My iPHONE mac = 3c:d0:f8:0f:87:59 Debug > Logs Logs Search Time Log Apr 3 18:16:08 sapd[1598]: <127000> |AP 9c:1c:12:c1:41:0a@10.99.0.24 sapd| |ids-ap| AP(9c:1c:12:94:10:a0): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:f4:c0 and SSID SMRII_(214) on CHANNEL 10) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:16:14 sapd[1598]: <404074> |AP 9c:1c:12:c1:40:d2@10.99.0.28 sapd| AM 9c:1c:12:94:0d:20: ARM - increasing power cov-index 5/0 tx-power 3 new_rra 1/4 Apr 3 18:16:23 sapd[1598]: <404074> |AP 9c:1c:12:c1:41:0a@10.99.0.24 sapd| AM 9c:1c:12:94:10:a0: ARM - increasing power cov-index 5/0 tx-power 5 new_rra 11/6 Apr 3 18:16:24 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:8a@10.99.0.26 sapd| AM 9c:1c:12:94:18:b0: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 60E/6 Apr 3 18:16:25 sapd[1598]: <127037> |AP 9c:1c:12:c1:3c:02@10.99.0.12 sapd| |ids-ap| AP(9c:1c:12:93:c0:20): Station Associated to Rogue AP: An AP detected a client a8:88:08:b0:8f:84 associated to a rogue access point (BSSID 00:17:3f:1a:54:44 and SSID Belkin_G_Plus_MIMO on CHANNEL 11). Apr 3 18:16:35 wms[1587]: <126005> |wms| |ids| Interfering AP: The system classified an access point (BSSID 50:cc:f8:a5:2b:3b and SSID AndroidAP on CHANNEL 11) as interfering. Additional Info: Detector-AP-Name:9c:1c:12:c1:41:32; Detector-AP-MAC:9c:1c:12:94:13:20; Detector-AP-Radio:2. Apr 3 18:16:37 sapd[1598]: <127000> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| |ids-ap| AP(9c:1c:12:93:ff:e0): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:f4:c0 and SSID SMRII_(214) on CHANNEL 10) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:16:47 sapd[1604]: <127000> |AP 9c:1c:12:c1:41:b4@10.99.0.13 sapd| |ids-ap| AP(9c:1c:12:94:1b:40): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:fe:00 and SSID on CHANNEL 2) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:16:53 sapd[1598]: <127037> |AP 9c:1c:12:c1:40:d4@10.99.0.31 sapd| |ids-ap| AP(9c:1c:12:94:0d:40): Station Associated to Rogue AP: An AP detected a client a8:88:08:ce:6f:f1 associated to a rogue access point (BSSID 40:01:c6:d1:35:00 and SSID SMRII_(218) on CHANNEL 1). Apr 3 18:17:02 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:17:15 sapd[1598]: <127000> |AP 9c:1c:12:c1:3f:56@10.99.0.35 sapd| |ids-ap| AP(9c:1c:12:93:f5:60): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:e8:40 and SSID on CHANNEL 3) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:17:16 authmgr[1647]: <132207> |authmgr| RADIUS reject for station SMRstudenttest1 00:21:5d:89:b3:86 from server SMR2NPSSRV1. Apr 3 18:17:16 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00 doing 802.1x Apr 3 18:17:17 sapd[1598]: <127037> |AP 9c:1c:12:c1:40:aa@10.99.0.30 sapd| |ids-ap| AP(9c:1c:12:94:0a:a0): Station Associated to Rogue AP: An AP detected a client a8:88:08:a7:53:8d associated to a rogue access point (BSSID 00:26:66:86:ad:6c and SSID ICT(1-14) on CHANNEL 10). Apr 3 18:17:17 sapd[1598]: <127037> |AP 9c:1c:12:c1:40:74@10.99.0.37 sapd| |ids-ap| AP(9c:1c:12:94:07:40): Station Associated to Rogue AP: An AP detected a client a8:88:08:a7:53:8d associated to a rogue access point (BSSID 00:26:66:86:ad:6c and SSID ICT(1-14) on CHANNEL 10). Apr 