05-18-2018 10:02 PM
Administration :: Log
Need Help?
Log Status: Enabled Disabled
Syslog Server Address:
Syslog Server Port
Current Log
Refresh
Feb 28 03:39:06 RuckusAP_Level_3 syslog.info syslogd started: BusyBox v1.15.2
Feb 28 03:39:08 RuckusAP_Level_3 daemon.notice rsmd[26]: logger .......... [started] (2.065)
Feb 28 03:39:08 RuckusAP_Level_3 user.notice kernel: klogd started: BusyBox v1.15.2 (2015-02-27 20:05:51 PST)
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: 0040000-0x000000740000 : "rcks_wlan.main"
Feb 28 03:39:08 RuckusAP_Level_3 user.notice kernel: 0x000000740000-0x000000860000 : "rcks_wlan.bkup"
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: mtd: partition "rcks_wlan.bkup" doesn't end on an erase block -- force read-only
Feb 28 03:39:08 RuckusAP_Level_3 user.notice kernel: 0x000000860000-0x000000e40000 : "v54_$rootfs$_2"
Feb 28 03:39:08 RuckusAP_Level_3 user.notice kernel: 0x000000e40000-0x000000f80000 : "datafs"
Feb 28 03:39:08 RuckusAP_Level_3 user.notice kernel: 0x000000f80000-0x000000fc0000 : "u-boot-env"
Feb 28 03:39:08 RuckusAP_Level_3 user.notice kernel: 0x000000fc0000-0x000001000000 : "Board Data"
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: tun: Universal TUN/TAP device driver, 1.6
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: tun: (C) 1999-2004 Max Krasnyansky
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: In ar7100_ehci_drv_probe
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: probing ehci...
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: hcd->regs is bb000000
Feb 28 03:39:08 RuckusAP_Level_3 user.debug kernel: /home/jenkins/workspace/APSOLO_100.0.1.0_ZF79xx-OFFICIAL/linux/kernels/linux-2.6.32.24/drivers/usb/host/ehci-ar7100.c: starting AR7100 EHCI USB Controller...done. reset 0x40 usb config 0x30000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ehci->caps is bb000000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ehci->caps->hc_base is 0x1000010
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ehci ar7100-ehci.0: AR7100 EHCI
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ehci ar7100-ehci.0: new USB bus registered, assigned bus number 1
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ehci ar7100-ehci.0: irq 3, io mem 0x1b000000
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ehci ar7100-ehci.0: USB 0.0 started, EHCI 1.00
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: usb usb1: configuration #1 chosen from 1 choice
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: hub 1-0:1.0: USB hub found
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: hub 1-0:1.0: 2 ports detected
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ...probing done
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: In ohci_hcd_ar7100_drv_probe
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: probing...
Feb 28 03:39:08 RuckusAP_Level_3 user.debug kernel: /home/jenkins/workspace/APSOLO_100.0.1.0_ZF79xx-OFFICIAL/linux/kernels/linux-2.6.32.24/drivers/usb/host/ohci-ar7100.c: starting AR7100 OHCI USB Controller...
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ohci ar7100-ohci.0: AR7100 OHCI
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ohci ar7100-ohci.0: new USB bus registered, assigned bus number 2
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar7100-ohci ar7100-ohci.0: irq 22, io mem 0x1c000000
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: usb usb2: configuration #1 chosen from 1 choice
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: hub 2-0:1.0: USB hub found
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: hub 2-0:1.0: 2 ports detected
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: probing done
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: v54_bsp: Version 1.1
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: Copyright (c) 2004-2007 Ruckus Wireless, Inc.All Rights Reserved
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: board_configuration(0x803c114c) @ 0xfc0000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: v54rb: creating proc file himem_v54rb
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: v54cf: create proc file himem_v54cf
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rb_init_module: device=v54rb, major=55, count=2 ...
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rb_init_module: v54rb's major dev number=55
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rb_init_module: setup dev v54rb major=55, minor=0, mem_start=a3ff5400, sizeof(ring_buffer)=16
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rb_init_module: setup dev v54rb major=55, minor=1, mem_start=a3ffa800, sizeof(ring_buffer)=16
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: cf_init_module: device=v54cf, major=56, count=0 ...
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: cf_init_module: No high memory available for v54cf, ignore init ...
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: TCP bic registered
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: NET: Registered protocol family 10
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: lo: Disabled Privacy Extensions
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: NET: Registered protocol family 17
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: 802.1Q VLAN Support v1.8 Ben Greear
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: All bugs added by David S. Miller
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: Hello world, ruckus generic netlink!
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: register rks_genl_family succeeded
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: prepare_namespace: mount from flash
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:4.
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: Freeing unused kernel memory: 164k freed
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: Algorithmics/MIPS FPU Emulator v1.5
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: mount used greatest stack depth: 14480 bytes left
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: mount used greatest stack depth: 14264 bytes left
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: cp used greatest stack depth: 13976 bytes left
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rpmd used greatest stack depth: 13752 bytes left
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: procfs_write: buf=enable 1 1
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: , len=11
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: procfs_write: cmd=enable, dev minor=1, val=1, buf=
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rudb: module license 'Proprietary' taints kernel.
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: Disabling lock debugging due to kernel taint
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: Ruckus DNS Module, compiled at Feb 27 2015, 20:02:39
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: AG7100: Length per segment 1536
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: AG7100: Max segments per packet 2
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: AG7100: Max tx descriptor count 200
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: AG7100: Max rx descriptor count 252
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ag7100_init: venetEnabled=1 dev_per_mac=2
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: mac0=83020000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: eth2
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: dev0=0x83ae1400 macaddr=c4 10 8a 18 fb 73
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: phy0Id[0x141 0x24]
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: phy1Id[0x1c]
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: mac1=83004000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: eth1
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: dev1=0x83034800 macaddr=c4 10 8a 18 fb 74
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: eth0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: dev2=0x8302ec00 macaddr=c4 10 8a 18 fb 75
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ag7100_open: mac=83020000 dev=83ae1400 mac_unit=0 mac0_dev_opened=0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ag7100_ring_alloc Allocated 3200 at 0x83b1c000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ag7100_ring_alloc Allocated 4032 at 0x83028000
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: AG7100: cfg1 0xf cfg2 0x7014
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: wlan: 0.8.4.2 (Atheros/multi-bss)
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x4e, func=0xc05a07d0 rks_sw2_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: register rks_sw2_genl_family succeeded
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: register rks_sw2_genl_ops succeeded
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: register rks_hs20_genl_family succeeded
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: register rks_hs20_genl_ops succeeded
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_hal: 0.9.17.1 (AR5416, REGOPS_FUNC, PRIVATE_DIAG, 11D)
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_rate_rks_bflex_bcs
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_dfs: Version 2.0.0
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: wlan: mac acl policy registered
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_pci: 0.9.4.5 (Atheros/multi-bss)
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: PCI: Enabling device 0000:00:00.0 (0000 -> 0002)
Feb 28 03:39:08 RuckusAP_Level_3 user.debug kernel: ath_pci 0000:00:00.0: enabling bus mastering
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_pci_probe: phymem=0x10000000, irq=48 pdev=83811400
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: pci_read_cachesize: pdev=83811400
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0xe3, func=0x833092c0 ath_rx_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x52, func=0x8331ce2c owl_tx_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0xff, func=0x83313778 ath_bmiss_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0xdb, func=0x8330b6dc ath_bstuck_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x0f, func=0x83308a34 ath_beacon_channel_change_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x3f, func=0x8330b638 ath_fatal_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: macVersion 0x80, macRev 2 PhyRev d0
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar5416HwAttach: ANI is disabled
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_attach: radio 0, mac c4:10:8a:18:fb:78
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_hal_init_channels: regdmn 0x15, country 554, dfsDomain 1, modesAvail 0x680c, rd5GHz
