5 12:30:48 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:30:48 awc[7953]: [cloud] wsc: receive message from application CLI0, len 3951 Aug 5 12:30:48 awc[7953]: [cloud] wsc: receive a post request from application, topic config.response, data len 3924, ce_ctx , len 0. Aug 5 12:30:48 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.config.response, msg_len=3948. Aug 5 12:30:48 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:30:48 awc[7953]: [cloud] wsc: lws_write send len 3948 return n= 3948 Aug 5 12:30:51 awc[7953]: [cloud] wsc: receive server message topic iap.config.delta Aug 5 12:30:51 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:30:51 awc[7953]: [cloud] wsc: get application CLI0. Aug 5 12:30:51 awc[7953]: [cloud] wsc: send papi message to application CLI0, srvid 1, type COMMAND_REQUEST(9), raw message len 117. Aug 5 12:30:51 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:30:51 awc[7953]: [cloud] wsc: receive message from application CLI0, len 3887 Aug 5 12:30:51 awc[7953]: [cloud] wsc: receive a post request from application, topic config.response, data len 3860, ce_ctx , len 0. Aug 5 12:30:51 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.config.response, msg_len=3884. Aug 5 12:30:51 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:30:51 awc[7953]: [cloud] wsc: lws_write send len 3884 return n= 3884 Aug 5 12:30:55 awc[7953]: [cloud] wsc: receive message from application CLI0, len 1902 Aug 5 12:30:55 awc[7953]: [cloud] wsc: receive a post request from application, topic state.sync, data len 1880, ce_ctx , len 0. Aug 5 12:30:55 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.state.sync, msg_len=1899. Aug 5 12:30:55 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:30:55 awc[7953]: [cloud] wsc: lws_write send len 1899 return n= 1899 Aug 5 12:31:11 syslog: main, 3437: opcode is show Aug 5 12:31:47 awc[7953]: [cloud] wsc: receive server message topic iap.config.delta Aug 5 12:31:47 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:31:47 awc[7953]: [cloud] wsc: get application CLI0. Aug 5 12:31:47 awc[7953]: [cloud] wsc: send papi message to application CLI0, srvid 1, type COMMAND_REQUEST(9), raw message len 117. Aug 5 12:31:47 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:31:47 awc[7953]: [cloud] wsc: receive message from application CLI0, len 3887 Aug 5 12:31:47 awc[7953]: [cloud] wsc: receive a post request from application, topic config.response, data len 3860, ce_ctx , len 0. Aug 5 12:31:47 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.config.response, msg_len=3884. Aug 5 12:31:47 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:31:47 awc[7953]: [cloud] wsc: lws_write send len 3884 return n= 3884 Aug 5 12:31:53 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:31:53 awc[7953]: [cloud] wsc: lws_write send len 29 return n= 29 Aug 5 12:31:56 awc[7953]: Receive awc keepalive detection message and send reply. Aug 5 12:31:56 awc[7953]: [cloud] wsc: receive message from application CLI0, len 1902 Aug 5 12:31:56 awc[7953]: [cloud] wsc: receive a post request from application, topic state.sync, data len 1880, ce_ctx , len 0. Aug 5 12:31:56 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.state.sync, msg_len=1899. Aug 5 12:31:56 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:31:56 awc[7953]: [cloud] wsc: lws_write send len 1899 return n= 1899 Aug 5 12:31:56 awc[7953]: [cloud] wsc: receive message from application CLI0, len 2380 Aug 5 12:31:56 awc[7953]: [cloud] wsc: receive a post request from application, topic stat, data len 2364, ce_ctx , len 0. Aug 5 12:31:56 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.stat, msg_len=2377. Aug 5 12:31:56 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:31:56 awc[7953]: [cloud] wsc: lws_write send len 2377 return n= 2377 Aug 5 12:32:01 awc[7953]: [cloud] wsc: receive message from application CLI0, len 41 Aug 5 12:32:01 awc[7953]: [cloud] wsc: receive a post request from application, topic clarity.live, data len 67, ce_ctx , len 0. Aug 5 12:32:01 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.clarity.live, msg_len=87. Aug 5 12:32:01 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:32:01 awc[7953]: [cloud] wsc: lws_write send len 87 return n= 87 Aug 5 12:32:08 awc[7953]: [cloud] wsc: receive message from application CLI0, len 265 Aug 5 12:32:08 awc[7953]: [cloud] wsc: receive a post request from application, topic sub.publish, data len 173, ce_ctx s:eucentral3.internal.decoder.iap.ext:iap.stats.client.ext.periodic, len 67. Aug 5 12:32:08 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.sub.publish, msg_len=262. Aug 5 12:32:08 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:32:08 awc[7953]: [cloud] wsc: lws_write send len 262 return n= 262 Aug 5 12:32:08 awc[7953]: [cloud] wsc: receive message from application CLI0, len 1161 Aug 5 12:32:08 awc[7953]: [cloud] wsc: receive a post request from application, topic sub.publish, data len 1070, ce_ctx s:eucentral3.internal.decoder.iap.ext:iap.stats.radio.ext.periodic, len 66. Aug 5 12:32:08 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.sub.publish, msg_len=1158. Aug 5 12:32:08 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:32:08 awc[7953]: [cloud] wsc: lws_write send len 1158 return n= 1158 Aug 5 12:32:11 syslog: main, 3437: opcode is show Aug 5 12:32:19 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:32:41 syslog: main, 3437: opcode is show Aug 5 12:32:57 awc[7953]: [cloud] wsc: receive message from application CLI0, len 1902 from application, topic state.sync, data len 1880, ce_ctx , len 0. Aug 5 12:32:57 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.state.sync, msg_len=1899. Aug 5 12:32:57 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:32:57 awc[7953]: [cloud] wsc: lws_write send len 1899 return n= 1899 Aug 5 12:32:59 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:32:59 awc[7953]: [cloud] wsc: lws_write send len 29 return n= 29 Aug 5 12:33:11 syslog: main, 3437: opcode is show Aug 5 12:33:58 awc[7953]: [cloud] wsc: receive message from application CLI0, len 1902 Aug 5 12:33:58 awc[7953]: [cloud] wsc: receive a post request from application, topic state.sync, data len 1880, ce_ctx , len 0. Aug 5 12:33:58 awc[7953]: [cloud] wsc: insert queue a message to websocket server, topic iap.state.sync, msg_len=1899. Aug 5 12:33:58 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:33:58 awc[7953]: [cloud] wsc: lws_write send len 1899 return n= 1899 Aug 5 12:33:59 awc[7953]: [cloud] wsc: wsc_service_wd_fd(2166), poll write, sevice fd 15 Aug 5 12:34:04 awc[7953]: [cloud] wsc: lws_write send len 29 return n= 29 Aug 5 12:34:11 syslog: main, 3437: opcode is show Aug 5 12:34:35 awc[7953]: [cloud] wsc: receive server message topic iap.cmd.debug.req Aug 5 12:34:35 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. Aug 5 12:34:35 awc[7953]: [cloud] wsc: get application CLI0. Aug 5 12:34:35 awc[7953]: [cloud] wsc: send papi message to application CLI0, srvid 1, type COMMAND_REQUEST(9), raw message len 54. Aug 5 12:34:35 awc[7953]: [cloud] wsc: get_app_next_by_south_topic: 341 iap. end of show log ap-debug ======================================================== show log security end of show log security ======================================================== show log provision Provisioning Trace Records -------------------------- Time State Type Name Arg1 Arg2 Arg3 Arg4 ---- ----- ---- ---- ---- ---- ---- ---- 7557.000000 7478.910000 Central Debug prov_domain_init 7478.570000 UAP ADP Warning prov_uap_adp_warning Get the provision rule from flash. 7477.100000 UAP ADP Warning prov_uap_adp_warning Reset the provision status for new conductor. 7454.840000 Activate In progress prov_activate_start device.arubanetworks.com 7454.840000 UAP ADP Warning prov_uap_adp_warning Check with activate after configuration sync up. 7454.840000 UAP ADP Warning prov_uap_adp_warning Send one first provision request. 7453.520000 Activate Debug prov_activate_challenge_response_sent device.arubanetworks.com 7452.780000 UAP ADP Warning prov_uap_adp_warning Explicit type of rule is configured for the AP. 7452.780000 UAP ADP Warning prov_uap_adp_warning Original source is unknow and new is cloud 7452.780000 UAP ADP Warning prov_uap_adp_warning Provision rule from activate isn't changed. 7452.780000 UAP ADP Warning prov_uap_adp_warning Retrieve the valid provision rule. 7452.780000 UAP ADP Warning prov_uap_adp_warning Save new provision rule into a file. 7452.780000 UAP ADP Warning prov_uap_adp_warning Save provision rule to flash. 7452.780000 UAP ADP Warning prov_uap_adp_warning Save the Central rule from cloud into flash. 7452.780000 UAP ADP Warning prov_uap_adp_warning device-eucentral3.central.arubanetworks.com 7452.770000 Activate Completed prov_activate_got_central device-eucentral3.central.arubanetworks.com 7452.770000 Central Debug prov_domain_central_program device-eucentral3.central.arubanetworks.com 7415.070000 Activate In progress prov_activate_start device.arubanetworks.com 7415.070000 Central In progress prov_central_connect device-eucentral3.central.arubanetworks.com 7415.070000 UAP ADP Warning prov_uap_adp_warning Send one interval provision request. 7413.380000 Central Debug prov_domain_central_program device-eucentral3.central.arubanetworks.com 7413.380000 Central In progress prov_central_connect_trigger device-eucentral3.central.arubanetworks.com athena redirect 7413.380000 Central In progress prov_central_server_changed device-eucentral3.central.arubanetworks.com 7413.330000 Central Failed prov_central_connect_fail device-eucentral3.central.arubanetworks.com dns error 7413.110000 Activate Debug prov_activate_challenge_response_sent device.arubanetworks.com 7412.410000 UAP ADP Warning prov_uap_adp_warning Central provision rule is not changed. 7412.410000 UAP ADP Warning prov_uap_adp_warning Explicit type of rule is configured for the AP. 7412.410000 UAP ADP Warning prov_uap_adp_warning Provision rule from activate isn't changed. 7412.410000 UAP ADP Warning prov_uap_adp_warning Retrieve the valid provision rule. 7354.160000 Activate In progress prov_activate_start device.arubanetworks.com 7354.150000 UAP ADP Warning prov_uap_adp_warning Send one interval provision request. 7352.990000 Activate Debug prov_activate_challenge_response_sent device.arubanetworks.com 7352.440000 Central In progress prov_central_connect_trigger device-eucentral3.central.arubanetworks.com retry connect 7352.290000 UAP ADP Warning prov_uap_adp_warning Central provision rule is not changed. 7352.290000 UAP ADP Warning prov_uap_adp_warning Explicit type of rule is configured for the AP. 7352.290000 UAP ADP Warning prov_uap_adp_warning Provision rule from activate isn't changed. 7352.290000 UAP ADP Warning prov_uap_adp_warning Retrieve the valid provision rule. 7350.870000 Central In progress prov_central_connect_success device-eucentral3.central.arubanetworks.com 7350.570000 Central Completed prov_central_login_done device-eucentral3.central.arubanetworks.com 7350.440000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.clients.onchange Aruba Central 7350.440000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap:iap.state.clients.onchange Aruba Central 7350.440000 Central Debug prov_subscribe_received Periodic update s:eucentral3.internal.decoder.iap.ext:iap.stats.client.ext.periodic Aruba Central 7350.440000 Central Debug prov_subscribe_received Periodic update s:eucentral3.internal.decoder.iap.ext:iap.stats.radio.ext.periodic Aruba Central 7350.430000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.ap.onchange Aruba Central 7350.430000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.mesh.onchange Aruba Central 7350.430000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.radio.onchange Aruba Central 7350.430000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.vpn.onchange Aruba Central 7350.430000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.wlan.onchange Aruba Central 7350.310000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.pcap.sub:iap.event.pcap.onchange Aruba Central 7350.310000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.btm.onchange Aruba Central 7350.310000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.config.onchange Aruba Central 7350.310000 Central Debug prov_subscribe_received Change event s:eucentral3.internal.decoder.iap.event.sub:iap.event.ids.onchange Aruba Central 7350.310000 Central Debug prov_subscribe_received Periodic update s:eucentral3.ce.native.upstream.airslice:iap.fw.clientappstats.periodic Aruba Central 7350.270000 Central Debug prov_additional_domain_program 7350.270000 Central Debug prov_domain_list_received 7349.380000 Central In progress prov_central_config_audit server audit request 7349.360000 Central Completed prov_central_config_sent 7232.330000 Activate In progress prov_activate_start device.arubanetworks.com 7232.330000 UAP ADP Warning prov_uap_adp_warning Set provision request for mandatory upgrade again. 