3 18:17:29 sapd[1598]: <127000> |AP 9c:1c:12:c1:3c:e4@10.99.0.22 sapd| |ids-ap| AP(9c:1c:12:93:ce:40): Rogue AP: An AP classified an access point(BSSID f8:1a:67:a9:47:a2 and SSID BROTHER A4 PRINTER STAFF C on CHANNEL 11) as rogue because it matched the MAC (f8:1a:67:a9:47:a2) with IP (0.0.0.0). Apr 3 18:17:31 sapd[1598]: <127000> |AP 9c:1c:12:c1:40:74@10.99.0.37 sapd| |ids-ap| AP(9c:1c:12:94:07:40): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:f8:80 and SSID on CHANNEL 5) as rogue because it matched the MAC (40:01:c6:d0:f8:80) with IP (0.0.0.0). Apr 3 18:17:31 authmgr[1647]: <132207> |authmgr| RADIUS reject for station smrstudenttest1 f4:f9:51:73:25:22 from server SMR2NPSSRV1. Apr 3 18:17:31 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station f4:f9:51:73:25:22 9c:1c:12:94:1c:10 doing 802.1x Apr 3 18:17:37 authmgr[1647]: <132207> |authmgr| RADIUS reject for station smtstudenttest1 3c:d0:f8:0f:87:59 from server SMR2NPSSRV1. Apr 3 18:17:37 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station 3c:d0:f8:0f:87:59 9c:1c:12:94:1c:00 doing 802.1x Apr 3 18:17:51 sapd[1598]: <127000> |AP 9c:1c:12:c1:41:32@10.99.0.29 sapd| |ids-ap| AP(9c:1c:12:94:13:20): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:ee:40 and SSID on CHANNEL 5) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:17:52 authmgr[1647]: <132207> |authmgr| RADIUS reject for station SMRstudenttest1 00:21:5d:89:b3:86 from server SMR2NPSSRV1. Apr 3 18:17:52 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station 00:21:5d:89:b3:86 9c:1c:12:94:1c:10 doing 802.1x Apr 3 18:18:09 sapd[1598]: <404069> |AP 9c:1c:12:c1:41:0a@10.99.0.24 sapd| AM 9c:1c:12:94:10:a0: ARM Channel Interference Trigger new 1-24 old 11-132 new_rra 1/6 TCI 10 Apr 3 18:18:09 sapd[1598]: <404074> |AP 9c:1c:12:c1:40:aa@10.99.0.30 sapd| AM 9c:1c:12:94:0a:a0: ARM - increasing power cov-index 3/0 tx-power 3 new_rra 11/4 Apr 3 18:18:12 sapd[1604]: <404069> |AP 9c:1c:12:c1:41:b4@10.99.0.13 sapd| AM 9c:1c:12:94:1b:40: ARM Channel Interference Trigger new 6-728 old 1-1172 new_rra 6/3 TCI 127 Apr 3 18:18:28 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:56@10.99.0.25 sapd| |ids-ap| AP(9c:1c:12:94:15:60): Station Associated to Rogue AP: An AP detected a client 9c:2a:70:19:78:3e associated to a rogue access point (BSSID 90:61:0c:0c:38:1b and SSID PSS on CHANNEL 11). Apr 3 18:18:35 sapd[1598]: <404097> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| AM 9c:1c:12:94:0c:90: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 161E/6 Apr 3 18:18:35 sapd[1598]: <404097> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| AM 9c:1c:12:93:ff:f0: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 44E/6 Apr 3 18:18:35 sapd[1598]: <404097> |AP 9c:1c:12:c1:3f:56@10.99.0.35 sapd| AM 9c:1c:12:93:f5:70: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 149E/6 Apr 3 18:18:35 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:56@10.99.0.25 sapd| AM 9c:1c:12:94:15:70: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 40E/6 Apr 3 18:18:35 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| AM 9c:1c:12:94:19:f0: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 157E/6 Apr 3 18:18:36 sapd[1598]: <404097> |AP 9c:1c:12:c1:40:74@10.99.0.37 sapd| AM 9c:1c:12:94:07:50: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 40E/6 Apr 3 18:18:36 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:0a@10.99.0.24 sapd| AM 9c:1c:12:94:10:b0: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 48E/6 Apr 3 18:18:36 sapd[1598]: <404097> |AP 9c:1c:12:c1:3c:a2@10.99.0.38 sapd| AM 9c:1c:12:93:ca:30: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 60E/6 Apr 3 18:18:43 sapd[1598]: <404075> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| AM 9c:1c:12:93:ff:e0: ARM - decreasing power cov-index 55/0 tx-power 5 new_rra 6/3 Apr 3 18:18:43 sapd[1598]: <404074> |AP 9c:1c:12:c1:41:56@10.99.0.25 sapd| AM 9c:1c:12:94:15:60: ARM - increasing power cov-index 5/0 tx-power 5 new_rra 1/6 Apr 3 18:18:43 sapd[1598]: <404075> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| AM 9c:1c:12:94:19:e0: ARM - decreasing power cov-index 157/0 tx-power 5 new_rra 1/3 Apr 3 18:18:44 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:32@10.99.0.29 sapd| AM 9c:1c:12:94:13:30: ARM - HT increasing power cov-index 5/0 tx-power 5 new_rra 56E/6 Apr 3 18:19:06 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:19:16 authmgr[1647]: <132030> |authmgr| Dropping EAPOL packet sent by Station f4:f9:51:73:25:22 9c:1c:12:94:1c:10 Apr 3 18:19:32 authmgr[1647]: <132207> |authmgr| RADIUS reject for station m05@2012 a0:82:1f:3e:e2:6c from server SMR2NPSSRV1. Apr 3 18:19:32 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station a0:82:1f:3e:e2:6c 9c:1c:12:94:0a:c0 doing 802.1x Apr 3 18:19:42 authmgr[1647]: <132207> |authmgr| RADIUS reject for station smrstudenttest1 00:21:5d:89:b3:86 from server SMR2NPSSRV1. Apr 3 18:19:42 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00 doing 802.1x Apr 3 18:19:43 sapd[1598]: <127000> |AP 9c:1c:12:c1:41:8a@10.99.0.26 sapd| |ids-ap| AP(9c:1c:12:94:18:a0): Rogue AP: An AP classified an access point(BSSID 00:26:66:86:ad:6c and SSID ICT(1-14) on CHANNEL 10) as rogue because it matched the MAC (00:26:66:86:ad:6c) with IP (0.0.0.0). Apr 3 18:19:52 sapd[1598]: <127000> |AP 9c:1c:12:c1:3c:a2@10.99.0.38 sapd| |ids-ap| AP(9c:1c:12:93:ca:20): Rogue AP: An AP classified an access point(BSSID f8:1a:67:a9:47:a2 and SSID BROTHER A4 PRINTER STAFF C on CHANNEL 11) as rogue because it matched the MAC (f8:1a:67:a9:47:a2) with IP (0.0.0.0). Apr 3 18:20:12 sapd[1604]: <127000> |AP 9c:1c:12:c1:40:88@10.99.0.16 sapd| |ids-ap| AP(9c:1c:12:94:08:80): Rogue AP: An AP classified an access point(BSSID 00:17:3f:1a:54:44 and SSID Belkin_G_Plus_MIMO on CHANNEL 11) as rogue because it matched the MAC (00:17:3f:1a:54:44) with IP (0.0.0.0). Apr 3 18:20:17 authmgr[1647]: <132030> |authmgr| Dropping EAPOL packet sent by Station f4:f9:51:73:25:22 9c:1c:12:94:1c:10 Apr 3 18:20:28 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:30@10.99.0.32 sapd| |ids-ap| AP(9c:1c:12:94:13:00): Station Associated to Rogue AP: An AP detected a client 9c:2a:70:19:78:3e associated to a rogue access point (BSSID 90:61:0c:0c:38:1b and SSID PSS on CHANNEL 11). Apr 3 18:20:29 sapd[1598]: <404074> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| AM 9c:1c:12:94:0c:80: ARM - increasing power cov-index 