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ieee80211_announce_channels: ic->ic_nchans 57
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: Chan Freq RegPwr HT CTL CTL_U CTL_L DFS Flags
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 1 2412g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 1 2412n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 1 2412n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 1 2412b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 2 2417n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 2 2417g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 2 2417b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 2 2417n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 3 2422n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 3 2422g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 3 2422b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 3 2422n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 4 2427n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 4 2427g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 4 2427b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 4 2427n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 5 2432n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 5 2432n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 5 2432n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 5 2432g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 5 2432b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 6 2437n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 6 2437n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 6 2437n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 6 2437g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 6 2437b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 7 2442n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 7 2442n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 7 2442g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 7 2442n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 7 2442b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 8 2447n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 8 2447n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 8 2447n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 8 2447g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 8 2447b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 9 2452n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 9 2452n 36 HT40 0 1 0 N 0xa0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 9 2452n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 9 2452g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 9 2452b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 10 2457n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 10 2457n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 10 2457g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 10 2457b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 11 2462n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 11 2462n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 11 2462g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 11 2462b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 12 2467n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 12 2467n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 12 2467g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 12 2467b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 13 2472n 36 HT40 0 0 1 N 0xc0080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 13 2472n 36 HT20 1 0 0 N 0x10080
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 13 2472g 36 0 0 0 N 0xc0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 13 2472b 36 0 0 0 N 0xa0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_dfs_allowed: do dfs 0, enable_dfs 1
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_rate_attach: memory: size 66760, mqsize 291788 ruckus_softc 49332 antinfo 49252 txctl size 17428
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_init_ant_hw_sw: anttype=0x26 antctrl=0x8
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: v54_antinfo: ANTMODEL_GD11_2G (26): 8 bits, 47 states, 1 omni, 5 prober, 3 gain
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: txctrl_init ANTMODEL_GD11_2G 8336c0b8 8336c0c0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_rate_attach: wifi0 Tx 1024, Rx 575, Order 7, Max STA 384, Per STA(voice 64, video 256, data 128, bkgnd 64)
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x3c, func=0xc057a800 ieee80211_node_aging_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x14, func=0xc0589b14 scan_restart_pwrsav
Feb 28 03:39:08 RuckusAP_Level_3 user.err kernel: ieee80211_wifipos_attach:525 lbs:[8388cf00] Netlink socket created for Radio 0:8302b200
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: 11ng rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: 11ng MCS: 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: mac 128.2 phy 13.0 radio 12.0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: Use hw queue 0 for WME_AC_BK traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: Use hw queue 1 for WME_AC_BE traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: Use hw queue 2 for WME_AC_VI traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: Use hw queue 3 for WME_AC_VO traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: Use hw queue 8 for CAB traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi0: Use hw queue 9 for beacons
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: PCI: Enabling device 0000:00:01.0 (0000 -> 0002)
Feb 28 03:39:08 RuckusAP_Level_3 user.debug kernel: ath_pci 0000:00:01.0: enabling bus mastering
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_pci_probe: phymem=0x10010000, irq=49 pdev=83811000
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: pci_read_cachesize: pdev=83811000
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: macVersion 0x80, macRev 2 PhyRev d0
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ar5416HwAttach: ANI is disabled
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_attach: radio 1, mac c4:10:8a:18:fb:7c
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: ath_hal_init_channels: regdmn 0x15, country 554, dfsDomain 1, modesAvail 0x19001, rd5GHz
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ieee80211_announce_channels: ic->ic_nchans 60
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: Chan Freq RegPwr HT CTL CTL_U CTL_L DFS Flags
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 36 5180a 23 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 36 5180n 23 HT40 0 1 0 N 0xa0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 36 5180n 23 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 40 5200a 23 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 40 5200n 23 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 40 5200n 23 HT40 0 0 1 N 0xc0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 44 5220n 23 HT40 0 1 0 N 0xa0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 44 5220n 23 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 44 5220a 23 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 48 5240n 23 HT40 0 0 1 N 0xc0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 48 5240n 23 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 48 5240a 23 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 52 5260n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 52 5260n 30 HT40 0 1 0 Y 0xa1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 52 5260a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 56 5280n 30 HT40 0 0 1 Y 0xc1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 56 5280n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 56 5280a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 60 5300n 30 HT40 0 1 0 Y 0xa1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 60 5300n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 60 5300a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 64 5320n 30 HT40 0 0 1 Y 0xc1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 64 5320n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 64 5320a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 100 5500n 30 HT40 0 1 0 Y 0xa1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 100 5500n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 100 5500a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 104 5520n 30 HT40 0 0 1 Y 0xc1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 104 5520n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 104 5520a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 108 5540a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 108 5540n 30 HT40 0 1 0 Y 0xa1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 108 5540n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 112 5560n 30 HT40 0 0 1 Y 0xc1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 112 5560n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 112 5560a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 116 5580n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 116 5580a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 132 5660n 30 HT40 0 1 0 Y 0xa1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 132 5660n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 132 5660a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 136 5680n 30 HT40 0 0 1 Y 0xc1100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 136 5680n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 136 5680a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 140 5700n 30 HT20 1 0 0 Y 0x11100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 140 5700a 30 0 0 0 Y 0x1140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 149 5745n 36 HT40 0 1 0 N 0xa0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 149 5745n 36 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 149 5745a 36 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 153 5765n 36 HT40 0 0 1 N 0xc0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 153 5765n 36 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 153 5765a 36 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 157 5785n 36 HT40 0 1 0 N 0xa0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 157 5785n 36 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 157 5785a 36 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 161 5805n 36 HT40 0 0 1 N 0xc0100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 161 5805n 36 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 161 5805a 36 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 165 5825n 36 HT20 1 0 0 N 0x10100