7231.170000 Activate Debug prov_activate_challenge_response_sent device.arubanetworks.com 7230.500000 UAP ADP Warning prov_uap_adp_warning Central provision rule is not changed. 7230.500000 UAP ADP Warning prov_uap_adp_warning Explicit type of rule is configured for the AP. 7230.500000 UAP ADP Warning prov_uap_adp_warning Provision rule from activate isn't changed. 7230.500000 UAP ADP Warning prov_uap_adp_warning Retrieve the valid provision rule. 7206.010000 Central Debug prov_subscribe_received Periodic update nwce:lsh:7036ee04122911ed9086ce4a2b577d7b:CNMYKYJ09J:1659684872470 Aruba Central 7079.380000 Central In progress prov_central_config_received 7079.190000 Central Completed prov_central_config_applied 7079.190000 Central In progress prov_central_config_audit server config applied 7079.180000 Central Completed prov_central_config_sent 7015.080000 Central In progress prov_central_config_received 7015.040000 Central Completed prov_central_config_applied 7015.040000 Central In progress prov_central_config_audit server config applied 7015.020000 Central Completed prov_central_config_sent 7014.770000 Central In progress prov_central_config_received 7014.730000 Central Completed prov_central_config_applied 7014.730000 Central In progress prov_central_config_audit server config applied 7014.720000 Central Completed prov_central_config_sent 6989.750000 Central In progress prov_central_config_received 6989.710000 Central Completed prov_central_config_applied 6989.710000 Central In progress prov_central_config_audit server config applied 6989.690000 Central Completed prov_central_config_sent 6989.480000 Central In progress prov_central_config_received 6989.440000 Central Completed prov_central_config_applied 6989.440000 Central In progress prov_central_config_audit server config applied 6989.430000 Central Completed prov_central_config_sent 6954.710000 Central In progress prov_central_config_received 6954.670000 Central Completed prov_central_config_applied 6954.670000 Central In progress prov_central_config_audit server config applied 6954.650000 Central Completed prov_central_config_sent 6929.360000 Central In progress prov_central_config_received 6929.320000 Central Completed prov_central_config_applied 6929.320000 Central In progress prov_central_config_audit server config applied 6929.310000 Central Completed prov_central_config_sent 6894.460000 Central In progress prov_central_config_received 6894.420000 Central Completed prov_central_config_applied 6894.420000 Central In progress prov_central_config_audit server config applied 6894.410000 Central Completed prov_central_config_sent 6867.600000 Central In progress prov_central_config_received 6867.560000 Central Completed prov_central_config_applied 6867.560000 Central In progress prov_central_config_audit server config applied 6867.550000 Central Completed prov_central_config_sent 6833.370000 Central In progress prov_central_config_received 6833.330000 Central Completed prov_central_config_applied 6833.330000 Central In progress prov_central_config_audit server config applied 6833.310000 Central Completed prov_central_config_sent 6805.860000 Central In progress prov_central_config_received 6805.820000 Central Completed prov_central_config_applied 6805.820000 Central In progress prov_central_config_audit server config applied 6805.810000 Central Completed prov_central_config_sent 542.830000 Central In progress prov_central_config_received 542.780000 Central Completed prov_central_config_applied 542.780000 Central In progress prov_central_config_audit server config applied 542.770000 Central Completed prov_central_config_sent 541.080000 Central In progress prov_central_config_received 540.770000 Central Completed prov_central_config_applied 540.770000 Central In progress prov_central_config_audit server config applied 540.750000 Central Completed prov_central_config_sent 502.080000 Central In progress prov_central_config_received 501.900000 Central Completed prov_central_config_applied 501.900000 Central In progress prov_central_config_audit server config applied 501.880000 Central Completed prov_central_config_sent 325.820000 Central In progress prov_central_config_received 325.770000 Central Completed prov_central_config_applied 325.770000 Central In progress prov_central_config_audit server config applied 325.750000 Central Completed prov_central_config_sent 229.820000 Central In progress prov_central_config_received 229.770000 Central Completed prov_central_config_applied 229.770000 Central In progress prov_central_config_audit server config applied 229.750000 Central Completed prov_central_config_sent 226.640000 Central In progress prov_central_config_received 226.600000 Central Completed prov_central_config_applied 226.590000 Central In progress prov_central_config_audit server config applied 226.580000 Central Completed prov_central_config_sent 170.940000 Central In progress prov_central_config_received 170.900000 Central Completed prov_central_config_applied 170.900000 Central In progress prov_central_config_audit server config applied 170.880000 Central Completed prov_central_config_sent end of show log provision ======================================================== show log datapath-exceptions end of show log datapath-exceptions ======================================================== show ap debug radio-stats 0 end of show ap debug radio-stats 0 ======================================================== show ap debug radio-stats 1 end of show ap debug radio-stats 1 ======================================================== show ap debug radio-stats 2 end of show ap debug radio-stats 2 ======================================================== show ap debug radio-info 0 Radio Info Script ------------------ Script Output ------------- aruba_dbg_radio_info_0 Start time: Fri Aug 5 12:34:39 UTC 2022 wifi0-drop-list: wifi0-anul-dump: assert_list (both wifi0, wifi1 and wifi2): No VAP found. No VAP found. aruba_dbg_radio_info_0 Finished time: Fri Aug 5 12:34:39 UTC 2022 aruba_dbg_radio_info_0: Read 242 bytes. Truncated:FALSE end of show ap debug radio-info 0 ======================================================== show ap debug radio-info 1 Radio Info Script ------------------ Script Output ------------- aruba_dbg_radio_info_1 Start time: Fri Aug 5 12:34:39 UTC 2022 wifi1-drop-list: wifi1-anul-dump: assert_list (both wifi0, wifi1 and wifi2): No VAP found. No VAP found. aruba_dbg_radio_info_1 Finished time: Fri Aug 5 12:34:39 UTC 2022 aruba_dbg_radio_info_1: Read 242 bytes. Truncated:FALSE end of show ap debug radio-info 1 ======================================================== show ap debug radio-info 2 Radio Info Script ------------------ Script Output ------------- aruba_dbg_radio_info_2 Start time: Fri Aug 5 12:34:39 UTC 2022 wifi2-drop-list: wifi2-anul-dump: assert_list (both wifi0, wifi1 and wifi2): No VAP found. No VAP found. aruba_dbg_radio_info_2 Finished time: Fri Aug 5 12:34:39 UTC 2022 aruba_dbg_radio_info_2: Read 242 bytes. Truncated:FALSE end of show ap debug radio-info 2 ======================================================== show ap antenna-status radio 0 advanced Radio is diabled end of show ap antenna-status radio 0 advanced ======================================================== show ap antenna-status radio 1 advanced Radio is diabled end of show ap antenna-status radio 1 advanced ======================================================== show ap antenna-status radio 2 advanced Radio is diabled end of show ap antenna-status radio 2 advanced ======================================================== show vpn config Concentrator ------------ Type Value ---- ----- VPN Primary Server VPN Backup Server VPN NAT Outside disable VPN Preemption disable VPN Fast Failover disable VPN Hold Time 600 VPN Monitor Pkt Send Freq 5 VPN Monitor Pkt Lost Cnt 6 VPN Reconnect Duration before Normal-Failover 30 Seconds VPN Ikepsk c258d7dfc635fa738858d1ac225b6d14 VPN Username VPN Password 9a2a4ba6ab58cc0bb264398def1c102e NAT outside disable Source VLANs GRE outside vpn disable GRE Per AP Tunnel disable GRE Type 1 GRE Primary Server GRE Backup Server GRE Reconnect User On Failover enable GRE Reconnect Time On Failover 60 Reconnect User On Failover disable Reconnect Time On Failover 60 Routing Table -------------- Destination Netmask Gateway Metric ----------- ------- ------- ------ Number of Route Entries :0 Route Flags: A = Active; D = in Datapath; M = to Conductor end of show vpn config ======================================================== show vpn status profile name:default -------------------------------------------------- current using tunnel :unselected tunnel current tunnel using time :0 ipsec is preempt status :disable ipsec is fast failover status :disable ipsec hold on period :600s ipsec tunnel monitor frequency (seconds/packet) :5 ipsec tunnel monitor timeout by lost packet cnt :6 ipsec reconnect duration (seconds) :30 ipsec primary tunnel crypto type :Cert ipsec primary tunnel peer address :N/A ipsec primary tunnel peer tunnel ip :N/A ipsec primary tunnel ap tunnel ip :N/A ipsec primary tunnel using interface :N/A ipsec primary tunnel using MTU :N/A ipsec primary tunnel current sm status :Init ipsec primary tunnel tunnel status :Down ipsec primary tunnel tunnel retry times :0 ipsec primary tunnel tunnel uptime :0 ipsec backup tunnel crypto type :Cert ipsec backup tunnel peer address :N/A ipsec backup tunnel peer tunnel ip :N/A ipsec backup tunnel ap tunnel ip :N/A ipsec backup tunnel using interface :N/A ipsec backup tunnel using MTU :N/A ipsec backup tunnel current sm status :Init ipsec backup tunnel tunnel status :Down ipsec backup tunnel tunnel retry times :0 ipsec backup tunnel tunnel uptime :0 end of show vpn status ======================================================== show vpn tunnels Tunnel Flags: M = Conductor IAP; S = Member IAP; P = Primary Tunnel B = Backup Tunnel; R = Registered; H = Heartbeat Enable end of show vpn tunnels ======================================================== show upgrade info swarm upgrade status -------------------- Mac IP Address Seed AP AP Class Status Image Info Error Detail --- ---------- ------- -------- ------ ---------- ------------ 94:64:24:c1:45:e4 192.168.2.230 No Norma image-ok From Seed none Auto reboot :enable Use external URL :disable Conductor wait Time :0 secs 0 count Switch Partition :enable Upgrade in process :No UAP convert process :No end of show upgrade info ======================================================== show log upgrade ----------Download log start---------- download log not available ----------Download log end------------ Download status: Malformed URL ----------Upgrade log start---------- upgrade log not available ----------Upgrade log end------------ Upgrade status: upgrade status not available end of show log upgrade ======================================================== show log rapper Rapper info not available end of show log rapper ======================================================== show log rapper-counter Rapper info not available end of show log rapper-counter ======================================================== show log rapper-brief Rapper info not available end of show log rapper-brief ======================================================== show l3-mobility status Roaming Client Table -------------------- Client MAC Home Vlan VAP Vlan Tunnel ID Status Virtual Controller IP Peer IP Old AP IP Device Name ---------- --------- -------- --------- ------ --------------------- ------- --------- ----------- Tunnel Table ------------ Peer IP Local Tunnel ID Remote Tunnel ID Use Count Type ------- --------------- ---------------- --------- ---- Virtual Controller Table ------------------------ Virtual Controller IP Type HAP IP Local Tunnel ID Remote Tunnel ID --------------------- ---- ------ --------------- ---------------- end of show l3-mobility status ======================================================== show l3-mobility datapath L3 Mobility Datapath Home Table ------------------------------- Client Index Client MAC Home Vlan Destinaton Device Index ------------ ---------- --------- ----------------------- L3 