Description of Common Logs on ACs
Common logs on ACs are shown as follows:
Jan 13 2014 18:23:26+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261864]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-47-96-40;APNAME:ap-234;USER:c814793824f2;MAC:c8-14-79-38-24-f2;TIME:1389623006;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:66543;RESULT:FailType is AC code, refused by repeat association;
13 2014 18:23:48+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261871]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-47-7d-00;APNAME:ap-435;USER:40f308424e6b;MAC:40-f3-08-42-4e-6b;TIME:1389623028;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:66544;RESULT:FailType is AC code, refused by reassociation mac check fail;
Jan 13 2014 18:25:26+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261885]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-47-7d-00;APNAME:ap-435;USER:40f3088d26e4;MAC:40-f3-08-8d-26-e4;TIME:1389623126;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:66547;RESULT:FailType is AC code, refused by roam check fail(state);
Jan 13 2014 18:26:29+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261891]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-47-8b-00;APNAME:ap-632;USER:e4b0216ca90b;MAC:e4-b0-21-6c-a9-0b;TIME:1389623189;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:66545;RESULT:FailType is AC code,refused by roam check fail(SSID);
Jan 13 2014 18:26:29+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261891]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-47-8b-00;APNAME:ap-632;USER:e4b0216ca90b;MAC:e4-b0-21-6c-a9-0b;TIME:1389623189;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:66545;RESULT:FailType is AC code, refused by roam check fail(others);
2014-11-8 16:36:58+01:00 AC-H-03 %%01WLAN/3/WLAN_LOG_USER(l)[1]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:04-f9-38-8b-37-04;ACNAME:AC-H-03;APMAC:04-f9-38-98-39-a0;APNAME:3105-APA12;USER:1c7b214e48c4;MAC:1c-7b-21-4e-48-c4;TIME:1415461018;ZONE:UTC+0100;DAYLIGHT:false;ERRCODE:66551;RESULT:NotifyType is AC code, intermittent disconnections occurred;
Jan 29 2014 20:29:16+08:00 brnewf01acAC6005_1 %%01WLAN/3/WLAN_LOG_USER(l)[193867]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:d8-49-0b-8b-fd-53;ACNAME:brnewf01acAC6005_1;APMAC:f8-4a-bf-54-eb-e0;APNAME:ap-3;USER:641c675c424a;MAC:64-1c-67-5c-42-4a;TIME:1390998556;ZONE:UTC+0800;DAYLIGHT:false;ERRCODE:131090;RESULT:FailType is Status code,rate not match
Jan 13 2014 18:38:13+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261973]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-42-a7-20;APNAME:ap-662;USER:78ca04401c5a;MAC:78-ca-04-40-1c-5a;TIME:1389623893;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:65545;RESULT:FailType is Reason code,other reason;
Jan 13 2014 18:38:13+04:00 TB4_GF_ACU1_M %%01WLAN/3/WLAN_LOG_USER(l)[261973]:[WLAN_STA_INFO_AP_ASSOCIATE]ACMAC:dc-d2-fc-f4-5d-7d;ACNAME:TB4_GF_ACU1_M;APMAC:ac-4e-91-42-a7-20;APNAME:ap-662;USER:78ca04401c5a;MAC:78-ca-04-40-1c-5a;TIME:1389623893;ZONE:UTC+0400;DAYLIGHT:false;ERRCODE:65548;RESULT:FailType is Reason code,other reason;
2014-2-26 07:11:55+00:00 lgh31dcthw01 %%01UCM/5/USER_ACCESSRESULT(l)[60696]:[WLAN_STA_INFO_AUTHENTICATION]ACMAC:e0-24-7f-95-92-16;ACNAME:lgh31dcthw01;APMAC:20-0b-c7-9a-7f-c0;APNAME:B1-1F-D03;USER:z00100222;MAC:ac-e2-15-38-58-58;TIME:1393398715;ZONE:UTC-0000;DAYLIGHT:false;ERRCODE:255;RESULT: authenticate fail;
2014-2-26 07:12:00+00:00 lgh31dcthw01 %%01UCM/5/USER_ACCESSRESULT(l)[60701]:[WLAN_STA_INFO_AUTHENTICATION]ACMAC:e0-24-7f-95-92-16;ACNAME:lgh31dcthw01;APMAC:ac-85-3d-97-30-e0;APNAME:ap-325;USER:CHINA\t00110630;MAC:a0-88-b4-e5-4c-f4;TIME:1393398720;ZONE:UTC-0000;DAYLIGHT:false;ERRCODE:205;RESULT:EAPOL client timeout;
2014-2-26 07:12:01+00:00 lgh31dcthw01 %%01UCM/5/USER_ACCESSRESULT(l)[60702]:[WLAN_STA_INFO_AUTHENTICATION]ACMAC:e0-24-7f-95-92-16;ACNAME:lgh31dcthw01;APMAC:ac-85-3d-97-30-e0;APNAME:ap-325;USER:CHINA\l00230090;MAC:60-67-20-20-44-8c;TIME:1393398721;ZONE:UTC-0000;DAYLIGHT:false;ERRCODE:198;RESULT:WLAN user request;
2015-1-12 23:49:16.978.1+08:00 brnewf01acAC6005_2 %%01UCM/5/USER_ACCESSRESULT(l)[425329]:[WLAN_STA_INFO_AUTHENTICATION]ACMAC:d8-49-0b-8b-fd-5d;ACNAME:brnewf01acAC6005_2;APMAC:20-0b-c7-9c-32-60;APNAME:ap-18;USER:LENOVO\cmenezes;MAC:00-23-14-e7-9a-54;TIME:1421077756;ZONE:UTC+0800;DAYLIGHT:false;ERRCODE:204;RESULT:Radius authentication has no response.;
2015-1-12 23:49:48+08:00 brnewf01acAC6005_1 %%01RDS/4/RDAUTHDOWN(l)[38]:RADIUS authentication server ( IP: 10.64.100.4 Vpn-Instance: -- ) is down!