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: 165 5825a 36 0 0 0 N 0x140
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_dfs_allowed: do dfs 1, enable_dfs 1
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_attach: Enabling 3 stream workaround
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_rate_attach: memory: size 66760, mqsize 308172 ruckus_softc 49332 antinfo 49252 txctl size 17428
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_init_ant_hw_sw: anttype=0x27 antctrl=0x8
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: v54_antinfo: ANTMODEL_GD11_5G (27): 6 bits, 49 states, 1 omni, 4 prober, 3 gain
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: txctrl_init ANTMODEL_GD11_5G 82acc0b8 82acc0c0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: ath_rate_attach: wifi1 Tx 2048, Rx 768, Order 7, Max STA 384, Per STA(voice 64, video 384, data 256, bkgnd 64)
Feb 28 03:39:08 RuckusAP_Level_3 user.err kernel: ieee80211_wifipos_attach:525 lbs:[8388cc80] Netlink socket created for Radio 1:832c6600
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: 11a rates: 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: 11na rates: 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: 11na MCS: 0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: mac 128.2 phy 13.0 radio 12.0
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: Use hw queue 0 for WME_AC_BK traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: Use hw queue 1 for WME_AC_BE traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: Use hw queue 2 for WME_AC_VI traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: Use hw queue 3 for WME_AC_VO traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: Use hw queue 8 for CAB traffic
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: wifi1: Use hw queue 9 for beacons
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: modprobe used greatest stack depth: 13056 bytes left
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0xde, func=0xc0577a30 ieee80211_sta_join1_tasklet
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: rks_ioctl: module 11 cmd 0 not supported
Feb 28 03:39:08 RuckusAP_Level_3 user.warn kernel: Client Isolation Filter Hook Initialization Complete
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device eth0 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device eth1 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device eth2 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan0 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: br0: port 4(wlan0) entering learning state (rsmd_func,265)
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan1 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan2 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan3 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan4 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan5 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan6 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan7 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan8 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: br0: port 12(wlan8) entering learning state (rsmd_func,265)
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan9 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan10 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan11 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan12 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan13 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan14 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan15 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan102 entered promiscuous mode
Feb 28 03:39:08 RuckusAP_Level_3 user.info kernel: device wlan103 entered promiscuous mode
Feb 28 03:39:09 RuckusAP_Level_3 daemon.err dhcp6c[396]: dhcp6_ctl_authinit: failed to open /tmp/dhcp6cctlkey: No such file or directory
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: dhcp6c used greatest stack depth: 13036 bytes left
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: ag7100_open: mac=83020000 dev=83ae1400 mac_unit=0 mac0_dev_opened=1
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: Writing 4
Feb 28 03:39:09 RuckusAP_Level_3 user.info kernel: ADDRCONF(NETDEV_UP): eth2: link is not ready
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: ag7100_open: mac=83004000 dev=83034800 mac_unit=1 mac0_dev_opened=2
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: ag7100_ring_alloc Allocated 3200 at 0x8238c000
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: ag7100_ring_alloc Allocated 4032 at 0x81c3a000
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: AG7100: cfg1 0xf cfg2 0x7002
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: rtl acl enabled
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: ag7100 open: phy_up(0) fdx(0) speed(0)
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: AG7100: pll reg 0x18050014: 0x1099
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: AG7100: cfg_1:0x1ff0000 cfg_2:0x2aa0155 cfg_3:0x8001ff cfg_4:0xffff cfg_5:0x3ffff
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: Writing 6
Feb 28 03:39:09 RuckusAP_Level_3 user.info kernel: ADDRCONF(NETDEV_UP): eth1: link is not ready
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: ag7100_open: mac=83004000 dev=8302ec00 mac_unit=1 mac0_dev_opened=2
Feb 28 03:39:09 RuckusAP_Level_3 user.info kernel: ADDRCONF(NETDEV_UP): eth0: link is not ready
Feb 28 03:39:09 RuckusAP_Level_3 daemon.notice rsmd[26]: bridge .......... [started] (0.948)
Feb 28 03:39:09 RuckusAP_Level_3 daemon.notice rsmd[26]: mosquitto ....... [started] (0.076)
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: Start DFS wait period for channel 60
Feb 28 03:39:09 RuckusAP_Level_3 daemon.notice rsmd[26]: matrix .......... [started] (0.243)
Feb 28 03:39:09 RuckusAP_Level_3 user.info kernel: br0: port 4(wlan0) entering forwarding state (mosquitto,417)
Feb 28 03:39:09 RuckusAP_Level_3 user.info kernel: br0: port 12(wlan8) entering forwarding state (modprobe,427)
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: SmartDevice: Version 2.1.0
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: Copyright (c) 2005-2009 Ruckus Wireless, All Rights Reserved
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: v54_glue 2.2 Copyright (C) 2006-2009 Ruckus Wireless. gblQOS(0x21c8)=83b14000 Mcast(32/32/128) numIFs(0x1140)=96 FiltTbl(0x608)=16
Feb 28 03:39:09 RuckusAP_Level_3 user.warn kernel: wireless igmp(81c27000/81d18000/81c27400/81d3a000) wireless mld(82452800/81d02000/82332000/81d04000) wired igmp(81d29c00/81d06000/81d29800/81d3e000) wired mld(81d28800/81d3c000/81d28000/81d10000)
Feb 28 03:39:09 RuckusAP_Level_3 user.info kernel: kstat_init_tasklets: hash=0x22, func=0x81d4295c v54_flow_cur_ager
Feb 28 03:39:10 RuckusAP_Level_3 daemon.notice rsmd[26]: smartcast ....... [started] (0.564)
Feb 28 03:39:10 RuckusAP_Level_3 daemon.notice rsmd[26]: IP event ........ [started] (0.109)
Feb 28 03:39:10 RuckusAP_Level_3 authpriv.warn dropbear[435]: Failed loading /writable/data/dropbear//dropbear_rsa_host_key
Feb 28 03:39:10 RuckusAP_Level_3 authpriv.warn dropbear[435]: Failed loading /writable/data/dropbear//dropbear_dss_host_key
Feb 28 03:39:10 RuckusAP_Level_3 daemon.notice rsmd[26]: sshd ............ [started] (0.076)
Feb 28 03:39:10 RuckusAP_Level_3 authpriv.info dropbear[438]: Running in background
Feb 28 03:39:10 RuckusAP_Level_3 daemon.notice rsmd[26]: supplicant ...... [started] (0.070)
Feb 28 03:39:11 RuckusAP_Level_3 user.warn kernel: ag7100 link: vdev 8302ec00 up, speed(1) fdx(1)
Feb 28 03:39:11 RuckusAP_Level_3 user.info kernel: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Feb 28 03:39:11 RuckusAP_Level_3 user.info kernel: br0: port 1(eth0) entering learning state (events/0,5)
Feb 28 03:39:12 RuckusAP_Level_3 user.info kernel: br0: port 1(eth0) entering forwarding state (swapper,0)
Feb 28 03:39:12 RuckusAP_Level_3 user.info kernel: br0: port 4(wlan0) entering disabled state (hostapd,449)
Feb 28 03:39:12 RuckusAP_Level_3 user.info kernel: br0: port 4(wlan0) entering learning state (hostapd,449)
Feb 28 03:39:12 RuckusAP_Level_3 user.info kernel: br0: port 12(wlan8) entering disabled state (hostapd,449)
Feb 28 03:39:13 RuckusAP_Level_3 user.info kernel: br0: port 12(wlan8) entering learning state (hostapd,449)
Feb 28 03:39:13 RuckusAP_Level_3 daemon.notice rsmd[26]: hostap .......... [started] (2.743)
Feb 28 03:39:13 RuckusAP_Level_3 daemon.notice rsmd[26]: eth1x ........... [started] (0.128)
Feb 28 03:39:13 RuckusAP_Level_3 user.warn kernel: ntpclient used greatest stack depth: 12388 bytes left
Feb 28 03:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 03:39:13 RuckusAP_Level_3 user.info kernel: br0: port 4(wlan0) entering forwarding state (webs,505)
Feb 28 03:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:13 RuckusAP_Level_3 user.warn kernel: webs used greatest stack depth: 12092 bytes left
Feb 28 03:39:13 RuckusAP_Level_3 daemon.notice rsmd[26]: webserver ....... [started] (0.662)
Feb 28 03:39:13 RuckusAP_Level_3 daemon.notice rsmd[26]: led ............. [started] (0.098)
Feb 28 03:39:13 RuckusAP_Level_3 daemon.notice rsmd[26]: rfwd ............ [started] (0.000)
Feb 28 03:39:14 RuckusAP_Level_3 user.info kernel: br0: port 12(wlan8) entering forwarding state (rsmd_func,511)
Feb 28 03:39:14 RuckusAP_Level_3 daemon.notice rsmd[26]: telnetd ......... [started] (0.127)
Feb 28 03:39:14 RuckusAP_Level_3 user.info kernel: v54_bsp: 0xff
Feb 28 03:39:14 RuckusAP_Level_3 daemon.notice rsmd[26]: lldpd ........... [started] (0.120)
Feb 28 03:39:14 RuckusAP_Level_3 daemon.notice rsmd[26]: snmpd ........... [started] (0.062)
Feb 28 03:39:14 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 IEEE 802.11: associated
Feb 28 03:39:14 RuckusAP_Level_3 user.warn kernel: snmptrap used greatest stack depth: 11428 bytes left
Feb 28 03:39:14 RuckusAP_Level_3 daemon.notice rsmd[26]: snmptrap ........ [started] (0.397)
Feb 28 03:39:14 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:14 RuckusAP_Level_3 daemon.notice rsmd[26]: apmgr ........... [started] (0.228)
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice rsmd[26]: wrad ............ [started] (0.171)
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice rsmd[26]: sntp ............ [started] (0.223)
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: wrad init
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: wrad_state_exit:
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: wrad_state_enter:
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: wrad_state_exit: I
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: wrad_state_enter: I -> P
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: hm_recovery_ssid: ...