5/0 tx-power 5 new_rra 1/6 Apr 3 18:20:29 sapd[1598]: <404070> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| AM 9c:1c:12:93:ff:e0: ARM Empty Channel Trigger new 11-0/0 old 6-555/0 new_rra 11/3 Apr 3 18:20:30 sapd[1598]: <404069> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| AM 9c:1c:12:94:19:e0: ARM Channel Interference Trigger new 11-114 old 1-1092 new_rra 11/3 TCI 40 Apr 3 18:20:30 sapd[1598]: <404069> |AP 9c:1c:12:c1:40:aa@10.99.0.30 sapd| AM 9c:1c:12:94:0a:a0: ARM Channel Interference Trigger new 1-100 old 11-319 new_rra 1/4 TCI 10 Apr 3 18:20:30 sapd[1598]: <127000> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| |ids-ap| AP(9c:1c:12:94:19:e0): Rogue AP: An AP classified an access point(BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11) as rogue because it matched the MAC (00:26:66:86:99:e0) with IP (0.0.0.0). Apr 3 18:20:32 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| |ids-ap| AP(9c:1c:12:94:19:e0): Station Associated to Rogue AP: An AP detected a client 64:20:0c:51:5c:eb associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:20:34 sapd[1598]: <127037> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| |ids-ap| AP(9c:1c:12:93:ff:e0): Station Associated to Rogue AP: An AP detected a client 64:20:0c:5a:9e:23 associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:20:34 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| |ids-ap| AP(9c:1c:12:94:19:e0): Station Associated to Rogue AP: An AP detected a client 64:20:0c:5a:9e:23 associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:20:42 sapd[1598]: <127000> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| |ids-ap| AP(9c:1c:12:94:0c:80): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:f4:40 and SSID on CHANNEL 2) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:20:50 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:8a@10.99.0.26 sapd| AM 9c:1c:12:94:18:b0: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 60E/7 Apr 3 18:20:56 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:20:58 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| |ids-ap| AP(9c:1c:12:94:19:e0): Station Associated to Rogue AP: An AP detected a client 9c:2a:70:19:78:3e associated to a rogue access point (BSSID 90:61:0c:0c:38:1b and SSID PSS on CHANNEL 11). Apr 3 18:21:02 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| |ids-ap| AP(9c:1c:12:94:19:e0): Station Associated to Rogue AP: An AP detected a client 64:20:0c:5b:3a:da associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:21:02 sapd[1598]: <127037> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| |ids-ap| AP(9c:1c:12:93:ff:e0): Station Associated to Rogue AP: An AP detected a client 64:20:0c:5b:3a:da associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:21:18 authmgr[1647]: <132030> |authmgr| Dropping EAPOL packet sent by Station f4:f9:51:73:25:22 9c:1c:12:94:1c:10 Apr 3 18:21:20 sapd[1598]: <127037> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| |ids-ap| AP(9c:1c:12:93:ff:e0): Station Associated to Rogue AP: An AP detected a client 64:20:0c:51:5c:eb associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:21:58 sapd[1598]: <127000> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| |ids-ap| AP(9c:1c:12:94:19:e0): Rogue AP: An AP classified an access point(BSSID 00:17:3f:1a:54:44 and SSID Belkin_G_Plus_MIMO on CHANNEL 11) as rogue because it matched the MAC (00:17:3f:1a:54:44) with IP (0.0.0.0). Apr 3 18:21:59 sapd[1598]: <404074> |AP 9c:1c:12:c1:41:ea@10.99.0.21 sapd| AM 9c:1c:12:94:1e:a0: ARM - increasing power cov-index 6/0 tx-power 6 new_rra 1/7 Apr 3 18:22:06 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:22:15 sapd[1598]: <404069> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| AM 9c:1c:12:94:0c:80: ARM Channel Interference Trigger new 11-5 old 1-262 new_rra 11/6 TCI 10 Apr 3 18:22:23 sapd[1598]: <127000> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| |ids-ap| AP(9c:1c:12:94:0c:80): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:ee:40 and SSID SMRII_(210) on CHANNEL 4) as rogue because it matched the MAC (40:01:c6:a5:4b:81) with IP (10.99.0.100). Apr 3 18:22:46 sapd[1598]: <127000> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| |ids-ap| AP(9c:1c:12:94:0c:80): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:f8:80 and SSID SMRII_(217) on CHANNEL 9) as rogue because it matched the MAC (40:01:c6:d0:f8:80) with IP (0.0.0.0). Apr 3 18:22:56 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:56@10.99.0.25 sapd| AM 9c:1c:12:94:15:70: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 40E/7 Apr 3 18:22:57 wms[1587]: <126005> |wms| |ids| Interfering AP: The system classified an access point (BSSID 40:f3:08:60:cd:60 and SSID AndroidAP on CHANNEL 11) as interfering. Additional Info: Detector-AP-Name:9c:1c:12:c1:41:32; Detector-AP-MAC:9c:1c:12:94:13:20; Detector-AP-Radio:2. Apr 3 18:23:06 sapd[1598]: <404097> |AP 9c:1c:12:c1:3f:fe@10.99.0.36 sapd| AM 9c:1c:12:93:ff:f0: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 44E/7 Apr 3 18:23:09 sapd[1598]: <127000> |AP 9c:1c:12:c1:41:76@10.99.0.27 sapd| |ids-ap| AP(9c:1c:12:94:17:60): Rogue AP: An AP classified an access point(BSSID 00:1a:70:f9:7c:61 and SSID ICT Lab 1 on CHANNEL 11) as rogue because it matched the MAC (00:1a:70:f9:7c:61) with IP (0.0.0.0). Apr 3 18:23:17 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:23:34 sapd[1604]: <404069> |AP 9c:1c:12:c1:40:84@10.99.0.15 sapd| AM 9c:1c:12:94:08:40: ARM Channel Interference Trigger new 11-621 old 1-1039 new_rra 11/3 TCI 83 Apr 3 18:23:59 wms[1587]: <126005> |wms| |ids| Interfering AP: The system classified an access point (BSSID 90:72:40:22:5a:84 and SSID 9933 on CHANNEL 1) as interfering. Additional Info: Detector-AP-Name:9c:1c:12:c1:3f:56; Detector-AP-MAC:9c:1c:12:93:f5:60; Detector-AP-Radio:2. Apr 3 18:24:00 sapd[1598]: <404097> |AP 9c:1c:12:c1:40:c8@10.99.0.33 sapd| AM 9c:1c:12:94:0c:90: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 161E/7 Apr 3 18:24:14 sapd[1598]: <127000> |AP 9c:1c:12:c1:3f:56@10.99.0.35 sapd| |ids-ap| AP(9c:1c:12:93:f5:60): Rogue AP: An AP classified an access point(BSSID 40:01:c6:d0:f8:80 and SSID SMRII_(217) on CHANNEL 9) as rogue because it matched the MAC (40:01:c6:d0:f8:80) with IP (0.0.0.0). Apr 3 18:24:20 authmgr[1647]: <132207> |authmgr| RADIUS reject for station smtteachertest1 3c:d0:f8:0f:87:59 from server