Mobility Datapath Foreign Table ---------------------------------- Client Index Client MAC Home Vlan VAP Vlan Destinaton Device Index HAP IP Virtual Controller IP Packets Forwarded ------------ ---------- --------- -------- ----------------------- ------ --------------------- ----------------- L3 Mobility Datapath Tunnel Table --------------------------------- Tunnel Device Remote Protocol Dest IP Clients Idle Time Rx Packets Tx Packets Rx Mcasts Tx Mcasts ARP Proxy Pkts Tx Jumbo MTU Rx HB Tx HB MTU Reqs MTU Resps HB Mismatch IP Mismatch Type Vlan Translations ------------- --------------- ------- ------- --------- ---------- ---------- --------- --------- -------------- -------- --- ----- ----- -------- --------- ----------- ----------- ---- ----------------- end of show l3-mobility datapath ======================================================== show derivation-rules SSID:__wired__eth1 Role Derivation Rules --------------------- Attribute Operation Operand Role Name Index Hits --------- --------- ------- --------- ----- ---- Vlan Derivation Rules --------------------- Attribute Operation Operand Vlan Id Hits --------- --------- ------- ------- ---- SSID:__wired__eth2 Role Derivation Rules --------------------- Attribute Operation Operand Role Name Index Hits --------- --------- ------- --------- ----- ---- Vlan Derivation Rules --------------------- Attribute Operation Operand Vlan Id Hits --------- --------- ------- ------- ---- SSID:HADI_WDU2 Role Derivation Rules --------------------- Attribute Operation Operand Role Name Index Hits --------- --------- ------- --------- ----- ---- Vlan Derivation Rules --------------------- Attribute Operation Operand Vlan Id Hits --------- --------- ------- ------- ---- end of show derivation-rules ======================================================== show clients debug Client List ----------- Name Host Name IP Address MAC Address OS ESSID Access Point Channel Type Role IPv6 Address Signal Speed (mbps) *Reauth Age *Reauth Interval *Reauth ESSID Auth Type *Authenticated DEL Age Vlan *ESSID *Private role info Accouting Session Name BSSID Idle Timeout csum *mcast groups *Acct Interval *Class Attribute *Dhcp-Opt Vlan *Dhcp-Opt role Intercept *Offline *FB Token *FB RxBytes *FB TxBytes *SLAAC IP Address *Link Local IP Address *DHCP Status *DHCP v6 Status ---- --------- ---------- ----------- -- ----- ------------ ------- ---- ---- ------------ ------ ------------ ----------- ---------------- ------------- --------- -------------- --- --- ---- ------ ------------------ ---------------------- ----- ------------ ---- ------------- -------------- ---------------- -------------- -------------- --------- -------- --------- ----------- ----------- ----------------- ---------------------- ------------ --------------- end of show clients debug ======================================================== show clients wired debug Wired Client List ----------------- Name Host Name IP Address MAC Address OS Network Access Point Role IPv6 Address Speed (mbps) *Reauth Age *Reauth Interval Auth Type *Authenticated DEL Age Vlan Acl Accouting Session Name Idle Timeout csum *mcast groups *Acct Interval *Class Attribute *Dhcp-Opt Vlan *Dhcp-Opt role Intercept *SLAAC IP Address *Link Local IP Address ---- --------- ---------- ----------- -- ------- ------------ ---- ------------ ------------ ----------- ---------------- --------- -------------- --- --- ---- --- ---------------------- ------------ ---- ------------- -------------- ---------------- -------------- -------------- --------- ----------------- ---------------------- end of show clients wired debug ======================================================== show uplink status Uplink preemption :enable Uplink preemption interval :600 Uplink enforce :none Uplink wired-1 :DHCP Internet failover :disable Max allowed test packet loss :10 Secs between test packets :30 VPN failover timeout (secs) :180 Internet check timeout (secs) :10 AP1X type:NONE Certification type:NONE Validate server:NONE Uplink Table -------------- Type VLAN State Reach State Prio In Use Interface IP Mask GW Sent Lost Cont lost ---- ---- ----- ----------- ---- ------ --------- -- ---- -- ---- ---- --------- Ethernet 1 UP UP 0 Yes br0 192.168.2.230 255.255.255.0 192.168.2.3 0 0 0 Cellular 0 INIT INIT 7 No ppp0 0.0.0.0 0.0.0.0 0.0.0.0 0 0 0 Wifi-sta 0 INIT INIT 6 No wuplink0 0.0.0.0 0.0.0.0 0.0.0.0 0 0 0 Wired Port Table ------------------ Port State Type Bonding(Admin/Oper/Active) ---- ----- ---- -------------------------- eth0 UP WAN Yes/Yes/Yes eth1 DOWN WAN Yes/Yes/No end of show uplink status ======================================================== show ap mesh link end of show ap mesh link ======================================================== show wired-port-settings Wired Port Profiles ------------------- Name VLAN Mode Allowed VLANs Native VLAN Admin Status Role Speed Duplex POE In Use Authentication Method STP Trusted ---- --------- ------------- ----------- ------------ ---- ----- ------ --- ------ --------------------- --- ------- wired-SetMeUp Access all guest Up wired-SetMeUp auto auto No Yes None No No default_wired_port_profile Trunk all 1 Up default_wired_port_profile auto full No Yes None No No Port Profile Assignments ------------------------ Port Profile Name ---- ------------ 0 default_wired_port_profile 1 wired-SetMeUp 2 wired-SetMeUp 3 wired-SetMeUp 4 wired-SetMeUp USB wired-SetMeUp end of show wired-port-settings ======================================================== show election statistics State : Conductor conductor_beacon : sent=0 rcvd=0 hierarchy_beacon: sent=0 rcvd=0 hierarchy_ack : sent=0 rcvd=0 beacon_req : sent=0 rcvd=0 beacon_resp : sent=0 rcvd=0 election wait : 0(0) timer slow : 0 conductor high cpu : 0 ap cpu usage : 25 delay by cpu usage: 0 Member->Pot-Conductor : 0 time Pot-conductor->Conductor: 0 time Pot-conductor->Member : 0 time last spoof arp rcvd: 0 last spoof mac: 00:00:00:00:00:00 last beacon received ticks: 0 uplink flap count : 0 max beacon miss ticks : 0 hierarchy mode : 0 last hierarchy beacon received ticks: 0 provisioned conductor denied : 0 end of show election statistics ======================================================== show log apifmgr end of show log apifmgr ======================================================== show log vpn-tunnel 2022-08-05 10:29:59 tunnel_profile_init(3148): init tunnel profile . 2022-08-05 10:30:00 cli_rap_routing_uplink_change(9792): uplink changed, the new default gw is 192.168.2.3 2022-08-05 10:30:00 cli_rap_routing_force_update(9733) 2022-08-05 10:30:00 cli_rap_routing_force_update(9733) 2022-08-05 10:30:05 cli_rap_conductor_changed(10166): old-ip 0.0.0.0, new-ip 127.0.0.1, add 0, is_conductor 1, my subnet 192.168.2.230/255.255.255.0 2022-08-05 10:30:05 cli_rap_conductor_changed(10224) Master changed reseting tunnel message seq no 2022-08-05 10:30:22 tunnel_preempt_config(3655): Warning!!! preempt have same configure, return. 2022-08-05 10:30:22 tunnel_failover_type_config(3587): failover type have same configure, return. 2022-08-05 10:30:22 tunnel_holdon_time_config(4204): Warning!!! holdon time is same, no action, and return. 2022-08-05 10:30:22 tunnel_send_pkt_freq_config(4342): Warning!!! monitor frequency configuration is same, no action, and return. 2022-08-05 10:30:22 tunnel_lost_packet_cnt_config(4403): Warning!!! lose packet timeout configuration is same, no action, and return. 2022-08-05 10:30:22 tunnel_psk_config(3842): Warning!!! psk is same, no action, and return. 2022-08-05 10:30:22 tunnel_xauth_config(3914): Warning!!! username/password is same, no action, and return. 2022-08-05 10:30:22 tunnel_reconnect_duration_config(4439): set tunnel max reconnect duration to 30 seconds. 2022-08-05 10:30:22 tunnel_reconnect_duration_config(4463): Warning!!! max reconnect duration is same, no action, and return. 2022-08-05 10:30:22 cli_rap_gre_ep_request(6820) action: add, 192.168.2.230, controller all end of show log vpn-tunnel ======================================================== show log vpn-tunnel-primary 2022-08-05 10:30:22 [primary tunnel] tunnel_unregister_action(2816): ipsec client space already free. end of show log vpn-tunnel-primary ======================================================== show log vpn-tunnel-backup 2022-08-05 10:30:22 [backup tunnel] tunnel_unregister_action(2816): ipsec client space already free. end of show log vpn-tunnel-backup ======================================================== show log vpn-brief end of show log vpn-brief ======================================================== show airgroup debug statistics AirGroup member status :FALSE AirGroup conductor status :FALSE AirGroup multi swarm status :FALSE status value :0x70 My conductor's address :127.0.0.1 My ip address :192.168.2.230 AirGroup Debug Statistics -------------------------- Key Value --- ----- network cache init counter 1(1) mdns apdb init counter 1(1) airgroup restore count 1(1) end of show airgroup debug statistics ======================================================== show airgroup cache entries Cache Entries ------------- Name Type Class TTL Origin Expiry Last Update ---- ---- ----- --- ------ ------ ----------- Num Cache Entries:0 end of show airgroup cache entries ======================================================== show airgroup servers verbose AirGroup Servers ---------------- MAC IP Type Host Name Service VLAN Wired/Wireless Role Group Name AP-Name Rec-dropped Rec-filtered Rec-responded Last-query Query Throttled Resp Throttled CPPM-Req CPPM-Rsp CoA CPPM Dev-Added CPPM Dev-Deleted --- -- ---- --------- ------- ---- -------------- ---- ----- ---- ------- ----------- ------------ ------------- ---------- --------------- -------------- -------- -------- --- -------------- ---------------- Num Servers: 0. end of show airgroup servers verbose ======================================================== show airgroup status AirGroup Information -------------------- Feature Status ------- ------ AirGroup mode Distributed MDNS Disabled DLNA Disabled Enforce Registration Disabled IPV6 Disabled AirGroup Multi Swarm -------------------- Status ------ Disabled AirGroup Guest Multicast ------------------------ Status ------ Disabled CPPM Parameters --------------- Parameter Value --------- ----- CPPM Enforce Registration Disabled CPPM Server query interval 10 Hours CPPM Server dead time 100 Seconds AirGroup Service Information ---------------------------- Service Status ------- ------ airplay Disabled airprint Disabled itunes Disabled remotemgmt Disabled sharing Disabled googlecast Disabled AmazonTV Disabled DIAL Disabled DLNA Media Disabled DLNA Print Disabled allowall Disabled end of show airgroup status ======================================================== show airgroup users verbose AirGroup Users -------------- MAC IP Type Host Name VLAN Wired/Wireless Role Group Name AP-Name Rec-dropped Rec-filtered Rec-responded Last-query Query Throttled Resp Throttled CPPM-Req CPPM-Rsp CoA CPPM Dev-Added CPPM Dev-Deleted --- -- ---- --------- ---- -------------- ---- ----- ---- ------- ----------- ------------ ------------- ---------- --------------- -------------- -------- -------- --- -------------- ---------------- Num Users: 0. end of show airgroup users verbose ======================================================== show airgroupservice AirGroupService Table --------------------- Service status service ID Description ------- ------ ---------- ----------- airplay Disabled _airplay._tcp AirPlay _raop._tcp _appletv-v2._tcp airprint Disabled _ipp._tcp AirPrint _pdl-datastream._tcp _printer._tcp _scanner._tcp _http._tcp _http-alt._tcp _ipp-tls._tcp _fax-ipp._tcp _riousbprint._tcp _ica-networking._tcp _ptp._tcp _canon-bjnp1._tcp _ipps._tcp _ica-networking2._tcp itunes Disabled _home-sharing._tcp iTunes _apple-mobdev._tcp _daap._tcp _dacp._tcp remotemgmt Disabled _ssh._tcp Remote management _sftp-ssh._tcp _ftp._tcp _telnet._tcp _rfb._tcp _net-assistant._tcp sharing Disabled _odisk._tcp Sharing _afpovertcp._tcp _xgrid._tcp googlecast Disabled _googlecast._tcp GoogleCast supported by Chromecast etc AmazonTV Disabled _amzn-wplay._tcp Amazon fire tv AirGroupService Table --------------------- Service status service ID Description ------- ------ ---------- ----------- DIAL Disabled urn:dial-multiscreen-org:service:dial:1 DIAL supported by Chromecast, FireTV, Roku etc urn:dial-multiscreen-org:device:dial:1 DLNA Media Disabled urn:schemas-upnp-org:device:MediaServer:1 Media urn:schemas-upnp-org:device:MediaServer:2 