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: hm_recovery_ssid: enable 1, service control 0, service down 0
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: recovery_action: brought up service on wlan0
Feb 28 03:39:15 RuckusAP_Level_3 daemon.notice wrad[530]: recovery_action: brought up service on wlan8
Feb 28 03:39:15 RuckusAP_Level_3 user.warn kernel: default.script used greatest stack depth: 10944 bytes left
Feb 28 03:39:15 RuckusAP_Level_3 user.info kernel: br14: port 1(wlan102) entering learning state (wrad,530)
Feb 28 03:39:15 RuckusAP_Level_3 user.info kernel: br14: port 2(wlan103) entering learning state (wrad,530)
Feb 28 03:39:15 RuckusAP_Level_3 user.info kernel: br14: port 1(wlan102) entering disabled state (hostapd,449)
Feb 28 03:39:16 RuckusAP_Level_3 user.info kernel: br14: port 1(wlan102) entering learning state (hostapd,449)
Feb 28 03:39:16 RuckusAP_Level_3 user.info kernel: br14: port 2(wlan103) entering disabled state (hostapd,449)
Feb 28 03:39:16 RuckusAP_Level_3 user.info kernel: br14: port 2(wlan103) entering learning state (hostapd,449)
Feb 28 03:39:16 RuckusAP_Level_3 daemon.notice rsmd[26]: hotspot ......... [started] (1.155)
Feb 28 03:39:16 RuckusAP_Level_3 daemon.notice wrad[530]: main loop
Feb 28 03:39:16 RuckusAP_Level_3 daemon.notice rsmd[26]: tr069 ........... [started] (0.174)
Feb 28 03:39:16 RuckusAP_Level_3 user.warn kernel: Start DFS wait period for channel 52
Feb 28 03:39:16 RuckusAP_Level_3 daemon.notice rsmd[26]: sysinfo-archive . [started] (0.217)
Feb 28 03:39:16 RuckusAP_Level_3 daemon.notice rsmd[26]: l2tp ............ [started] (0.069)
Feb 28 03:39:16 RuckusAP_Level_3 daemon.notice rsmd[26]: zapd ............ [started] (0.000)
Feb 28 03:39:17 RuckusAP_Level_3 user.info kernel: br14: port 1(wlan102) entering forwarding state (tr069d,553)
Feb 28 03:39:17 RuckusAP_Level_3 daemon.notice rsmd[26]: channelfly ...... [started] (0.239)
Feb 28 03:39:17 RuckusAP_Level_3 user.info kernel: br14: port 2(wlan103) entering forwarding state (channelfly,569)
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 4c:66:41:2f:3f:a3 IEEE 802.11: associated
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 4c:66:41:2f:3f:a3 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly mode set to ENABLED
Feb 28 03:39:17 RuckusAP_Level_3 daemon.notice rsmd[26]: mshngrd ......... [started] (0.357)
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info channel-wifi1: No high memory available for channelfly state backup
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info channel-wifi1: init: (c4:10:8a:18:fb:7c) interval=15
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info channel-wifi1: unable to find active wlan device for wifi1
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info channel-wifi0: channelfly mode set to DISABLED
Feb 28 03:39:17 RuckusAP_Level_3 daemon.info channel-wifi0: No high memory available for channelfly state backup
Feb 28 03:39:17 RuckusAP_Level_3 daemon.notice rsmd[26]: rfmd ............ [started] (0.132)
Feb 28 03:39:17 RuckusAP_Level_3 daemon.notice rsmd[26]: hub_registrar ... [started] (0.069)
Feb 28 03:39:17 RuckusAP_Level_3 daemon.notice rsmd[26]: rsmd: started 35/36 modules -
Feb 28 03:39:17 RuckusAP_Level_3 daemon.notice rsmd[26]: (20.000)
Feb 28 03:39:18 RuckusAP_Level_3 user.warn kernel: sh used greatest stack depth: 10420 bytes left
Feb 28 03:39:18 RuckusAP_Level_3 daemon.info init: starting pid 609, tty '': '/bin/cttyhack /usr/bin/-rkscli'
Feb 28 03:39:19 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 48:d6:d5:46:c5:14 IEEE 802.11: associated
Feb 28 03:39:19 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 48:d6:d5:46:c5:14 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:22 RuckusAP_Level_3 daemon.notice rsmd[26]: snmpd ........... [stopped] (3.437)
Feb 28 03:39:23 RuckusAP_Level_3 daemon.notice rsmd[26]: snmpd ........... [started] (0.769)
Feb 28 03:39:23 RuckusAP_Level_3 user.warn kernel: process `snmpd' is using deprecated sysctl (syscall) net.ipv6.neigh.br0.retrans_time; Use net.ipv6.neigh.br0.retrans_time_ms instead.
Feb 28 03:39:23 RuckusAP_Level_3 local0.info snmpd[673]: NET-SNMP version 5.3.0.1
Feb 28 03:39:31 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:92:17:62:4b:7b IEEE 802.11: associated
Feb 28 03:39:31 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:92:17:62:4b:7b WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:36 RuckusAP_Level_3 daemon.warn Eved: Last Reboot Reason: unknown
Feb 28 03:39:46 RuckusAP_Level_3 local2.err syslog: Parameter value L2 is invalid for parameter Tunnel-Mode
Feb 28 03:39:54 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: associated
Feb 28 03:39:54 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: disassociated
Feb 28 03:39:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA d4:6e:0e:02:e5:73 IEEE 802.11: associated
Feb 28 03:39:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA d4:6e:0e:02:e5:73 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: associated
Feb 28 03:39:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 WPA: pairwise key handshake completed (RSN)
Feb 28 03:39:56 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 03:39:56 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 03:40:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 70:1a:04:1c:21:14 IEEE 802.11: associated
Feb 28 03:40:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 70:1a:04:1c:21:14 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 03:40:15 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=70:1a:04:1c:21:14,func=domlme,line=6282,hint=domlme,rx_rssi=24,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(1,121,12,2068)
Feb 28 03:40:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 70:1a:04:1c:21:14 IEEE 802.11: disassociated
Feb 28 03:40:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 70:1a:04:1c:21:14 IEEE 802.11: associated
Feb 28 03:40:16 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 70:1a:04:1c:21:14 WPA: pairwise key handshake completed (RSN)
Feb 28 03:40:19 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 03:40:20 RuckusAP_Level_3 user.warn kernel: End of DFS wait period
Feb 28 03:40:20 RuckusAP_Level_3 user.warn kernel: NF Channel 5260 Chain 0 measured latest ctl:-118 ext:-50 capped median ctl:-108 ext:-77
Feb 28 03:40:20 RuckusAP_Level_3 user.warn kernel: NF Channel 5260 Chain 1 measured latest ctl:-114 ext:-50 capped median ctl:-108 ext:-77
Feb 28 03:40:20 RuckusAP_Level_3 user.warn kernel: NF Channel 5260 Chain 2 measured latest ctl:-32708 ext:15520 capped median ctl:-77 ext:-77
Feb 28 03:40:20 RuckusAP_Level_3 user.warn kernel: wifi1: 4294758231 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 0
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 36 : 5180
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 40 : 5200
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 44 : 5220
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 48 : 5240
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 52 : 5260 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 56 : 5280 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 60 : 5300 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 64 : 5320 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 100 : 5500 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 104 : 5520 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 108 : 5540 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 112 : 5560 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 116 : 5580 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 132 : 5660 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 136 : 5680 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 140 : 5700 DFS
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 149 : 5745
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 153 : 5765
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 157 : 5785
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 161 : 5805
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found channel 165 : 5825
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Found 21 valid channels
Feb 28 03:40:32 RuckusAP_Level_3 daemon.info channel-wifi1: Pausing 10 minutes (DFS related)
Feb 28 03:40:41 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 03:40:41 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 03:40:50 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:41:50 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:42:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:0d:c2:85:be:4f IEEE 802.11: associated
Feb 28 03:42:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:0d:c2:85:be:4f WPA: pairwise key handshake completed (RSN)
Feb 28 03:42:57 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:43:36 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 48:d6:d5:46:c5:14 IEEE 802.11: disassociated
Feb 28 03:43:40 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 48:d6:d5:46:c5:14 IEEE 802.11: associated
Feb 28 03:43:40 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 48:d6:d5:46:c5:14 WPA: pairwise key handshake completed (RSN)
Feb 28 03:43:58 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 68:fb:7e:52:ae:5d IEEE 802.11: associated
Feb 28 03:44:00 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:44:08 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=68:fb:7e:52:ae:5d,func=domlme,line=6282,hint=domlme,rx_rssi=1,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(0,0,11,1089)
Feb 28 03:44:08 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 68:fb:7e:52:ae:5d IEEE 802.11: deauthenticated due to local deauth request
Feb 28 03:44:08 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 68:fb:7e:52:ae:5d IEEE 802.11: disassociated
Feb 28 03:44:17 RuckusAP_Level_3 daemon.warn Eved: wlan0 68:fb:7e:52:ae:5d : Authentication Difficulty
Feb 28 03:45:03 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:46:12 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:46:33 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: disassociated
Feb 28 03:46:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: associated
Feb 28 03:46:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 WPA: pairwise key handshake completed (RSN)
Feb 28 03:46:44 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: disassociated
Feb 28 03:46:45 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b8:08:cf:a8:c8:89 IEEE 802.11: associated
Feb 28 03:46:45 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b8:08:cf:a8:c8:89 WPA: pairwise key handshake completed (RSN)
Feb 28 03:46:54 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b8:08:cf:a8:c8:89 IEEE 802.11: disassociated
Feb 28 03:46:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 IEEE 802.11: associated
Feb 28 03:46:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 WPA: pairwise key handshake completed (RSN)
Feb 28 03:47:09 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:47:20 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:d9:c7:84:79:00 IEEE 802.11: associated
Feb 28 03:47:20 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:d9:c7:84:79:00 WPA: pairwise key handshake completed (RSN)
Feb 28 03:48:17 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:48:23 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 IEEE 802.11: associated
Feb 28 03:48:24 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 WPA: pairwise key handshake completed (RSN)
Feb 28 03:48:31 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:75 k->rsc[1]:78
Feb 28 03:48:31 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:76 k->rsc[1]:78
Feb 28 03:49:21 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:50:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 03:50:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 03:50:25 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:50:33 RuckusAP_Level_3 daemon.info channel-wifi1: set initial channel 48
Feb 28 03:50:33 RuckusAP_Level_3 daemon.debug channel-wifi1: No controller or backup mechanism
Feb 28 03:50:35 RuckusAP_Level_3 daemon.info channel-wifi1: MTBC changed to 100 minutes
Feb 28 03:51:05 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 48 to channel 153
Feb 28 03:51:21 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: associated
Feb 28 03:51:21 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 153 to channel 40
Feb 28 03:51:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 WPA: pairwise key handshake completed (RSN)
Feb 28 03:51:32 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 03:51:32 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 03:51:32 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 03:51:32 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 03:51:34 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:51:37 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 40 to channel 44
Feb 28 03:51:53 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 44 to channel 161
Feb 28 03:51:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: disassociated