2015-1-15 18:01:27+08:00 AC6005 %%01WLAN/3/WLAN_LOG_USER(l)[283]:AP-7 change from normal to fault: MAC = AC-85-3D-BE-86-80, Sysname:ap-7, Reason: echo interval timeout.
#Jan 27 2015 02:27:20+08:00 AC6605 WLAN/4/AP COLD BOOT:OID 1.3.6.1.4.1.2011.6.139.2.1.1.42 The AP cold boot. (AP TYPE=AP3010DN-AGN, AP Id=1, AP Sys Name=ap-1, AP MAC=[e4.68.a3.57.59.20 (hex)], AP Sys Time=2015-01-27 02:27:20, AP Alarm name=ApColdBootNotify)
Common Log |
Description |
Impact |
---|---|---|
refused by repeat association |
When an AP reports multiple association requests from a STA to an AC simultaneously but the AC is still processing the previous association request, the AC will respond an association repeated packet and this log is generated. |
The AP processes the association request properly but does not reject the association request from the STA. |
refused by reassociation mac check fail |
In V200R002 or earlier versions, when an AC on which STA data is saved receives a reassociation request reported by an AP, the AC will check whether the old MAC address of the AP carried in the reassociation request packet is the same as the MAC address saved on the AC. If not, this log is generated. |
The AC rejects the association request from the STA. If the problem persists, you are advised to disassociate the STA from the AP and then reassociate it with the AP. In V200R003 and later versions, the AC does not check the MAC address of the AP. |
refused by roam check fail(state) |
The log is generated when a STA fails the roaming check due to incorrect states. When a STA is unstable or fails the authentication, the STA is not allowed to roam. |
The AC only updates the STA data entries but does not reject this association request from the STA. |
refused by roam check fail(SSID); |
The log is generated when a STA fails the roaming check due to inconsistent SSIDs. When a STA switches its connected SSID, the AC on which the STA data is saved performs the roaming check. However, if the SSIDs are different, the STA is not allowed to roam. |
The AC only updates the STA data entries but does not reject this association request from the STA. |
refused by roam check fail(others) |
In V200R003, the log is generated when the STA fails the Layer 3 roaming check because Layer 3 roaming is disabled. |
The AC deletes the STA data entries and rejects this association request. The next association will not be affected. |
intermittent disconnections occurred; |
This is a new log in V200R005 and indicates intermittent disconnections. When a STA goes online on a VAP within 5 seconds after getting offline from it, this log is generated. |
The STA access is not affected. Intermittent disconnections occur when a STA enters the sleep mode or leaves the coverage area. |
rate not match |
The basic rate set carried in an association request frame of a STA does not include the basic rates specified in the protocol: 1 Mbit/s, 2 Mbit/s, and 5.5 Mbit/s. Therefore, the basic rate check on the AP fails and the STA access is rejected. |
This log is just for warning. The STA can quickly reconnect to the AP with the guidance of the AP. The STA access is not affected. |
other reason;ERRCODE:65545 |
ERRCODE: 65545 = 0x10009. 09 refers to a reason code, corresponding to the alarm log (failcause = 9), which indicates that the AP does not receive an authentication request frame from the STA prior to an association request frame. |
The STA access is not affected. |
other reason;ERRCODE:65548 |
ERRCODE: 65548= 0x1000c. The alarm log 12 indicates that a non-802.11n STA attempts to associate with a VAP in 802.11n mode. |
The STA cannot access the network. STAs that do not support 802.11n cannot associate with a VAP in 802.11n mode. |
authenticate fail |
Authentication fails. |
Generally, the server rejects the authentication. You can locate the cause on the server. |
EAPOL client timeout |
The client does not respond with an EAP packet, causing the timeout. |
STA authentication fails due to the STA fault. Use another terminal to try again. |
WLAN user request |
A STA proactively goes offline. |
When a STA enters the standby mode or leaves the Wi-Fi signal coverage area, or the Wi-Fi is turned off, the STA goes offline. |
Radius authentication has no response |
The RADIUS server does not respond. |
The RADIUS server does not respond with a packet, so the authentication fails. |
RADIUS authentication server is down |
Authentication request packets from all STAs are exchanged between the AC and server and retransmitted every 5s. If the AC does not receive response packets from the RADIUS server after the authentication request packets from any STA are retransmitted for three times, this log is generated. |
The terminal authentication fails. |
echo interval timeout |
The heartbeat packet transmission between the AP and AC times out. |
The AP gets offline. Generally, it is because the intermediate network is faulty. |
Alarm name=ApColdBootNotify |
The AP is cold started. |
Cause 1: The AP is powered on, goes online, and operates properly after the AP is powered off unexpectedly. Cause 2: The AP goes online again after CAPWAP link disconnection between the AP and AC. |