urn:schemas-upnp-org:device:MediaServer:3 urn:schemas-upnp-org:device:MediaServer:4 urn:schemas-upnp-org:device:MediaRenderer:1 urn:schemas-upnp-org:device:MediaRenderer:2 urn:schemas-upnp-org:device:MediaRenderer:3 urn:schemas-upnp-org:device:MediaPlayer:1 DLNA Print Disabled urn:schemas-upnp-org:device:Printer:1 Print urn:schemas-upnp-org:service:PrintBasic:1 urn:schemas-upnp-org:service:PrintEnhanced:1 allowall Disabled Remaining-Services Num Services:11 Num Service-ID:45 end of show airgroupservice ======================================================== show airgroup cppm entries ClearPass Guest Device Registration Information ----------------------------------------------- Device device-owner shared location-id AP-name shared location-id AP-FQLN shared location-id AP-group shared user-list shared group-list shared role-list CPPM-Req CPPM-Resp ------ ------------ -------------------------- -------------------------- --------------------------- ---------------- ----------------- ---------------- -------- --------- end of show airgroup cppm entries ======================================================== show airgroup cppm server CPPM Servers ------------ Server IP-Address Port timeout rfc3576 rfc3576-only rfc3576-port ------ ---------- ---- ------- ------- ------------ ------------ end of show airgroup cppm server ======================================================== show airgroup cppm auth All Auth Servers known to MDNS ------------------------------ Server IP-Address Port timeout rfc3576 rfc3576-only rfc3576-port ------ ---------- ---- ------- ------- ------------ ------------ end of show airgroup cppm auth ======================================================== show auth-survivability debug-log end of show auth-survivability debug-log ======================================================== show auth-survivability cached-info end of show auth-survivability cached-info ======================================================== show auth-survivability time-out Auth Survivability time out :24 end of show auth-survivability time-out ======================================================== show radius status Radius server status -------------------- Name Server IP Source IP Server Name Protocol Port NAS IP Connected sockets Status Last connection tried at Next connection at ---- --------- --------- ----------- -------- ---- ------ ----------------- ------ ------------------------ ------------------ InternalServer 127.0.0.1 192.168.2.230 Not configured RADIUS/UDP 1616 127.0.0.1 Not Applicable Not Applicable Not Applicable Not Applicable : Is radsec configured to use EST cert:No end of show radius status ======================================================== show l2tpv3 config L2TPv3 not supported on this platform end of show l2tpv3 config ======================================================== show l2tpv3 global parameter L2TPv3 not supported on this platform end of show l2tpv3 global parameter ======================================================== show l2tpv3 session status L2TPv3 not supported on this platform end of show l2tpv3 session status ======================================================== show l2tpv3 tunnel status L2TPv3 not supported on this platform end of show l2tpv3 tunnel status ======================================================== show l2tpv3 tunnel config L2TPv3 not supported on this platform end of show l2tpv3 tunnel config ======================================================== show l2tpv3 system statistics L2TPv3 not supported on this platform end of show l2tpv3 system statistics ======================================================== show ap pmkcache PMK Cache Table --------------- Client MAC Key OKC/11r Expiry Role VLAN ESSID ---------- --- ------- ------ ---- ---- ----- PMK Cache Count:0 end of show ap pmkcache ======================================================== show ap checksum Cfg :1394892290 Radius Cert :0 Radius Psk :0 Radius CA :0 Radsec Cert :0 Radsec Psk :0 Radsec CA :0 Web UI cert :0 Web UI key :0 CP cert :2247358150 CP key :0 CP logo :0 Datatunnel Cert :0 Datatunnel Psk :0 Datatunnel CA :0 DHCP Option82 XML :0 Custom AWC CA from Activate :0 Custom AWC CA from Airwave :0 Default ClearPass CA :0 ClearPass CA :0 WebCC CA :0 Resource files :0 Checksum :20823 Audit Checksum :18745 Download role :0 Import cert :0 CA bundle :0 EST CA :0 AP1X Common Cert :0 AP1X Common PSK :0 AP1X Common CA :0 Calc time :2022-08-05 12:31:48 end of show ap checksum ======================================================== show ap cacert Local CA Certificates: Version :2 Serial Number :5EC3B7A6437FA4E0 Issuer :/CN=ACCVRAIZ1/OU=PKIACCV/O=ACCV/C=ES Subject :/CN=ACCVRAIZ1/OU=PKIACCV/O=ACCV/C=ES Issued On :May 5 09:37:37 2011 GMT Expires On :Dec 31 09:37:37 2030 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :618DC7863B018205 Issuer :/CN=ACEDICOM Root/OU=PKI/O=EDICOM/C=ES Subject :/CN=ACEDICOM Root/OU=PKI/O=EDICOM/C=ES Issued On :Apr 18 16:24:22 2008 GMT Expires On :Apr 13 16:24:22 2028 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :570A119742C4E3CC Issuer :/C=IT/L=Milan/O=Actalis S.p.A./03358520967/CN=Actalis Authentication Root CA Subject :/C=IT/L=Milan/O=Actalis S.p.A./03358520967/CN=Actalis Authentication Root CA Issued On :Sep 22 11:22:02 2011 GMT Expires On :Sep 22 11:22:02 2030 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :7777062726A9B17C Issuer :/C=US/O=AffirmTrust/CN=AffirmTrust Commercial Subject :/C=US/O=AffirmTrust/CN=AffirmTrust Commercial Issued On :Jan 29 14:06:06 2010 GMT Expires On :Dec 31 14:06:06 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :7C4F04391CD4992D Issuer :/C=US/O=AffirmTrust/CN=AffirmTrust Networking Subject :/C=US/O=AffirmTrust/CN=AffirmTrust Networking Issued On :Jan 29 14:08:24 2010 GMT Expires On :Dec 31 14:08:24 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :6D8C1446B1A60AEE Issuer :/C=US/O=AffirmTrust/CN=AffirmTrust Premium Subject :/C=US/O=AffirmTrust/CN=AffirmTrust Premium Issued On :Jan 29 14:10:36 2010 GMT Expires On :Dec 31 14:10:36 2040 GMT RSA Key size :4096 bits Signed Using :RSA-SHA384 Version :2 Serial Number :7497258AC73F7A54 Issuer :/C=US/O=AffirmTrust/CN=AffirmTrust Premium ECC Subject :/C=US/O=AffirmTrust/CN=AffirmTrust Premium ECC Issued On :Jan 29 14:20:24 2010 GMT Expires On :Dec 31 14:20:24 2040 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :5C33CB622C5FB332 Issuer :/CN=Atos TrustedRoot 2011/O=Atos/C=DE Subject :/CN=Atos TrustedRoot 2011/O=Atos/C=DE Issued On :Jul 7 14:58:30 2011 GMT Expires On :Dec 31 23:59:59 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :53EC3BEEFBB2485F Issuer :/C=ES/CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Subject :/C=ES/CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Issued On :May 20 08:38:15 2009 GMT Expires On :Dec 31 08:38:15 2030 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :020000B9 Issuer :/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root Subject :/C=IE/O=Baltimore/OU=CyberTrust/CN=Baltimore CyberTrust Root Issued On :May 12 18:46:00 2000 GMT Expires On :May 12 23:59:00 2025 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :02 Issuer :/C=NO/O=Buypass AS-983163327/CN=Buypass Class 2 Root CA Subject :/C=NO/O=Buypass AS-983163327/CN=Buypass Class 2 Root CA Issued On :Oct 26 08:38:03 2010 GMT Expires On :Oct 26 08:38:03 2040 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :02 Issuer :/C=NO/O=Buypass AS-983163327/CN=Buypass Class 3 Root CA Subject :/C=NO/O=Buypass AS-983163327/CN=Buypass Class 3 Root CA Issued On :Oct 26 08:28:58 2010 GMT Expires On :Oct 26 08:28:58 2040 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :C3039AEE50906E28 Issuer :/C=SK/L=Bratislava/O=Disig a.s./CN=CA Disig Root R1 Subject :/C=SK/L=Bratislava/O=Disig a.s./CN=CA Disig Root R1 Issued On :Jul 19 09:06:56 2012 GMT Expires On :Jul 19 09:06:56 2042 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :92B888DBB08AC163 Issuer :/C=SK/L=Bratislava/O=Disig a.s./CN=CA Disig Root R2 Subject :/C=SK/L=Bratislava/O=Disig a.s./CN=CA Disig Root R2 Issued On :Jul 19 09:15:30 2012 GMT Expires On :Jul 19 09:15:30 2042 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :684A5870806BF08F02FAF6DEE8B09090 Issuer :/C=CN/O=WoSign CA Limited/CN=CA WoSign ECC Root Subject :/C=CN/O=WoSign CA Limited/CN=CA WoSign ECC Root Issued On :Nov 8 00:58:58 2014 GMT Expires On :Nov 8 00:58:58 2044 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :184ACCD6 Issuer :/C=CN/O=China Financial Certification Authority/CN=CFCA EV ROOT Subject :/C=CN/O=China Financial Certification Authority/CN=CFCA EV ROOT Issued On :Aug 8 03:07:01 2012 GMT Expires On :Dec 31 03:07:01 2029 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :49330001 Issuer :/C=CN/O=CNNIC/CN=CNNIC ROOT Subject :/C=CN/O=CNNIC/CN=CNNIC ROOT Issued On :Apr 16 07:09:14 2007 GMT Expires On :Apr 16 07:09:14 2027 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :4E812D8A8265E00B02EE3E350246E53D Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO Certification Authority Subject :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO Certification Authority Issued On :Dec 1 00:00:00 2006 GMT Expires On :Dec 31 23:59:59 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :1F47AFAA62007050544C019E9B63992A Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Certification Authority Subject :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Certification Authority Issued On :Mar 6 00:00:00 2008 GMT Expires On :Jan 18 23:59:59 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :4CAAF9CADB636FE01FF74ED85B03869D Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority Subject :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority Issued On :Jan 19 00:00:00 2010 GMT Expires On :Jan 18 23:59:59 2038 GMT RSA Key size :4096 bits Signed Using :RSA-SHA384 Version :2 Serial Number :00 Issuer :/C=EU/O=AC Camerfirma SA CIF A82743287/OU=http://www.chambersign.org/CN=Chambers of Commerce Root Subject :/C=EU/O=AC Camerfirma SA CIF A82743287/OU=http://www.chambersign.org/CN=Chambers of Commerce Root Issued On :Sep 30 16:13:43 2003 GMT Expires On :Sep 30 16:13:44 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :00 Issuer :/C=EU/O=AC Camerfirma SA CIF A82743287/OU=http://www.chambersign.org/CN=Global Chambersign Root Subject :/C=EU/O=AC Camerfirma SA CIF A82743287/OU=http://www.chambersign.org/CN=Global Chambersign Root Issued On :Sep 30 16:14:18 2003 GMT Expires On :Sep 30 16:14:18 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :6B25DA8A889D7CBC0F05B3B17A614544 Issuer :/C=CN/O=WoSign CA Limited/CN=Certification Authority of WoSign G2 Subject :/C=CN/O=WoSign CA Limited/CN=Certification Authority of WoSign G2 Issued On :Nov 8 00:58:58 2014 GMT Expires On :Nov 8 00:58:58 2044 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :FEDCE3010FC948FF Issuer :/C=FR/O=Dhimyotis/CN=Certigna Subject :/C=FR/O=Dhimyotis/CN=Certigna Issued On :Jun 29 15:13:05 2007 GMT Expires On :Jun 29 15:13:05 2027 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=FR/O=Certinomis/OU=0002 433998903/CN=Certinomis - Autorit\xC3\xA9 Racine Subject :/C=FR/O=Certinomis/OU=0002 433998903/CN=Certinomis - Autorit\xC3\xA9 Racine Issued On :Sep 17 08:28:59 2008 GMT Expires On :Sep 17 08:28:59 2028 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=FR/O=Certinomis/OU=0002 433998903/CN=Certinomis - Root CA Subject :/C=FR/O=Certinomis/OU=0002 433998903/CN=Certinomis - Root CA Issued On :Oct 21 09:17:18 2013 GMT Expires On :Oct 21 09:17:18 2033 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :010020 Issuer :/C=PL/O=Unizeto Sp. z o.o./CN=Certum CA Subject :/C=PL/O=Unizeto Sp. z o.o./CN=Certum CA Issued On :Jun 11 10:46:39 2002 GMT Expires On :Jun 11 10:46:39 2027 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0444C0 Issuer :/C=PL/O=Unizeto Technologies S.A./OU=Certum Certification Authority/CN=Certum Trusted Network CA Subject :/C=PL/O=Unizeto Technologies S.A./OU=Certum Certification Authority/CN=Certum Trusted Network CA Issued On :Oct 22 12:07:37 2008 GMT Expires On :Dec 31 12:07:37 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :A3DA427EA4B1AEDA Issuer :/C=EU/L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287/O=AC Camerfirma S.A./CN=Chambers of Commerce Root - 2008 Subject :/C=EU/L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287/O=AC Camerfirma S.A./CN=Chambers of Commerce Root - 2008 Issued On :Aug 1 12:29:50 2008 GMT Expires On :Jul 31 12:29:50 2038 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :489F0001 Issuer :/C=CN/O=China Internet Network Information Center/CN=China Internet