Feb 28 03:51:55 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=9c:5c:f9:74:9c:d9,func=ieee80211_send_mgmt,line=4492,hint=send station disassociate,rx_rssi=22,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(818,385329,847,494898)
Feb 28 03:51:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: unknown reason code= 2
Feb 28 03:52:00 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 03:52:00 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 03:52:01 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 03:52:01 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 03:52:09 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 161 to channel 157
Feb 28 03:52:25 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 157 to channel 149
Feb 28 03:52:36 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:161 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:162 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:163 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:165 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:166 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:167 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:168 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:169 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:170 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:d9:c7:84:79:00) (pkt-rsc:171 k->rsc[1]:296
Feb 28 03:52:41 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 149 to channel 36
Feb 28 03:53:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 8c:99:e6:3c:ba:e2 IEEE 802.11: associated
Feb 28 03:53:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 8c:99:e6:3c:ba:e2 WPA: pairwise key handshake completed (RSN)
Feb 28 03:53:12 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 36 to channel 165
Feb 28 03:53:26 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=60:d9:c7:84:79:00,func=ieee80211_recv_mgmt,line=7011,hint=recv disassociate (reason 8),rx_rssi=23,ack_rssi=0,reason=8,freq=2462,chan=11,stats=(394,44062,372,103581)
Feb 28 03:53:26 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:d9:c7:84:79:00 IEEE 802.11: disassociated
Feb 28 03:53:41 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:53:43 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 165 to channel 48
Feb 28 03:54:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:0d:c2:85:be:4f IEEE 802.11: disassociated
Feb 28 03:54:14 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 48 to channel 161
Feb 28 03:54:38 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:55:15 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 161 to channel 153
Feb 28 03:55:26 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 IEEE 802.11: associated
Feb 28 03:55:26 RuckusAP_Level_3 user.warn kernel: starting mute state
Feb 28 03:55:26 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 WPA: pairwise key handshake completed (RSN)
Feb 28 03:55:31 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 153 to channel 44
Feb 28 03:55:35 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:55:47 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 44 to channel 36
Feb 28 03:55:58 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 60:d9:c7:84:79:00 IEEE 802.11: associated
Feb 28 03:55:58 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 60:d9:c7:84:79:00 WPA: pairwise key handshake completed (RSN)
Feb 28 03:56:03 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 36 to channel 157
Feb 28 03:56:19 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 157 to channel 149
Feb 28 03:56:35 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:56:35 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 149 to channel 161
Feb 28 03:56:39 RuckusAP_Level_3 user.warn kernel: ath_rx_procs_buffer:13883 ERROR rx len (3901) > desc buf (3872)
Feb 28 03:56:51 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 161 to channel 165
Feb 28 03:57:03 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 IEEE 802.11: associated
Feb 28 03:57:03 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 WPA: pairwise key handshake completed (RSN)
Feb 28 03:57:07 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 165 to channel 48
Feb 28 03:57:23 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 48 to channel 40
Feb 28 03:57:35 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:57:39 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 40 to channel 149
Feb 28 03:57:56 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 149 to channel 44
Feb 28 03:58:12 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 44 to channel 157
Feb 28 03:58:28 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 157 to channel 36
Feb 28 03:58:43 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:58:44 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 36 to channel 157
Feb 28 03:59:00 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 157 to channel 36
Feb 28 03:59:16 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 36 to channel 157
Feb 28 03:59:20 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: disassociated
Feb 28 03:59:46 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 03:59:47 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 157 to channel 36
Feb 28 04:00:03 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 36 to channel 44
Feb 28 04:00:05 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 IEEE 802.11: associated
Feb 28 04:00:15 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=b4:3a:28:3c:f1:76,func=domlme,line=6282,hint=domlme,rx_rssi=4,ack_rssi=0,reason=2,freq=5220,chan=44,stats=(1346,105725,6258,6246329)
Feb 28 04:00:15 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:00:15 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA b4:3a:28:3c:f1:76 IEEE 802.11: disassociated
Feb 28 04:00:42 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:01:40 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:02:38 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:02:45 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:02:45 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:02:50 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: disassociated
Feb 28 04:03:01 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:03:01 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:03:02 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: disassociated
Feb 28 04:03:10 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:03:10 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:03:14 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: disassociated
Feb 28 04:03:22 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:03:22 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:03:34 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:04:42 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:05:24 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:05:24 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 0 measured latest ctl:-115 ext:-50 capped median ctl:-102 ext:-77
Feb 28 04:05:24 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 1 measured latest ctl:-106 ext:-50 capped median ctl:-102 ext:-77
Feb 28 04:05:24 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 2 measured latest ctl:-32708 ext:15520 capped median ctl:-77 ext:-77
Feb 28 04:05:24 RuckusAP_Level_3 user.warn kernel: wifi0: 1294474 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Feb 28 04:05:47 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:05:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:05:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 IEEE 802.11: associated
Feb 28 04:05:56 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 WPA: pairwise key handshake completed (RSN)
Feb 28 04:06:27 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:06:27 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:06:52 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:07:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:07:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:07:09 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:07:16 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:44138 k->rsc[0]:44139
Feb 28 04:07:27 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:07:40 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:07:40 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:07:40 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=9c:4f:cf:58:7a:15,func=domlme,line=6282,hint=domlme,rx_rssi=13,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(1,121,15,2365)
Feb 28 04:07:44 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:07:47 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:07:54 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:46284 k->rsc[1]:46369
Feb 28 04:08:02 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:08:28 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA f0:27:65:d4:31:a8 IEEE 802.11: associated
Feb 28 04:08:28 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 04:08:28 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 04:08:28 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA f0:27:65:d4:31:a8 WPA: pairwise key handshake completed (RSN)
Feb 28 04:08:46 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:08:49 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=24:f0:94:e1:c5:d3,func=ieee80211_recv_mgmt,line=7011,hint=recv disassociate (reason 8),rx_rssi=19,ack_rssi=0,reason=8,freq=2462,chan=11,stats=(45890,3343927,71721,101093624)
Feb 28 04:08:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: disassociated
Feb 28 04:08:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: associated
Feb 28 04:08:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 WPA: pairwise key handshake completed (RSN)
Feb 28 04:08:54 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: disassociated
Feb 28 04:08:54 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=24:f0:94:e1:c5:d3,func=ieee80211_send_mgmt,line=4492,hint=send station disassociate,rx_rssi=24,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(19,1667,64,78232)
Feb 28 04:08:54 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: unknown reason code= 2
Feb 28 04:08:58 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=9c:4f:cf:58:7a:15,func=domlme,line=6282,hint=domlme,rx_rssi=4,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(36,2814,68,6845)
Feb 28 04:08:58 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:08:58 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:08:59 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:09:19 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: associated
Feb 28 04:09:19 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 WPA: pairwise key handshake completed (RSN)
Feb 28 04:09:32 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:09:33 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:09:36 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 2 tid->tidpause 1 reset tidpause
Feb 28 04:09:54 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:09:54 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 04:09:54 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:09:54 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 04:09:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f IEEE 802.11: disassociated
Feb 28 04:10:00 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:10:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:10:02 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 04:10:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:10:02 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 04:10:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f IEEE 802.11: disassociated
Feb 28 04:10:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f IEEE 802.11: associated
Feb 28 04:10:12 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 04:10:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f WPA: pairwise key handshake completed (RSN)
Feb 28 04:10:12 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 04:10:55 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:11:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 3c:f7:a4:98:5f:3f IEEE 802.11: associated
Feb 28 04:11:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 3c:f7:a4:98:5f:3f WPA: pairwise key handshake completed (RSN)
Feb 28 04:11:20 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA f0:27:65:d4:31:a8 IEEE 802.11: disassociated
Feb 28 04:12:02 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:12:05 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 90:cd:b6:d1:80:0f IEEE 802.11: disassociated
Feb 28 04:13:03 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:13:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 IEEE 802.11: disassociated
Feb 28 04:13:27 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=7 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:41341 k->rsc[1]:41359
Feb 28 04:13:27 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=7 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:41342 k->rsc[1]:41359