SMR2NPSSRV1. Apr 3 18:24:20 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station 3c:d0:f8:0f:87:59 9c:1c:12:94:1c:00 doing 802.1x Apr 3 18:24:27 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:24:35 authmgr[1647]: <132030> |authmgr| Dropping EAPOL packet sent by Station f4:f9:51:73:25:22 9c:1c:12:94:1c:10 Apr 3 18:24:54 sapd[1598]: <404097> |AP 9c:1c:12:c1:40:74@10.99.0.37 sapd| AM 9c:1c:12:94:07:50: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 40E/7 Apr 3 18:25:08 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:9e@10.99.0.23 sapd| AM 9c:1c:12:94:19:f0: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 157E/7 Apr 3 18:25:19 sapd[1598]: <404097> |AP 9c:1c:12:c1:3f:56@10.99.0.35 sapd| AM 9c:1c:12:93:f5:70: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 149E/7 Apr 3 18:25:23 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:0a@10.99.0.24 sapd| AM 9c:1c:12:94:10:b0: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 48E/7 Apr 3 18:25:34 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:56@10.99.0.25 sapd| |ids-ap| AP(9c:1c:12:94:15:60): Station Associated to Rogue AP: An AP detected a client 64:20:0c:5b:3a:da associated to a rogue access point (BSSID 00:26:66:86:99:e0 and SSID ICT(15-30) on CHANNEL 11). Apr 3 18:25:36 sapd[1598]: <404097> |AP 9c:1c:12:c1:3c:a2@10.99.0.38 sapd| AM 9c:1c:12:93:ca:30: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 60E/7 Apr 3 18:25:42 authmgr[1647]: <132197> |authmgr| Maximum number of retries was attempted for station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00, deauthenticating the station Apr 3 18:25:44 webui[1509]: USER: admin has logged in from 10.99.3.0. Apr 3 18:25:58 sapd[1598]: <127037> |AP 9c:1c:12:c1:41:32@10.99.0.29 sapd| |ids-ap| AP(9c:1c:12:94:13:20): Station Associated to Rogue AP: An AP detected a client 9c:2a:70:19:78:3e associated to a rogue access point (BSSID 90:61:0c:0c:38:1b and SSID PSS on CHANNEL 11). Apr 3 18:26:31 sapd[1598]: <127037> |AP 9c:1c:12:c1:40:74@10.99.0.37 sapd| |ids-ap| AP(9c:1c:12:94:07:40): Station Associated to Rogue AP: An AP detected a client 84:29:99:44:b9:65 associated to a rogue access point (BSSID 00:26:66:86:ad:6c and SSID ICT(1-14) on CHANNEL 10). Apr 3 18:26:43 sapd[1598]: <404097> |AP 9c:1c:12:c1:41:32@10.99.0.29 sapd| AM 9c:1c:12:94:13:30: ARM - HT increasing power cov-index 6/0 tx-power 6 new_rra 56E/7 Apr 3 18:26:49 authmgr[1647]: <132030> |authmgr| Dropping EAPOL packet sent by Station f4:f9:51:73:25:22 9c:1c:12:94:1c:10 Apr 3 18:26:51 authmgr[1647]: <132207> |authmgr| RADIUS reject for station SMRstudenttest1 00:21:5d:89:b3:86 from server SMR2NPSSRV1. Apr 3 18:26:51 authmgr[1647]: <132053> |authmgr| Dropping the radius packet for Station 00:21:5d:89:b3:86 9c:1c:12:94:1c:00 doing 802.1x Apr 3 18:27:01 sapd[1598]: <127037> |AP 9c:1c:12:c1:3f:56@10.99.0.35 sapd| |ids-ap| AP(9c:1c:12:93:f5:60): Station Associated to Rogue AP: An AP detected a client 84:29:99:44:b9:65 associated to a rogue access point (BSSID 00:26:66:86:ad:6c and SSID ICT(1-14) on CHANNEL 10). Apr 3 18:27:02 sapd[1598]: <404074> |AP 9c:1c:12:c1:40:d4@10.99.0.31 sapd| AM 9c:1c:12:94:0d:40: ARM - increasing power cov-index 5/0 tx-power 5 new_rra 1/6