Network Information Center EV Certificates Root Subject :/C=CN/O=China Internet Network Information Center/CN=China Internet Network Information Center EV Certificates Root Issued On :Aug 31 07:11:25 2010 GMT Expires On :Aug 31 07:11:25 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services Subject :/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services Issued On :Jan 1 00:00:00 2004 GMT Expires On :Dec 31 23:59:59 2028 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=Secure Certificate Services Subject :/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=Secure Certificate Services Issued On :Jan 1 00:00:00 2004 GMT Expires On :Dec 31 23:59:59 2028 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=Trusted Certificate Services Subject :/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=Trusted Certificate Services Issued On :Jan 1 00:00:00 2004 GMT Expires On :Dec 31 23:59:59 2028 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0400000000010F85AA2D48 Issuer :/O=Cybertrust, Inc/CN=Cybertrust Global Root Subject :/O=Cybertrust, Inc/CN=Cybertrust Global Root Issued On :Dec 15 08:00:00 2006 GMT Expires On :Dec 15 08:00:00 2021 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0983F3 Issuer :/C=DE/O=D-Trust GmbH/CN=D-TRUST Root Class 3 CA 2 2009 Subject :/C=DE/O=D-Trust GmbH/CN=D-TRUST Root Class 3 CA 2 2009 Issued On :Nov 5 08:35:58 2009 GMT Expires On :Nov 5 08:35:58 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0983F4 Issuer :/C=DE/O=D-Trust GmbH/CN=D-TRUST Root Class 3 CA 2 EV 2009 Subject :/C=DE/O=D-Trust GmbH/CN=D-TRUST Root Class 3 CA 2 EV 2009 Issued On :Nov 5 08:50:46 2009 GMT Expires On :Nov 5 08:50:46 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :44AFB080D6A327BA893039862EF8406B Issuer :/O=Digital Signature Trust Co./CN=DST Root CA X3 Subject :/O=Digital Signature Trust Co./CN=DST Root CA X3 Issued On :Sep 30 21:12:19 2000 GMT Expires On :Sep 30 14:01:15 2021 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0CE7E0E517D846FE8FE560FC1BF03039 Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root CA Issued On :Nov 10 00:00:00 2006 GMT Expires On :Nov 10 00:00:00 2031 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0B931C3AD63967EA6723BFC3AF9AF44B Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root G2 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root G2 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0BA15AFA1DDFA0B54944AFCD24A06CEC Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root G3 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Assured ID Root G3 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :083BE056904246B1A1756AC95991C74A Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA Issued On :Nov 10 00:00:00 2006 GMT Expires On :Nov 10 00:00:00 2031 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :033AF1E6A711A9A0BB2864B11D09FAE5 Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G2 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :055556BCF25EA43535C3A40FD5AB4572 Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G3 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root G3 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :02AC5C266A0B409B8F0B79F2AE462577 Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance EV Root CA Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance EV Root CA Issued On :Nov 10 00:00:00 2006 GMT Expires On :Nov 10 00:00:00 2031 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :059B1B579E8E2132E23907BDA777755C Issuer :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Trusted Root G4 Subject :/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Trusted Root G4 Issued On :Aug 1 12:00:00 2013 GMT Expires On :Jan 15 12:00:00 2038 GMT RSA Key size :4096 bits Signed Using :RSA-SHA384 Version :2 Serial Number :6A683E9C519BCB53 Issuer :/C=TR/L=Ankara/O=E-Tu\xC4\x9Fra EBG Bili\xC5\x9Fim Teknolojileri ve Hizmetleri A.\xC5\x9E./OU=E-Tugra Sertifikasyon Merkezi/CN=E-Tugra Certification Authority Subject :/C=TR/L=Ankara/O=E-Tu\xC4\x9Fra EBG Bili\xC5\x9Fim Teknolojileri ve Hizmetleri A.\xC5\x9E./OU=E-Tugra Sertifikasyon Merkezi/CN=E-Tugra Certification Authority Issued On :Mar 5 12:09:48 2013 GMT Expires On :Mar 3 12:09:48 2023 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :-11D4C2142BDE21EB579D53FB0C223BFF Issuer :/C=ES/O=Agencia Catalana de Certificacio (NIF Q-0801176-I)/OU=Serveis Publics de Certificacio/OU=Vegeu https://www.catcert.net/verarrel (c)03/OU=Jerarquia Entitats de Certificacio Catalanes/CN=EC-ACC Subject :/C=ES/O=Agencia Catalana de Certificacio (NIF Q-0801176-I)/OU=Serveis Publics de Certificacio/OU=Vegeu https://www.catcert.net/verarrel (c)03/OU=Jerarquia Entitats de Certificacio Catalanes/CN=EC-ACC Issued On :Jan 7 23:00:00 2003 GMT Expires On :Jan 7 22:59:59 2031 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :5480F9A073ED3F004CCA89D8E371E64A Issuer :/C=EE/O=AS Sertifitseerimiskeskus/CN=EE Certification Centre Root CA/emailAddress=pki@sk.ee Subject :/C=EE/O=AS Sertifitseerimiskeskus/CN=EE Certification Centre Root CA/emailAddress=pki@sk.ee Issued On :Oct 30 10:10:30 2010 GMT Expires On :Dec 17 23:59:59 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :3863DEF8 Issuer :/O=Entrust.net/OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)/OU=(c) 1999 Entrust.net Limited/CN=Entrust.net Certification Authority (2048) Subject :/O=Entrust.net/OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)/OU=(c) 1999 Entrust.net Limited/CN=Entrust.net Certification Authority (2048) Issued On :Dec 24 17:50:51 1999 GMT Expires On :Jul 24 14:15:12 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :456B5054 Issuer :/C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority Subject :/C=US/O=Entrust, Inc./OU=www.entrust.net/CPS is incorporated by reference/OU=(c) 2006 Entrust, Inc./CN=Entrust Root Certification Authority Issued On :Nov 27 20:23:42 2006 GMT Expires On :Nov 27 20:53:42 2026 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :A68B79290000000050D091F9 Issuer :/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - EC1 Subject :/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2012 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - EC1 Issued On :Dec 18 15:25:36 2012 GMT Expires On :Dec 18 15:55:36 2037 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :4A538C28 Issuer :/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2 Subject :/C=US/O=Entrust, Inc./OU=See www.entrust.net/legal-terms/OU=(c) 2009 Entrust, Inc. - for authorized use only/CN=Entrust Root Certification Authority - G2 Issued On :Jul 7 17:25:54 2009 GMT Expires On :Dec 7 17:55:54 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :023456 Issuer :/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA Subject :/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA Issued On :May 21 04:00:00 2002 GMT Expires On :May 21 04:00:00 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :18ACB56AFD69B6153A636CAFDAFAC4A1 Issuer :/C=US/O=GeoTrust Inc./CN=GeoTrust Primary Certification Authority Subject :/C=US/O=GeoTrust Inc./CN=GeoTrust Primary Certification Authority Issued On :Nov 27 00:00:00 2006 GMT Expires On :Jul 16 23:59:59 2036 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :3CB2F4480A00E2FEEB243B5E603EC36B Issuer :/C=US/O=GeoTrust Inc./OU=(c) 2007 GeoTrust Inc. - For authorized use only/CN=GeoTrust Primary Certification Authority - G2 Subject :/C=US/O=GeoTrust Inc./OU=(c) 2007 GeoTrust Inc. - For authorized use only/CN=GeoTrust Primary Certification Authority - G2 Issued On :Nov 5 00:00:00 2007 GMT Expires On :Jan 18 23:59:59 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :15AC6E9419B2794B41F627A9C3180F1F Issuer :/C=US/O=GeoTrust Inc./OU=(c) 2008 GeoTrust Inc. - For authorized use only/CN=GeoTrust Primary Certification Authority - G3 Subject :/C=US/O=GeoTrust Inc./OU=(c) 2008 GeoTrust Inc. - For authorized use only/CN=GeoTrust Primary Certification Authority - G3 Issued On :Apr 2 00:00:00 2008 GMT Expires On :Dec 1 23:59:59 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :01 Issuer :/C=US/O=GeoTrust Inc./CN=GeoTrust Universal CA Subject :/C=US/O=GeoTrust Inc./CN=GeoTrust Universal CA Issued On :Mar 4 05:00:00 2004 GMT Expires On :Mar 4 05:00:00 2029 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=US/O=GeoTrust Inc./CN=GeoTrust Universal CA 2 Subject :/C=US/O=GeoTrust Inc./CN=GeoTrust Universal CA 2 Issued On :Mar 4 05:00:00 2004 GMT Expires On :Mar 4 05:00:00 2029 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :2A38A41C960A04DE42B228A50BE8349802 Issuer :/OU=GlobalSign ECC Root CA - R4/O=GlobalSign/CN=GlobalSign Subject :/OU=GlobalSign ECC Root CA - R4/O=GlobalSign/CN=GlobalSign Issued On :Nov 13 00:00:00 2012 GMT Expires On :Jan 19 03:14:07 2038 GMT Elliptic Curve Key size:256 bits Signed Using :ecdsa-with-SHA256 Version :2 Serial Number :605949E0262EBB55F90A778A71F94AD86C Issuer :/OU=GlobalSign ECC Root CA - R5/O=GlobalSign/CN=GlobalSign Subject :/OU=GlobalSign ECC Root CA - R5/O=GlobalSign/CN=GlobalSign Issued On :Nov 13 00:00:00 2012 GMT Expires On :Jan 19 03:14:07 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :040000000001154B5AC394 Issuer :/C=BE/O=GlobalSign nv-sa/OU=Root CA/CN=GlobalSign Root CA Subject :/C=BE/O=GlobalSign nv-sa/OU=Root CA/CN=GlobalSign Root CA Issued On :Sep 1 12:00:00 1998 GMT Expires On :Jan 28 12:00:00 2028 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0400000000010F8626E60D Issuer :/OU=GlobalSign Root CA - R2/O=GlobalSign/CN=GlobalSign Subject :/OU=GlobalSign Root CA - R2/O=GlobalSign/CN=GlobalSign Issued On :Dec 15 08:00:00 2006 GMT Expires On :Dec 15 08:00:00 2021 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :04000000000121585308A2 Issuer :/OU=GlobalSign Root CA - R3/O=GlobalSign/CN=GlobalSign Subject :/OU=GlobalSign Root CA - R3/O=GlobalSign/CN=GlobalSign Issued On :Mar 18 10:00:00 2009 GMT Expires On :Mar 18 10:00:00 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :C9CDD3E9D57D23CE Issuer :/C=EU/L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287/O=AC Camerfirma S.A./CN=Global Chambersign Root - 2008 Subject :/C=EU/L=Madrid (see current address at www.camerfirma.com/address)/serialNumber=A82743287/O=AC Camerfirma S.A./CN=Global Chambersign Root - 2008 Issued On :Aug 1 12:31:40 2008 GMT Expires On :Jul 31 12:31:40 2038 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :00 Issuer :/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority Subject :/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification Authority Issued On :Jun 29 17:06:20 2004 GMT Expires On :Jun 29 17:06:20 2034 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :00 Issuer :/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./CN=Go Daddy Root Certificate Authority - G2 Subject :/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./CN=Go Daddy Root Certificate Authority - G2 Issued On :Sep 1 00:00:00 2009 GMT Expires On :Dec 31 23:59:59 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :00 Issuer :/C=GR/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2011 Subject :/C=GR/O=Hellenic Academic and Research Institutions Cert. Authority/CN=Hellenic Academic and Research Institutions RootCA 2011 Issued On :Dec 6 13:49:52 2011 GMT Expires On :Dec 1 13:49:52 2031 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :03E8 Issuer :/C=HK/O=Hongkong Post/CN=Hongkong Post Root CA 1 Subject :/C=HK/O=Hongkong Post/CN=Hongkong Post Root CA 1 Issued On :May 15 05:13:14 2003 GMT Expires On :May 15 04:52:29 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :3911451094 Issuer :/C=FR/ST=France/L=Paris/O=PM/SGDN/OU=DCSSI/CN=IGC/A/emailAddress=igca@sgdn.pm.gouv.fr Subject :/C=FR/ST=France/L=Paris/O=PM/SGDN/OU=DCSSI/CN=IGC/A/emailAddress=igca@sgdn.pm.gouv.fr Issued On :Dec 13 14:29:23 2002 GMT Expires On :Oct 17 14:29:22 2020 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0A0142800000014523C844B500000002 Issuer :/C=US/O=IdenTrust/CN=IdenTrust Commercial Root CA 1 Subject :/C=US/O=IdenTrust/CN=IdenTrust Commercial Root CA 1 Issued On :Jan 16 18:12:23 2014 GMT Expires On :Jan 16 18:12:23 2034 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0A0142800000014523CF467C00000002 Issuer :/C=US/O=IdenTrust/CN=IdenTrust Public Sector Root CA 1 Subject :/C=US/O=IdenTrust/CN=IdenTrust Public Sector Root CA 1 Issued On :Jan 16 17:53:32 2014 GMT Expires On :Jan 16 17:53:32 2034 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :B0B75A16485FBFE1CBF58BD719E67D Issuer :/C=ES/O=IZENPE S.A./CN=Izenpe.com Subject :/C=ES/O=IZENPE S.A./CN=Izenpe.com Issued