Feb 28 04:13:27 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=7 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:41343 k->rsc[1]:41359
Feb 28 04:13:27 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=7 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:41344 k->rsc[1]:41359
Feb 28 04:13:27 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=7 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:41345 k->rsc[1]:41359
Feb 28 04:13:27 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=7 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:41348 k->rsc[1]:41359
Feb 28 04:14:11 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:15:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:15:18 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:16:23 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:17:35 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:18:42 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:19:42 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:20:35 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:20:48 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:21:52 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:22:44 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:22:44 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:22:57 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:23:58 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:24:01 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50930 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50931 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50932 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50933 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50935 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50936 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50937 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50938 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50939 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50940 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50941 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50942 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50943 k->rsc[1]:4900593
Feb 28 04:24:02 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50944 k->rsc[1]:4900593
Feb 28 04:24:03 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50945 k->rsc[1]:4900593
Feb 28 04:24:03 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50946 k->rsc[1]:4900593
Feb 28 04:24:03 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50947 k->rsc[1]:4900593
Feb 28 04:24:03 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50948 k->rsc[1]:4900593
Feb 28 04:24:03 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50949 k->rsc[1]:4900593
Feb 28 04:24:03 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50950 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50951 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50952 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50953 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50954 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50955 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50956 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50957 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50958 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50959 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50960 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50961 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50962 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50963 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50964 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50965 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50966 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50967 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50968 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50969 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50970 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50971 k->rsc[1]:4900593
Feb 28 04:24:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50972 k->rsc[1]:4900593
Feb 28 04:24:05 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50973 k->rsc[1]:4900593
Feb 28 04:24:05 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50974 k->rsc[1]:4900593
Feb 28 04:24:05 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50975 k->rsc[1]:4900593
Feb 28 04:24:05 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50976 k->rsc[1]:4900593
Feb 28 04:24:05 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50977 k->rsc[1]:4900593
Feb 28 04:24:05 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:50978 k->rsc[1]:4900593
Feb 28 04:24:57 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:26:08 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:27:10 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:27:14 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:27:14 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:27:37 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: disassociated
Feb 28 04:27:37 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=24:f0:94:e1:c5:d3,func=ieee80211_recv_mgmt,line=7011,hint=recv disassociate (reason 8),rx_rssi=1,ack_rssi=0,reason=8,freq=2462,chan=11,stats=(147126,9973371,390801,572722631)
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57788 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57789 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57790 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57791 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57792 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57793 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57794 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57795 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57796 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57797 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57798 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57799 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57800 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57801 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57802 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57803 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57804 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57805 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57806 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57807 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57808 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57809 k->rsc[1]:57889
Feb 28 04:27:55 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:57810 k->rsc[1]:57889
Feb 28 04:28:06 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73483 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73484 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73485 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73486 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73487 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73488 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73489 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73490 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73491 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73492 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73525 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73526 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73527 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73528 k->rsc[2]:74443
Feb 28 04:28:58 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:73529 k->rsc[2]:74443
Feb 28 04:29:00 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:29:07 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:30:13 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:30:16 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA c0:d0:12:82:35:52 IEEE 802.11: associated
Feb 28 04:30:16 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA c0:d0:12:82:35:52 WPA: pairwise key handshake completed (RSN)
Feb 28 04:31:06 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:31:06 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:31:09 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:32:04 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:32:52 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:33:09 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:33:56 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:33:57 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 IEEE 802.11: disassociated
Feb 28 04:33:57 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:34:07 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:35:03 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:36:00 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:36:38 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=72 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=90:cd:b6:d1:80:0f) (pkt-rsc:52362 k->rsc[1]:52363
Feb 28 04:36:59 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 04:36:59 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 04:36:59 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 04:36:59 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 04:37:05 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:37:23 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 IEEE 802.11: associated
Feb 28 04:37:24 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 WPA: pairwise key handshake completed (RSN)
Feb 28 04:38:01 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:38:01 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:38:10 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:38:32 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:38:32 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:39:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: associated
Feb 28 04:39:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 WPA: pairwise key handshake completed (RSN)
Feb 28 04:39:06 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:40:09 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:40:36 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:41:05 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:41:23 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:41:23 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:41:25 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:41:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:42:08 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:42:18 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:42:18 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:42:43 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:42:43 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:43:05 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:44:02 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:44:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:44:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:44:23 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 1 tid->tidpause 1 reset tidpause
Feb 28 04:44:58 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:45:27 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 IEEE 802.11: disassociated
Feb 28 04:46:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 IEEE 802.11: associated
Feb 28 04:46:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 WPA: pairwise key handshake completed (RSN)
Feb 28 04:46:06 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:46:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:47:01 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:47:11 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:47:11 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=a8:a1:98:53:9f:89,func=domlme,line=6282,hint=domlme,rx_rssi=4,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(1,121,12,2068)
Feb 28 04:47:11 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:47:11 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:47:25 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:47:25 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:47:26 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 1 tid->tidpause 1 reset tidpause
Feb 28 04:48:13 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:49:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:147632 k->rsc[1]:147697
Feb 28 04:49:19 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:50:07 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:50:10 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:50:20 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: disassociated
Feb 28 04:50:23 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:50:59 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:51:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:51:07 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 1 tid->tidpause 1 reset tidpause
Feb 28 04:51:19 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:51:48 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:52:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:52:02 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=9c:4f:cf:58:7a:15,func=domlme,line=6282,hint=domlme,rx_rssi=5,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(6456,721910,18866,24431713)
Feb 28 04:52:02 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:52:21 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:52:34 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: disassociated
Feb 28 04:52:45 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:52:55 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=a8:a1:98:53:9f:89,func=domlme,line=6282,hint=domlme,rx_rssi=10,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(104,12035,126,26184)
Feb 28 04:52:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:52:55 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:52:57 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:53:07 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=a8:a1:98:53:9f:89,func=domlme,line=6282,hint=domlme,rx_rssi=9,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(1,121,12,2068)
Feb 28 04:53:07 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:53:07 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:53:25 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:53:30 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 04:53:30 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 04:53:51 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:53:51 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:53:52 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 1 tid->tidpause 1 reset tidpause
Feb 28 04:53:53 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 1 tid->tidpause 1 reset tidpause
Feb 28 04:54:09 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:54:09 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:54:29 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:54:43 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:54:53 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=9c:4f:cf:58:7a:15,func=domlme,line=6282,hint=domlme,rx_rssi=4,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(16,1958,40,3489)
Feb 28 04:54:53 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 04:54:53 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:55:06 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:55:06 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:55:37 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:56:03 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 04:56:03 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 04:56:03 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 1 tid->tidpause 1 reset tidpause
Feb 28 04:56:46 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:57:28 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 04:57:29 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 04:57:46 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 IEEE 802.11: associated
Feb 28 04:57:48 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 WPA: pairwise key handshake completed (RSN)
Feb 28 04:57:49 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 04:57:52 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 04:57:52 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 04:58:22 RuckusAP_Level_3 user.warn kernel: ath_rx_procs_buffer:13883 ERROR rx len (3884) > desc buf (3872)
Feb 28 04:58:58 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:00:07 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:00:35 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 44 to channel 161
Feb 28 05:00:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: associated
Feb 28 05:00:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 WPA: pairwise key handshake completed (RSN)
Feb 28 05:00:41 RuckusAP_Level_3 user.warn kernel: ath_aggr_delba_process Class 2 tid->tidpause 1 reset tidpause
Feb 28 05:00:44 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 68:fb:7e:52:ae:5d IEEE 802.11: associated
Feb 28 05:00:45 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 68:fb:7e:52:ae:5d WPA: pairwise key handshake completed (RSN)
Feb 28 05:00:51 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 161 to channel 44
Feb 28 05:01:07 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 05:01:07 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 05:01:07 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 05:01:07 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 05:01:16 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:02:22 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:03:17 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA a8:a1:98:53:9f:89 IEEE 802.11: disassociated
Feb 28 05:03:24 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:04:25 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:04:50 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: disassociated
Feb 28 05:05:21 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:05:34 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 3c:f7:a4:98:5f:3f IEEE 802.11: disassociated
Feb 28 05:06:28 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:07:22 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 44 to channel 48
Feb 28 05:07:36 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:07:38 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 48 to channel 40
Feb 28 05:07:54 RuckusAP_Level_3 daemon.info channel-wifi1: channelfly detects interference on radio 11a/n and switches from channel 40 to channel 44
Feb 28 05:08:00 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=101 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:32590 k->rsc[0]:32591
Feb 28 05:08:00 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=101 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:32588 k->rsc[0]:32591
Feb 28 05:08:00 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=101 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:32588 k->rsc[0]:32591
Feb 28 05:08:00 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=101 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:32589 k->rsc[0]:32591
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2253 baw_end:2253 seq_st:0 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2253 baw_end:2253 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2253 baw_end:2253 seq_st:0 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2253 baw_end:2253 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2253 baw_end:2253 seq_st:2253 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2253 baw_end:2253 seq_st:2253 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2256 baw_end:2256 seq_st:0 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2256 baw_end:2256 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2256 baw_end:2256 seq_st:2256 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2256 baw_end:2256 seq_st:2256 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2257 baw_end:2257 seq_st:2257 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2257 baw_end:2257 seq_st:2257 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2258 baw_end:2258 seq_st:2258 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2258 baw_end:2258 seq_st:2258 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2259 baw_end:2259 seq_st:2259 tidno:0
Feb 28 05:08:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2259 baw_end:2259 seq_st:2259 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0
Feb 28 05:08:19 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2260 baw_end:2260 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:08:33 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:09:00 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2273 baw_end:2273 seq_st:0 tidno:0
Feb 28 05:09:00 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2273 baw_end:2273 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:00 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2273 baw_end:2273 seq_st:0 tidno:0
Feb 28 05:09:00 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2273 baw_end:2273 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2278 baw_end:2278 seq_st:0 tidno:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2278 baw_end:2278 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2279 baw_end:2279 seq_st:0 tidno:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2279 baw_end:2279 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2279 baw_end:2279 seq_st:0 tidno:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2279 baw_end:2279 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2279 baw_end:2279 seq_st:0 tidno:0
Feb 28 05:09:09 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2279 baw_end:2279 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2280 baw_end:2280 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2281 baw_end:2281 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2281 baw_end:2281 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2281 baw_end:2281 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2281 baw_end:2281 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2282 baw_end:2282 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2282 baw_end:2282 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2282 baw_end:2282 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2282 baw_end:2282 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2283 baw_end:2283 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2284 baw_end:2284 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2284 baw_end:2284 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2285 baw_end:2285 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2285 baw_end:2285 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2285 baw_end:2285 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2285 baw_end:2285 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2285 baw_end:2285 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2285 baw_end:2285 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2286 baw_end:2286 seq_st:0 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2286 baw_end:2286 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2286 baw_end:2286 seq_st:2286 tidno:0
Feb 28 05:09:13 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2286 baw_end:2286 seq_st:2286 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2287 baw_end:2287 seq_st:0 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2287 baw_end:2287 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2287 baw_end:2287 seq_st:0 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2287 baw_end:2287 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2287 baw_end:2287 seq_st:2287 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2287 baw_end:2287 seq_st:2287 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2288 baw_end:2288 seq_st:0 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2288 baw_end:2288 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2288 baw_end:2288 seq_st:2288 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2288 baw_end:2288 seq_st:2288 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2289 baw_end:2289 seq_st:2289 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2289 baw_end:2289 seq_st:2289 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2290 baw_end:2290 seq_st:2290 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2290 baw_end:2290 seq_st:2290 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2291 baw_end:2291 seq_st:2291 tidno:0
Feb 28 05:09:14 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:2291 baw_end:2291 seq_st:2291 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:09:39 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:10:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 68:fb:7e:52:ae:5d IEEE 802.11: disassociated
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0
Feb 28 05:10:06 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2292 baw_end:2292 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0
Feb 28 05:10:07 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:2293 baw_end:2293 seq_st:0 tidno:0 new_agg_limit:1 nretry_drops:0
Feb 28 05:10:41 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:11:47 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:11:52 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: associated
Feb 28 05:11:52 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 WPA: pairwise key handshake completed (RSN)
Feb 28 05:12:34 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:4f:cf:58:7a:15 IEEE 802.11: disassociated
Feb 28 05:12:49 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:13:48 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:14:52 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:15:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 4c:66:41:2f:3f:a3 IEEE 802.11: disassociated