On :Dec 13 13:08:28 2007 GMT Expires On :Dec 13 08:27:25 2037 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :C27E43044E473F19 Issuer :/C=HU/L=Budapest/O=Microsec Ltd./CN=Microsec e-Szigno Root CA 2009/emailAddress=info@e-szigno.hu Subject :/C=HU/L=Budapest/O=Microsec Ltd./CN=Microsec e-Szigno Root CA 2009/emailAddress=info@e-szigno.hu Issued On :Jun 16 11:30:18 2009 GMT Expires On :Dec 30 11:30:18 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :49412CE40010 Issuer :/C=HU/L=Budapest/O=NetLock Kft./OU=Tan\xC3\xBAs\xC3\xADtv\xC3\xA1nykiad\xC3\xB3k (Certification Services)/CN=NetLock Arany (Class Gold) F\xC5\x91tan\xC3\xBAs\xC3\xADtv\xC3\xA1ny Subject :/C=HU/L=Budapest/O=NetLock Kft./OU=Tan\xC3\xBAs\xC3\xADtv\xC3\xA1nykiad\xC3\xB3k (Certification Services)/CN=NetLock Arany (Class Gold) F\xC5\x91tan\xC3\xBAs\xC3\xADtv\xC3\xA1ny Issued On :Dec 11 15:08:21 2008 GMT Expires On :Dec 6 15:08:21 2028 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :57CB336FC25C16E6471617E3903168E0 Issuer :/C=US/O=Network Solutions L.L.C./CN=Network Solutions Certificate Authority Subject :/C=US/O=Network Solutions L.L.C./CN=Network Solutions Certificate Authority Issued On :Dec 1 00:00:00 2006 GMT Expires On :Dec 31 23:59:59 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :413D72C7F46B1F81437DF1D22854DF9A Issuer :/C=CH/O=WISeKey/OU=Copyright (c) 2005/OU=OISTE Foundation Endorsed/CN=OISTE WISeKey Global Root GA CA Subject :/C=CH/O=WISeKey/OU=Copyright (c) 2005/OU=OISTE Foundation Endorsed/CN=OISTE WISeKey Global Root GA CA Issued On :Dec 11 16:03:44 2005 GMT Expires On :Dec 11 16:09:51 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :76B1205274F0858746B3F8231AF6C2C0 Issuer :/C=CH/O=WISeKey/OU=OISTE Foundation Endorsed/CN=OISTE WISeKey Global Root GB CA Subject :/C=CH/O=WISeKey/OU=OISTE Foundation Endorsed/CN=OISTE WISeKey Global Root GB CA Issued On :Dec 1 15:00:32 2014 GMT Expires On :Dec 1 15:10:31 2039 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0B Issuer :/CN=Autoridad de Certificacion Raiz del Estado Venezolano/C=VE/L=Caracas/ST=Distrito Capital/O=Sistema Nacional de Certificacion Electronica/OU=Superintendencia de Servicios de Certificacion Electronica/emailAddress=acraiz@suscerte.gob.ve Subject :/emailAddress=contacto@procert.net.ve/L=Chacao/ST=Miranda/OU=Proveedor de Certificados PROCERT/O=Sistema Nacional de Certificacion Electronica/C=VE/CN=PSCProcert Issued On :Dec 28 16:51:00 2010 GMT Expires On :Dec 25 23:59:59 2020 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :3AB6508B Issuer :/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority Subject :/C=BM/O=QuoVadis Limited/OU=Root Certification Authority/CN=QuoVadis Root Certification Authority Issued On :Mar 19 18:33:33 2001 GMT Expires On :Mar 17 18:33:33 2021 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :78585F2EAD2C194BE3370735341328B596D46593 Issuer :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 1 G3 Subject :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 1 G3 Issued On :Jan 12 17:27:44 2012 GMT Expires On :Jan 12 17:27:44 2042 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0509 Issuer :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 Subject :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 Issued On :Nov 24 18:27:00 2006 GMT Expires On :Nov 24 18:23:33 2031 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :445734245B81899B35F2CEB82B3B5BA726F07528 Issuer :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3 Subject :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 2 G3 Issued On :Jan 12 18:59:32 2012 GMT Expires On :Jan 12 18:59:32 2042 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :05C6 Issuer :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 Subject :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 Issued On :Nov 24 19:11:23 2006 GMT Expires On :Nov 24 19:06:44 2031 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :2EF59B0228A7DB7AFFD5A3A9EEBD03A0CF126A1D Issuer :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3 Subject :/C=BM/O=QuoVadis Limited/CN=QuoVadis Root CA 3 G3 Issued On :Jan 12 20:26:32 2012 GMT Expires On :Jan 12 20:26:32 2042 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0A0101010000027C0000000A00000002 Issuer :/O=RSA Security Inc/OU=RSA Security 2048 V3 Subject :/O=RSA Security Inc/OU=RSA Security 2048 V3 Issued On :Feb 22 20:39:23 2001 GMT Expires On :Feb 22 20:39:23 2026 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :3B45E568 Issuer :/C=ES/O=Generalitat Valenciana/OU=PKIGVA/CN=Root CA Generalitat Valenciana Subject :/C=ES/O=Generalitat Valenciana/OU=PKIGVA/CN=Root CA Generalitat Valenciana Issued On :Jul 6 16:22:47 2001 GMT Expires On :Jul 1 15:22:47 2021 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=JP/O=Japan Certification Services, Inc./CN=SecureSign RootCA11 Subject :/C=JP/O=Japan Certification Services, Inc./CN=SecureSign RootCA11 Issued On :Apr 8 04:56:47 2009 GMT Expires On :Apr 8 04:56:47 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :0CF08E5C0816A5AD427FF0EB271859D0 Issuer :/C=US/O=SecureTrust Corporation/CN=SecureTrust CA Subject :/C=US/O=SecureTrust Corporation/CN=SecureTrust CA Issued On :Nov 7 19:31:18 2006 GMT Expires On :Dec 31 19:40:55 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :075622A4E8D48A894DF413C8F0F8EAA5 Issuer :/C=US/O=SecureTrust Corporation/CN=Secure Global CA Subject :/C=US/O=SecureTrust Corporation/CN=Secure Global CA Issued On :Nov 7 19:42:28 2006 GMT Expires On :Dec 31 19:52:06 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :00 Issuer :/C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication EV RootCA1 Subject :/C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication EV RootCA1 Issued On :Jun 6 02:12:32 2007 GMT Expires On :Jun 6 02:12:32 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :00 Issuer :/C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2 Subject :/C=JP/O=SECOM Trust Systems CO.,LTD./OU=Security Communication RootCA2 Issued On :May 29 05:00:39 2009 GMT Expires On :May 29 05:00:39 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :00 Issuer :/C=JP/O=SECOM Trust.net/OU=Security Communication RootCA1 Subject :/C=JP/O=SECOM Trust.net/OU=Security Communication RootCA1 Issued On :Sep 30 04:20:49 2003 GMT Expires On :Sep 30 04:20:49 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :1D Issuer :/C=FI/O=Sonera/CN=Sonera Class2 CA Subject :/C=FI/O=Sonera/CN=Sonera Class2 CA Issued On :Apr 6 07:29:40 2001 GMT Expires On :Apr 6 07:29:40 2021 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :98968D Issuer :/C=NL/O=Staat der Nederlanden/CN=Staat der Nederlanden EV Root CA Subject :/C=NL/O=Staat der Nederlanden/CN=Staat der Nederlanden EV Root CA Issued On :Dec 8 11:19:29 2010 GMT Expires On :Dec 8 11:10:28 2022 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :98A239 Issuer :/C=NL/O=Staat der Nederlanden/CN=Staat der Nederlanden Root CA - G3 Subject :/C=NL/O=Staat der Nederlanden/CN=Staat der Nederlanden Root CA - G3 Issued On :Nov 14 11:28:42 2013 GMT Expires On :Nov 13 23:00:00 2028 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :00 Issuer :/C=US/O=Starfield Technologies, Inc./OU=Starfield Class 2 Certification Authority Subject :/C=US/O=Starfield Technologies, Inc./OU=Starfield Class 2 Certification Authority Issued On :Jun 29 17:39:16 2004 GMT Expires On :Jun 29 17:39:16 2034 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :00 Issuer :/C=US/ST=Arizona/L=Scottsdale/O=Starfield Technologies, Inc./CN=Starfield Root Certificate Authority - G2 Subject :/C=US/ST=Arizona/L=Scottsdale/O=Starfield Technologies, Inc./CN=Starfield Root Certificate Authority - G2 Issued On :Sep 1 00:00:00 2009 GMT Expires On :Dec 31 23:59:59 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :00 Issuer :/C=US/ST=Arizona/L=Scottsdale/O=Starfield Technologies, Inc./CN=Starfield Services Root Certificate Authority - G2 Subject :/C=US/ST=Arizona/L=Scottsdale/O=Starfield Technologies, Inc./CN=Starfield Services Root Certificate Authority - G2 Issued On :Sep 1 00:00:00 2009 GMT Expires On :Dec 31 23:59:59 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :01 Issuer :/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Certification Authority Subject :/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Certification Authority Issued On :Sep 17 19:46:36 2006 GMT Expires On :Sep 17 19:46:36 2036 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :2D Issuer :/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Certification Authority Subject :/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Certification Authority Issued On :Sep 17 19:46:37 2006 GMT Expires On :Sep 17 19:46:36 2036 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :3B Issuer :/C=IL/O=StartCom Ltd./CN=StartCom Certification Authority G2 Subject :/C=IL/O=StartCom Ltd./CN=StartCom Certification Authority G2 Issued On :Jan 1 01:00:01 2010 GMT Expires On :Dec 31 23:59:01 2039 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :BB401C43F55E4FB0 Issuer :/C=CH/O=SwissSign AG/CN=SwissSign Gold CA - G2 Subject :/C=CH/O=SwissSign AG/CN=SwissSign Gold CA - G2 Issued On :Oct 25 08:30:35 2006 GMT Expires On :Oct 25 08:30:35 2036 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :4F1BD42F54BB2F4B Issuer :/C=CH/O=SwissSign AG/CN=SwissSign Silver CA - G2 Subject :/C=CH/O=SwissSign AG/CN=SwissSign Silver CA - G2 Issued On :Oct 25 08:32:46 2006 GMT Expires On :Oct 25 08:32:46 2036 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :5C0B855C0BE75941DF57CC3F7F9DA836 Issuer :/C=ch/O=Swisscom/OU=Digital Certificate Services/CN=Swisscom Root CA 1 Subject :/C=ch/O=Swisscom/OU=Digital Certificate Services/CN=Swisscom Root CA 1 Issued On :Aug 18 12:06:20 2005 GMT Expires On :Aug 18 22:06:20 2025 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :1E9E28E848F2E5EFC37C4A1E5A1867B6 Issuer :/C=ch/O=Swisscom/OU=Digital Certificate Services/CN=Swisscom Root CA 2 Subject :/C=ch/O=Swisscom/OU=Digital Certificate Services/CN=Swisscom Root CA 2 Issued On :Jun 24 08:38:14 2011 GMT Expires On :Jun 25 07:38:14 2031 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :F2FA64E27463D38DFD101D041F76CA58 Issuer :/C=ch/O=Swisscom/OU=Digital Certificate Services/CN=Swisscom Root EV CA 2 Subject :/C=ch/O=Swisscom/OU=Digital Certificate Services/CN=Swisscom Root EV CA 2 Issued On :Jun 24 09:45:08 2011 GMT Expires On :Jun 25 08:45:08 2031 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :01 Issuer :/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2 Subject :/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 2 Issued On :Oct 1 10:40:14 2008 GMT Expires On :Oct 1 23:59:59 2033 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :01 Issuer :/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 3 Subject :/C=DE/O=T-Systems Enterprise Services GmbH/OU=T-Systems Trust Center/CN=T-TeleSec GlobalRoot Class 3 Issued On :Oct 1 10:29:56 2008 GMT Expires On :Oct 1 23:59:59 2033 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :0CBE Issuer :/C=TW/O=TAIWAN-CA/OU=Root CA/CN=TWCA Global Root CA Subject :/C=TW/O=TAIWAN-CA/OU=Root CA/CN=TWCA Global Root CA Issued On :Jun 27 06:28:33 2012 GMT Expires On :Dec 31 15:59:59 2030 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :01 Issuer :/C=TW/O=TAIWAN-CA/OU=Root CA/CN=TWCA Root Certification Authority Subject :/C=TW/O=TAIWAN-CA/OU=Root CA/CN=TWCA Root Certification Authority Issued On :Aug 28 07:24:33 2008 GMT Expires On :Dec 31 15:59:59 2030 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :1F9D595AD72FC20644A5800869E35EF6 Issuer :/C=TW/O=Government Root Certification Authority Subject :/C=TW/O=Government Root Certification Authority Issued On :Dec 5 13:23:33 2002 GMT Expires On :Dec 5 13:23:33 2032 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :95BE16A0F72E46F17B398272FA8BCD96 Issuer :/O=TeliaSonera/CN=TeliaSonera Root CA v1 Subject :/O=TeliaSonera/CN=TeliaSonera Root CA v1 Issued On :Oct 18 12:00:50 2007 GMT Expires On :Oct 18 12:00:50 2032 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :1B1FADB620F924D3366BF7C7F18CA059 Issuer :/C=GB/O=Trustis Limited/OU=Trustis FPS Root CA Subject :/C=GB/O=Trustis Limited/OU=Trustis FPS Root CA Issued On :Dec 23 12:14:06 2003 GMT Expires On :Jan 21 11:36:54 2024 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :8E17FE242081 Issuer :/C=TR/L=Ankara/O=T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E./CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 H5 Subject :/C=TR/L=Ankara/O=T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E./CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 H5 Issued On :Apr 30 08:07:01 2013 GMT Expires On :Apr 28 08:07:01 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :7DA1F265EC8A Issuer :/C=TR/L=Ankara/O=T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E./CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 H6 Subject :/C=TR/L=Ankara/O=T\xC3\x9CRKTRUST Bilgi \xC4\xB0leti\xC5\x9Fim ve Bili\xC5\x9Fim G\xC3\xBCvenli\xC4\x9Fi Hizmetleri A.