Feb 28 05:15:58 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:17:04 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:18:02 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:19:04 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:19:08 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 0 measured latest ctl:-113 ext:-50 capped median ctl:-102 ext:-77
Feb 28 05:19:08 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 1 measured latest ctl:-106 ext:-50 capped median ctl:-102 ext:-77
Feb 28 05:19:08 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 2 measured latest ctl:-31952 ext:2048 capped median ctl:-77 ext:-77
Feb 28 05:19:08 RuckusAP_Level_3 user.warn kernel: wifi0: 5718302 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Feb 28 05:19:09 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 0 measured latest ctl:-112 ext:-50 capped median ctl:-102 ext:-77
Feb 28 05:19:09 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 1 measured latest ctl:-105 ext:-50 capped median ctl:-102 ext:-77
Feb 28 05:19:09 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 2 measured latest ctl:-32714 ext:29960 capped median ctl:-77 ext:-77
Feb 28 05:19:09 RuckusAP_Level_3 user.warn kernel: wifi0: 5719341 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Feb 28 05:19:10 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 0 measured latest ctl:-114 ext:-50 capped median ctl:-102 ext:-77
Feb 28 05:19:10 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 1 measured latest ctl:-105 ext:-50 capped median ctl:-102 ext:-77
Feb 28 05:19:10 RuckusAP_Level_3 user.warn kernel: NF Channel 2462 Chain 2 measured latest ctl:-31952 ext:29960 capped median ctl:-77 ext:-77
Feb 28 05:19:10 RuckusAP_Level_3 user.warn kernel: wifi0: 5719960 : stuck beacon (missed 3) scanning 0, syncbeacon 0, sc_beacons 1,sc_isCaldone: 1
Feb 28 05:20:10 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:21:15 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:22:14 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:23:10 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:24:12 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:24:49 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 7c:61:f8:f5:52:85 IEEE 802.11: disassociated
Feb 28 05:25:18 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:26:18 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:27:19 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:27:34 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: disassociated
Feb 28 05:28:17 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:29:16 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:29:22 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: associated
Feb 28 05:29:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 2/4 Pairwise with unexpected replay counter
Feb 28 05:29:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key 4/4 Pairwise with unexpected replay counter
Feb 28 05:29:22 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: pairwise key handshake completed (RSN)
Feb 28 05:30:23 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:31:30 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:32:31 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:33:05 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 IEEE 802.11: associated
Feb 28 05:33:06 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 WPA: pairwise key handshake completed (RSN)
Feb 28 05:33:07 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=101 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=24:f0:94:e1:c5:d3) (pkt-rsc:6 k->rsc[0]:7
Feb 28 05:33:36 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:34:45 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:35:53 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:36:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 78:7b:8a:ef:0f:72 IEEE 802.11: associated
Feb 28 05:36:39 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 78:7b:8a:ef:0f:72 WPA: pairwise key handshake completed (RSN)
Feb 28 05:36:49 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:37:54 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2958 k->rsc[1]:3261
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2959 k->rsc[1]:3261
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2960 k->rsc[1]:3261
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2961 k->rsc[1]:3261
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2962 k->rsc[1]:3261
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2963 k->rsc[1]:3261
Feb 28 05:38:04 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=38 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=60:92:17:62:4b:7b) (pkt-rsc:2964 k->rsc[1]:3261
Feb 28 05:38:51 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:39:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 90:cd:b6:d1:80:0f WPA: group key handshake completed (RSN)
Feb 28 05:39:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 48:d6:d5:46:c5:14 WPA: group key handshake completed (RSN)
Feb 28 05:39:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA d4:6e:0e:02:e5:73 WPA: group key handshake completed (RSN)
Feb 28 05:39:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 70:1a:04:1c:21:14 WPA: group key handshake completed (RSN)
Feb 28 05:39:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA b8:08:cf:a8:c8:89 WPA: group key handshake completed (RSN)
Feb 28 05:39:12 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 78:7b:8a:ef:0f:72 WPA: group key handshake completed (RSN)
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA f0:27:65:d4:31:a8 WPA: group key handshake completed (RSN)
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 8c:99:e6:3c:ba:e2 WPA: group key handshake completed (RSN)
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 WPA: received EAPOL-Key with invalid MIC
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 9c:5c:f9:74:9c:d9 WPA: group key handshake completed (RSN)
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 24:f0:94:e1:c5:d3 WPA: group key handshake completed (RSN)
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan8: STA 60:d9:c7:84:79:00 WPA: group key handshake completed (RSN)
Feb 28 05:39:13 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA c0:d0:12:82:35:52 WPA: group key handshake completed (RSN)
Feb 28 05:39:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:92:17:62:4b:7b WPA: received EAPOL-Key 2/2 Group with unexpected replay counter
Feb 28 05:39:15 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 60:92:17:62:4b:7b WPA: group key handshake completed (RSN)
Feb 28 05:39:22 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=9c:5c:f9:74:9c:d9,func=domlme,line=6282,hint=domlme,rx_rssi=26,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(20804,2602537,137083,185428410)
Feb 28 05:39:22 RuckusAP_Level_3 daemon.warn Eved: STA-DISASSOC-REASON,nimac=20:ee:28:56:8a:90,func=domlme,line=6282,hint=domlme,rx_rssi=1,ack_rssi=0,reason=2,freq=2462,chan=11,stats=(141637,9208924,247701,356669233)
Feb 28 05:39:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 05:39:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 IEEE 802.11: deauthenticated due to local deauth request
Feb 28 05:39:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 9c:5c:f9:74:9c:d9 IEEE 802.11: disassociated
Feb 28 05:39:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 IEEE 802.11: disassociated
Feb 28 05:39:54 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:40:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 IEEE 802.11: associated
Feb 28 05:40:22 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 WPA: pairwise key handshake completed (RSN)
Feb 28 05:40:22 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:2 k->rsc[0]:6
Feb 28 05:40:24 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=103 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=20:ee:28:56:8a:90) (pkt-rsc:92 k->rsc[0]:93
Feb 28 05:41:02 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:42:07 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:43:06 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:44:10 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:45:17 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:46:23 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:47:27 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:48:24 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:49:32 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:50:30 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:51:36 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:52:36 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:53:45 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:54:49 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:54:53 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 4c:66:41:2f:3f:a3 IEEE 802.11: associated
Feb 28 05:54:53 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 4c:66:41:2f:3f:a3 WPA: pairwise key handshake completed (RSN)
Feb 28 05:55:41 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 5c:f9:38:8e:2d:7e IEEE 802.11: associated
Feb 28 05:55:41 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 5c:f9:38:8e:2d:7e WPA: pairwise key handshake completed (RSN)
Feb 28 05:55:55 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:56:33 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:844 k->rsc[0]:845
Feb 28 05:56:33 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:843 k->rsc[0]:845
Feb 28 05:56:33 RuckusAP_Level_3 daemon.warn Eved: MLME-REPLAYFAILURE.indication(wlan0 AES-CCM keyid=8 unicast RA:addr=c4:10:8a:18:fb:78 TA:addr=4c:66:41:2f:3f:a3) (pkt-rsc:843 k->rsc[0]:845
Feb 28 05:57:01 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:57:24 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:11 baw_end:11 seq_st:11 tidno:5
Feb 28 05:57:24 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:11 baw_end:11 seq_st:11 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:57:31 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:12 baw_end:12 seq_st:12 tidno:5
Feb 28 05:57:31 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:12 baw_end:12 seq_st:12 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:57:55 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:13 baw_end:13 seq_st:13 tidno:5
Feb 28 05:57:55 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:13 baw_end:13 seq_st:13 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:57:57 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:58:25 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:14 baw_end:14 seq_st:14 tidno:5
Feb 28 05:58:25 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:14 baw_end:14 seq_st:14 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:58:39 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:15 baw_end:15 seq_st:0 tidno:5
Feb 28 05:58:39 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:15 baw_end:15 seq_st:0 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:58:39 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:15 baw_end:15 seq_st:0 tidno:5
Feb 28 05:58:39 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:15 baw_end:15 seq_st:0 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:58:39 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:15 baw_end:15 seq_st:0 tidno:5
Feb 28 05:58:39 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:15 baw_end:15 seq_st:0 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:58:42 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:16 baw_end:16 seq_st:16 tidno:5
Feb 28 05:58:42 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:16 baw_end:16 seq_st:16 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:58:55 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:17 baw_end:17 seq_st:17 tidno:5
Feb 28 05:58:55 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:17 baw_end:17 seq_st:17 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:59:04 RuckusAP_Level_3 daemon.info hostapd: wlan0: STA 20:ee:28:56:8a:90 IEEE 802.11: disassociated
Feb 28 05:59:06 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Feb 28 05:59:25 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:18 baw_end:18 seq_st:0 tidno:5
Feb 28 05:59:25 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:1 baw_size:0 nretry:1 baw_start:18 baw_end:18 seq_st:0 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:59:25 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:18 baw_end:18 seq_st:18 tidno:5
Feb 28 05:59:25 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:18 baw_end:18 seq_st:18 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 05:59:30 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:19 baw_end:19 seq_st:19 tidno:5
Feb 28 05:59:30 RuckusAP_Level_3 user.warn kernel: !!!!BAW screewed baw_used:0 baw_size:0 nretry:0 baw_start:19 baw_end:19 seq_st:19 tidno:5 new_agg_limit:1 nretry_drops:0
Feb 28 06:00:04 RuckusAP_Level_3 local2.err syslog: Cannot notify kernel for Delete AP (65535) event, -- Address family not supported by protocol(124)
Restore previous settings