\xC5\x9E./CN=T\xC3\x9CRKTRUST Elektronik Sertifika Hizmet Sa\xC4\x9Flay\xC4\xB1c\xC4\xB1s\xC4\xB1 H6 Issued On :Dec 18 09:04:10 2013 GMT Expires On :Dec 16 09:04:10 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :5C8B99C55A94C5D27156DECD8980CC26 Issuer :/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority Subject :/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority Issued On :Feb 1 00:00:00 2010 GMT Expires On :Jan 18 23:59:59 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :01FD6D30FCA3CA51A81BBC640E35032D Issuer :/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority Subject :/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust RSA Certification Authority Issued On :Feb 1 00:00:00 2010 GMT Expires On :Jan 18 23:59:59 2038 GMT RSA Key size :4096 bits Signed Using :RSA-SHA384 Version :2 Serial Number :2F80FE238C0E220F486712289187ACB3 Issuer :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2007 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G4 Subject :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2007 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G4 Issued On :Nov 5 00:00:00 2007 GMT Expires On :Jan 18 23:59:59 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :18DAD19E267DE8BB4A2158CDCC6B3B4A Issuer :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5 Subject :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5 Issued On :Nov 8 00:00:00 2006 GMT Expires On :Jul 16 23:59:59 2036 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :401AC46421B31321030EBBE4121AC51D Issuer :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2008 VeriSign, Inc. - For authorized use only/CN=VeriSign Universal Root Certification Authority Subject :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2008 VeriSign, Inc. - For authorized use only/CN=VeriSign Universal Root Certification Authority Issued On :Apr 2 00:00:00 2008 GMT Expires On :Dec 1 23:59:59 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :0 Serial Number :9B7E0649A33E62B9D5EE90487129EF57 Issuer :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 1999 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G3 Subject :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 1999 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G3 Issued On :Oct 1 00:00:00 1999 GMT Expires On :Jul 16 23:59:59 2036 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :1386354D1D3F06F2C1F96505D5901C62 Issuer :/C=US/O=VISA/OU=Visa International Service Association/CN=Visa eCommerce Root Subject :/C=US/O=VISA/OU=Visa International Service Association/CN=Visa eCommerce Root Issued On :Jun 26 02:18:36 2002 GMT Expires On :Jun 24 00:16:12 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=US/O=Wells Fargo WellsSecure/OU=Wells Fargo Bank NA/CN=WellsSecure Public Root Certificate Authority Subject :/C=US/O=Wells Fargo WellsSecure/OU=Wells Fargo Bank NA/CN=WellsSecure Public Root Certificate Authority Issued On :Dec 13 17:07:54 2007 GMT Expires On :Dec 14 00:07:54 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :5E68D61171946350560068F33EC9C591 Issuer :/C=CN/O=WoSign CA Limited/CN=Certification Authority of WoSign Subject :/C=CN/O=WoSign CA Limited/CN=Certification Authority of WoSign Issued On :Aug 8 01:00:01 2009 GMT Expires On :Aug 8 01:00:01 2039 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :50706BCDD813FC1B4E3B3372D211488D Issuer :/C=CN/O=WoSign CA Limited/CN=CA \xE6\xB2\x83\xE9\x80\x9A\xE6\xA0\xB9\xE8\xAF\x81\xE4\xB9\xA6 Subject :/C=CN/O=WoSign CA Limited/CN=CA \xE6\xB2\x83\xE9\x80\x9A\xE6\xA0\xB9\xE8\xAF\x81\xE4\xB9\xA6 Issued On :Aug 8 01:00:01 2009 GMT Expires On :Aug 8 01:00:01 2039 GMT RSA Key size :4096 bits Signed Using :RSA-SHA256 Version :2 Serial Number :50946CEC18EAD59C4DD597EF758FA0AD Issuer :/C=US/OU=www.xrampsecurity.com/O=XRamp Security Services Inc/CN=XRamp Global Certification Authority Subject :/C=US/OU=www.xrampsecurity.com/O=XRamp Security Services Inc/CN=XRamp Global Certification Authority Issued On :Nov 1 17:14:04 2004 GMT Expires On :Jan 1 05:37:19 2035 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :200605167002 Issuer :/C=RO/O=certSIGN/OU=certSIGN ROOT CA Subject :/C=RO/O=certSIGN/OU=certSIGN ROOT CA Issued On :Jul 4 17:20:04 2006 GMT Expires On :Jul 4 17:20:04 2031 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :15C8BD65475CAFB897005EE406D2BC9D Issuer :/C=TW/O=Chunghwa Telecom Co., Ltd./OU=ePKI Root Certification Authority Subject :/C=TW/O=Chunghwa Telecom Co., Ltd./OU=ePKI Root Certification Authority Issued On :Dec 20 02:31:27 2004 GMT Expires On :Dec 20 02:31:27 2034 GMT RSA Key size :4096 bits Signed Using :RSA-SHA1 Version :2 Serial Number :344ED55720D5EDEC49F42FCE37DB2B6D Issuer :/C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA Subject :/C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2006 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA Issued On :Nov 17 00:00:00 2006 GMT Expires On :Jul 16 23:59:59 2036 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :35FC265CD9844FC93D263D579BAED756 Issuer :/C=US/O=thawte, Inc./OU=(c) 2007 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA - G2 Subject :/C=US/O=thawte, Inc./OU=(c) 2007 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA - G2 Issued On :Nov 5 00:00:00 2007 GMT Expires On :Jan 18 23:59:59 2038 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 Version :2 Serial Number :600197B746A7EAB4B49AD64B2FF790FB Issuer :/C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2008 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA - G3 Subject :/C=US/O=thawte, Inc./OU=Certification Services Division/OU=(c) 2008 thawte, Inc. - For authorized use only/CN=thawte Primary Root CA - G3 Issued On :Apr 2 00:00:00 2008 GMT Expires On :Dec 1 23:59:59 2037 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :01 Issuer :/C=US/O=Equifax Secure Inc./CN=Equifax Secure Global eBusiness CA-1 Subject :/C=US/O=Equifax Secure Inc./CN=Equifax Secure Global eBusiness CA-1 Issued On :Jun 21 04:00:00 1999 GMT Expires On :Jun 21 04:00:00 2020 GMT RSA Key size :1024 bits Signed Using :RSA-MD5 Version :2 Serial Number :04 Issuer :/C=US/O=Equifax Secure Inc./CN=Equifax Secure eBusiness CA-1 Subject :/C=US/O=Equifax Secure Inc./CN=Equifax Secure eBusiness CA-1 Issued On :Jun 21 04:00:00 1999 GMT Expires On :Jun 21 04:00:00 2020 GMT RSA Key size :1024 bits Signed Using :RSA-MD5 Version :2 Serial Number :01 Issuer :/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com Subject :/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com Issued On :Aug 1 00:00:00 1996 GMT Expires On :Dec 31 23:59:59 2020 GMT RSA Key size :1024 bits Signed Using :RSA-MD5 Version :2 Serial Number :36122296C5E338A520A1D25F4CD70954 Issuer :/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com Subject :/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Premium Server CA/emailAddress=premium-server@thawte.com Issued On :Aug 1 00:00:00 1996 GMT Expires On :Jan 1 23:59:59 2021 GMT RSA Key size :1024 bits Signed Using :RSA-SHA1 Version :2 Serial Number :01 Issuer :/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Server CA/emailAddress=server-certs@thawte.com Subject :/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Server CA/emailAddress=server-certs@thawte.com Issued On :Aug 1 00:00:00 1996 GMT Expires On :Dec 31 23:59:59 2020 GMT RSA Key size :1024 bits Signed Using :RSA-MD5 Version :0 Serial Number :70BAE41D10D92934B638CA7B03CCBABF Issuer :/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority Subject :/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority Issued On :Jan 29 00:00:00 1996 GMT Expires On :Aug 1 23:59:59 2028 GMT RSA Key size :1024 bits Signed Using :RSA-MD2 Version :0 Serial Number :3C9131CB1FF6D01B0E9AB8D044BF12BE Issuer :/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority Subject :/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority Issued On :Jan 29 00:00:00 1996 GMT Expires On :Aug 2 23:59:59 2028 GMT RSA Key size :1024 bits Signed Using :RSA-SHA1 Version :0 Serial Number :7DD9FE07CFA81EB7107967FBA78934C6 Issuer :/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/OU=VeriSign Trust Network Subject :/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/OU=VeriSign Trust Network Issued On :May 18 00:00:00 1998 GMT Expires On :Aug 1 23:59:59 2028 GMT RSA Key size :1024 bits Signed Using :RSA-SHA1 Version :0 Serial Number :ECA0A78B6E756A01CFC47CCC2F945ED7 Issuer :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 1999 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 4 Public Primary Certification Authority - G3 Subject :/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 1999 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 4 Public Primary Certification Authority - G3 Issued On :Oct 1 00:00:00 1999 GMT Expires On :Jul 16 23:59:59 2036 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :023A63 Issuer :/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA Subject :/C=US/O=GeoTrust Inc./CN=GeoTrust SSL CA - G2 Issued On :Aug 27 20:40:40 2012 GMT Expires On :May 20 20:40:40 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA1 Version :2 Serial Number :4182127D12D9C6B321394312566400B8 Issuer :/C=US/O=GeoTrust Inc./OU=(c) 2008 GeoTrust Inc. - For authorized use only/CN=GeoTrust Primary Certification Authority - G3 Subject :/C=US/O=GeoTrust Inc./CN=GeoTrust SHA256 SSL CA Issued On :May 23 00:00:00 2013 GMT Expires On :May 22 23:59:59 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :71ED6ECD1BF142CDB55856B7DC2EA5BD Issuer :/CN=HP Devices CA 01/O=Hewlett-Packard Development Company/ST=CA/C=US Subject :/CN=HP Devices CA 01/O=Hewlett-Packard Development Company/ST=CA/C=US Issued On :Jan 25 01:30:27 2011 GMT Expires On :Jan 19 03:14:07 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Version :2 Serial Number :066C9FCF99BF8C0A39E2F0788A43E696365BCA Issuer :/C=US/O=Amazon/CN=Amazon Root CA 1 Subject :/C=US/O=Amazon/CN=Amazon Root CA 1 Issued On :May 26 00:00:00 2015 GMT Expires On :Jan 17 00:00:00 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Error in reading certificate file: :no start line Version :2 Serial Number :066C9FD5749736663F3B0B9AD9E89E7603F24A Issuer :/C=US/O=Amazon/CN=Amazon Root CA 3 Subject :/C=US/O=Amazon/CN=Amazon Root CA 3 Issued On :May 26 00:00:00 2015 GMT Expires On :May 26 00:00:00 2040 GMT Elliptic Curve Key size:256 bits Signed Using :ecdsa-with-SHA256 Version :2 Serial Number :066C9FD7C1BB104C2943E5717B7B2CC81AC10E Issuer :/C=US/O=Amazon/CN=Amazon Root CA 4 Subject :/C=US/O=Amazon/CN=Amazon Root CA 4 Issued On :May 26 00:00:00 2015 GMT Expires On :May 26 00:00:00 2040 GMT Elliptic Curve Key size:384 bits Signed Using :ecdsa-with-SHA384 end of show ap cacert ======================================================== show interface counters eth0 is up, line protocol is up Hardware is 2.5 Gigabit Ethernet, address is 94:64:24:c1:45:e4 Speed 1000Mb/s, duplex full Received packets 14594 Received bytes 1610632 Receive dropped 2 Receive errors 0 Receive missed errors 0 Receive overrun errors 0 Receive frame errors 0 Receive CRC errors 0 Receive length errors 0 Transmitted packets 8588 Transmitted bytes 5225810 Transmitted dropped 0 Transmission errors 0 Lost carrier 0 eth1 is up, line protocol is down Hardware is 2.5 Gigabit Ethernet, address is 94:64:24:c1:45:e4 Speed 10Mb/s, duplex half Received packets 1472 Received bytes 107676 Receive dropped 5 Receive errors 0 Receive missed errors 0 Receive overrun errors 0 Receive frame errors 0 Receive CRC errors 0 Receive length errors 0 Transmitted packets 49 Transmitted bytes 9229 Transmitted dropped 0 Transmission errors 0 Lost carrier 0 end of show interface counters ======================================================== show ip interface brief Interface IP Address / IP Netmask Admin Protocol br0 192.168.2.230 / 255.255.255.0 up up br0.3333 172.31.98.1 / 255.255.254.0 up up end of show ip interface brief ======================================================== show network Networks -------- Profile Name ESSID Clients Type Band Authentication Method Key Management IP Assignment Status Zone Coding Active Max IPv4 Users ------------ ----- ------- ---- ---- --------------------- -------------- ------------- ------ ---- ------ ------ -------------- HADI_WDU2 HADI_WDU2 0 employee all None WPA3_SAE VLAN HADI_WDU Enabled HADIZONE1 UTF-8 Yes N/A end of show network ======================================================== show out-of-service Out of service trigger Status ----------------------------- uplink-down primary-uplink-down internet-down vpn-down l2tp-down ----------- ------------------- ------------- -------- --------- No No - Yes No The following out-of-service events got triggered in last out-of-service-hold-on-time(30) sec : None end of show out-of-service ======================================================== show lhm policy Periodic Policy Table --------------------- No Periodic Policy Added On-demand Policy ---------------- No Active on-demand Policy end of show lhm policy ======================================================== show lhm status Periodic Policy Statistics -------------------------- Last Policy Table Flush Time (central connection re-established) :00:00:00 Pending Periodic Policy Status ------------------------------ Available Tokens :950 Executing :No Queued Periodic Policies Queue-0 :Empty Queue-1 :Empty Queue-2 :Empty Queue-3 :Empty On-demand policy :No on-demand Policy in progress end of show lhm status ======================================================== show clock Current Time :2022-08-05 12:34:40 end of show clock ======================================================== show ssh SSH Ciphers Settings: Ciphers :aes128-ctr,aes192-ctr,aes256-ctr,aes128-cbc,aes192-cbc,aes256-cbc end of show ssh ======================================================== show wifi-uplink config ESSID : Cipher Suite : Passphrase : Band : end of show wifi-uplink config ======================================================== show wifi-uplink status configured :NO end of show wifi-uplink status ======================================================== show wifi-uplink stats end of show wifi-uplink stats ======================================================== show wifi-uplink mat-table end of show wifi-uplink mat-table ======================================================== show ap debug ble-database BLE APB Information ------------------- AP Name AP Group BLE MAC Radio Type BLE Cur. Bank BLE Opp. Bank AP Eth MAC AP IP Reported at ConfigID Status ------- -------- ------- ---------- ------------- ------------- ---------- ----- ----------- -------- ------ 94:64:24:c1:45:e4 28:de:65:59:48:32 Internal DFU APP 1.4-90 DFU BL 0.0-0 94:64:24:c1:45:e4 127.0.0.1 2022-08-05 12:33:41 0 Current Total AP BLE devices reported:1 Note:'Status' column indicates whether information received for an AP's : BLE radio is 'Current' (message received in the last 10 minutes) : or 'OutOfDate' (message received more than last 10 minutes ago and/or AP might be down). end of show ap debug ble-database ======================================================== show ap debug ble-relay iot-profile ConfigID : 0 No IoT profile found end of show ap debug ble-relay iot-profile ======================================================== show ap debug ble-relay report data is not ready yet. end of show ap debug ble-relay report ======================================================== show cert-from-server activate Received Time :2022-08-05 10:34:06 Version :2 Serial Number :01382580BEDB056FD6293A78B92535319AF5 Issuer :/CN=Aruba Activate CA 301/OU=Aruba/O=Hewlett Packard Enterprise/ST=CA/C=US Subject :/CN=device.arubanetworks.com/OU=Aruba/O=Hewlett Packard Enterprise/ST=CA/C=US Issued On :Sep 7 00:00:00 2021 GMT Expires On :Sep 7 23:59:59 2022 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Extensions : X509v3 Authority Key Identifier: keyid:E8:63:08:95:63:16:4E:03:94:0A:7B:42:55:0F:FA:D1:97:D2:56:54 X509v3 Subject Key Identifier: 11:41:E1:12:71:C0:3D:34:81:69:B7:A2:6B:6E:4D:80:85:58:5D:43 X509v3 Key Usage: critical Digital Signature, Key Agreement X509v3 Basic Constraints: critical CA:FALSE X509v3 Subject Alternative Name: DNS:device.arubanetworks.com X509v3 Extended Key Usage: TLS Web Server Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.14823.4.3.1 Version :2 Serial Number :0178D2F06E5AFBE7B0753363181319682487 Issuer :/CN=Aruba Cloud CA 201/OU=Aruba/O=Hewlett Packard Enterprise/ST=CA/C=US Subject :/CN=Aruba Activate CA 301/OU=Aruba/O=Hewlett Packard Enterprise/ST=CA/C=US Issued On :Feb 4 00:00:00 2021 GMT Expires On :Jun 30 23:59:59 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Extensions : X509v3 Authority Key Identifier: keyid:86:BB:A1:42:E7:16:B9:1B:2F:6D:DF:91:96:97:C9:CB:84:92:23:C8 X509v3 Subject Key Identifier: E8:63:08:95:63:16:4E:03:94:0A:7B:42:55:0F:FA:D1:97:D2:56:54 X509v3 Key Usage: critical Certificate Sign, CRL Sign X509v3 Basic Constraints: critical CA:TRUE, pathlen:0 X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.14823.4.1.3 Version :2 Serial Number :01005C17838CDA75C4C7AE82C385847615DE Issuer :/CN=HP Devices CA 01/O=Hewlett-Packard Development Company/ST=CA/C=US Subject :/CN=Aruba Cloud CA 201/OU=Aruba/O=Hewlett Packard Enterprise/ST=CA/C=US Issued On :Feb 4 00:00:00 2021 GMT Expires On :Jun 30 23:59:59 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Extensions : X509v3 Authority Key Identifier: keyid:BC:49:E1:7A:44:62:02:CA:B2:B4:8E:91:E1:C7:DA:43:34:CE:75:2A X509v3 Subject Key Identifier: 86:BB:A1:42:E7:16:B9:1B:2F:6D:DF:91:96:97:C9:CB:84:92:23:C8 X509v3 Key Usage: critical Certificate Sign, CRL Sign X509v3 Basic Constraints: critical CA:TRUE, pathlen:1 X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.14823.4.1.3 Version :2 Serial Number :71ED6ECD1BF142CDB55856B7DC2EA5BD Issuer :/CN=HP Devices CA 01/O=Hewlett-Packard Development Company/ST=CA/C=US Subject :/CN=HP Devices CA 01/O=Hewlett-Packard Development Company/ST=CA/C=US Issued On :Jan 25 01:30:27 2011 GMT Expires On :Jan 19 03:14:07 2038 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Extensions : X509v3 Basic Constraints: critical CA:TRUE X509v3 Subject Key Identifier: BC:49:E1:7A:44:62:02:CA:B2:B4:8E:91:E1:C7:DA:43:34:CE:75:2A X509v3 Authority Key Identifier: DirName:/CN=HP Devices CA 01/O=Hewlett-Packard Development Company/ST=CA/C=US serial:71:ED:6E:CD:1B:F1:42:CD:B5:58:56:B7:DC:2E:A5:BD X509v3 Key Usage: critical Certificate Sign, CRL Sign X509v3 CRL Distribution Points: Full Name: URI:http://crl.hp.com/device/hpdev01.crl end of show cert-from-server activate ======================================================== show cert-from-server cloud Received Time :2022-08-05 10:31:03 Version :2 Serial Number :08494EBEA166A07F8A3D66C4F7F912F1 Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA Subject :/CN=*.central.arubanetworks.com Issued On :Feb 1 00:00:00 2022 GMT Expires On :Feb 1 23:59:59 2023 GMT RSA Key size :2048 bits Signed Using :RSA-SHA256 Extensions : X509v3 Authority Key Identifier: keyid:90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7 X509v3 Subject Key Identifier: AF:01:8B:58:EE:65:84:5B:7C:D0:40:C4:78:B3:3B:7A:CF:AD:1D:80 X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.7 CPS: https://sectigo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:*.central.arubanetworks.com, DNS:central.arubanetworks.com CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1(0) Log ID : AD:F7:BE:FA:7C:FF:10:C8:8B:9D:3D:9C:1E:3E:18:6A: B4:67:29:5D:CF:B1:0C:24:CA:85:86:34:EB:DC:82:8A Timestamp : Feb 1 22:32:10.107 2022 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:B7:68:57:8C:6F:EE:0B:C1:37:8D:A6: 7F:93:35:EF:1A:3E:58:55:56:F0:9B:E2:91:1C:5B:30: F0:E2:91:63:B8:02:20:1D:AF:FF:F0:67:54:B6:B8:BF: 29:6A:F9:50:BA:A6:0D:9C:B9:77:C1:CF:80:24:FD:A9: D3:0A:59:56:79:5A:3E Signed Certificate Timestamp: Version : v1(0) Log ID : 7A:32:8C:54:D8:B7:2D:B6:20:EA:38:E0:52:1E:E9:84: 16:70:32:13:85:4D:3B:D2:2B:C1:3A:57:A3:52:EB:52 Timestamp : Feb 1 22:32:10.096 2022 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:04:31:C9:88:4A:BE:5D:1A:F0:C9:4D:F6: 6F:02:FC:E2:19:75:F0:F7:BA:43:9A:53:89:40:35:72: 7B:6E:22:DE:02:21:00:EA:57:BE:2F:90:38:DA:0A:64: 26:4E:C5:3C:E9:3A:37:75:F8:AB:C5:36:E2:FE:05:03: 9F:DF:7C:19:1B:D4:2B Signed Certificate Timestamp: Version : v1(0) Log ID : E8:3E:D0:DA:3E:F5:06:35:32:E7:57:28:BC:89:6B:C9: 03:D3:CB:D1:11:6B:EC:EB:69:E1:77:7D:6D:06:BD:6E Timestamp : Feb 1 22:32:10.076 2022 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:2E:96:01:14:F4:23:71:78:1F:B6:AD:83: 74:79:76:6A:93:64:89:CA:E7:D2:40:6A:5B:7F:A6:79: 9B:57:40:49:02:20:09:2C:65:A7:27:9E:23:99:98:52: 63:00:C9:56:65:7B:CB:91:BB:1E:7E:09:BC:43:FF:1D: 1C:20:AB:1D:DA:A0 Version :2 Serial Number :2B2E6EEAD975366C148A6EDBA37C8C07 Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority Subject :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA Issued On :Feb 12 00:00:00 2014 GMT Expires On :Feb 11 23:59:59 2029 GMT RSA Key size :2048 bits Signed Using :RSA-SHA384 Extensions : X509v3 Authority Key Identifier: keyid:BB:AF:7E:02:3D:FA:A6:F1:3C:84:8E:AD:EE:38:98:EC:D9:32:32:D4 X509v3 Subject Key Identifier: 90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7 X509v3 Key Usage: critical Digital Signature, Certificate Sign, CRL Sign X509v3 Basic Constraints: critical CA:TRUE, pathlen:0 X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: X509v3 Any Policy Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/COMODORSACertificationAuthority.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/COMODORSAAddTrustCA.crt OCSP - URI:http://ocsp.comodoca.com Version :2 Serial Number :4CAAF9CADB636FE01FF74ED85B03869D Issuer :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority Subject :/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority Issued On :Jan 19 00:00:00 2010 GMT Expires On :Jan 18 23:59:59 2038 GMT RSA Key size :4096 bits Signed Using :RSA-SHA384 Extensions : X509v3 Subject Key Identifier: BB:AF:7E:02:3D:FA:A6:F1:3C:84:8E:AD:EE:38:98:EC:D9:32:32:D4 X509v3 Key Usage: critical Certificate Sign, CRL Sign X509v3 Basic Constraints: critical CA:TRUE end of show cert-from-server cloud ======================================================== show cert-from-server airwave Current manage mode is athena, please use the command "show cert-from-server cloud". end of show cert-from-server airwave ======================================================== show ddns DDNS Enabled :Disabled DDNS PTR Enabled :Disabled DDNS Server :N/A DDNS Key :N/A DDNS Interval :43200 secs Public DDNS Enabled :Disabled Public DDNS Profile :N/A end of show ddns ======================================================== show ddns clients DDNS Client List for A records ------------------------------ Host Name Domain Name IP Address DHCP profile name DDNS profile name Success Count Failure Count Last updated Last update status --------- ----------- ---------- ----------------- ----------------- ------------- ------------- ------------ ------------------ DDNS Client List for PTR records -------------------------------- Host Name Domain Name IP Address DHCP profile name Success Count Failure Count Last updated Last update status --------- ----------- ---------- ----------------- ------------- ------------- ------------ ------------------ end of show ddns clients ======================================================== show log ddns-client end of show log ddns-client ======================================================== show ap debug cloud-config-received timestamp: 2022-08-05 12:25:37 no rf dot11-6ghz-radio-profile: OK rf-band all: OK timestamp: 2022-08-05 12:26:16 no rf dot11-6ghz-radio-profile: OK ipm: OK enable: OK exit: OK timestamp: 2022-08-05 12:29:12 no rf dot11-6ghz-radio-profile: OK arm: OK no client-match slb-mode: OK exit: OK timestamp: 2022-08-05 12:30:48 virtual-controller-ip 0.0.0.0: OK name SetMeUp-C1:45:E4: OK virtual-controller-ipv6 ::: OK timestamp: 2022-08-05 12:30:51 no rf dot11-6ghz-radio-profile: OK timestamp: 2022-08-05 12:31:47 no rf dot11-6ghz-radio-profile: OK end of show ap debug cloud-config-received ======================================================== show ap debug ctb-status Ctb Server :device-eucentral3.central.arubanetworks.com Proxy Config :No Cert Verify :Enable Last Collect status ---------------------- Last Request ID :None Collect Status :None Failed Reason :None Last Collect Time :None Last Upload status --------------------- Last Request ID :None Upload Status :None Failed Reason :None Retry Count :None Max Retry Count :None Last Connect Time :None end of show ap debug ctb-status ======================================================== === Troubleshooting session completed ===