|
- Jun 1 19:36:01 syslog: iapp> -e=br0, -w=br0
- Jun 1 19:36:01 syslog: iapp> -wi=rai0
- Jun 1 19:36:01 syslog: iapp> -wi=ra0
- Jun 1 19:36:01 syslog: iapp> IfNameWlanCount = 2
- Jun 1 19:36:01 iappd[474]: iapp> (ver.v1.1.0) task start...
- Jun 1 19:36:01 iappd[474]: iapp> own address (192.168.2.1)
- Jun 1 19:36:01 iappd[474]: iapp> broadcast address (192.168.2.255)
- Jun 1 19:36:01 iappd[474]: iapp> network Mask address (255.255.255.0)
- Jun 1 19:36:01 iappd[474]: iapp> (FlgIsMsgReady is TRUE)
- Jun 1 19:36:01 iappd[474]: iapp> Register ethernet interface as (br0)
- Jun 1 19:36:01 iappd[474]: iapp> Fail to get MAC of IfName[0]: rai0
- Jun 1 19:36:01 iappd[474]: iapp> Exit daemon!
- Jun 1 19:36:01 kernel: br0: port 2(ra0) entered forwarding state
- Jun 1 19:36:02 kernel: br0: port 1(eth2) entered forwarding state
- Jun 1 19:36:03 syslog: iapp> -e=br0, -w=br0
- Jun 1 19:36:03 syslog: iapp> -wi=rax0
- Jun 1 19:36:03 syslog: iapp> -wi=ra0
- Jun 1 19:36:03 syslog: iapp> IfNameWlanCount = 2
- Jun 1 19:36:03 iappd[481]: iapp> (ver.v1.1.0) task start...
- Jun 1 19:36:03 iappd[481]: iapp> own address (192.168.2.1)
- Jun 1 19:36:03 iappd[481]: iapp> broadcast address (192.168.2.255)
- Jun 1 19:36:03 iappd[481]: iapp> network Mask address (255.255.255.0)
- Jun 1 19:36:03 iappd[481]: iapp> (FlgIsMsgReady is TRUE)
- Jun 1 19:36:03 iappd[481]: iapp> Register ethernet interface as (br0)
- Jun 1 19:36:03 iappd[481]: iapp> IfName[0]: rax0
- Jun 1 19:36:03 iappd[481]: iapp> IfName[1]: ra0
- Jun 1 19:36:03 iappd[481]: iapp> Process ID = 0x1e1 (0 0)
- Jun 1 19:36:03 iappd[481]: iapp>[rax0]IOCTL Flags = 0x8404!
- Jun 1 19:36:03 iappd[481]: iapp>[rax0]IOCTL Flags = 0x840b!
- Jun 1 19:36:03 iappd[481]: iapp>[ra0]IOCTL Flags = 0x8404!
- Jun 1 19:36:03 iappd[481]: iapp>[ra0]IOCTL Flags = 0x840b!
- Jun 1 19:36:05 iappd[481]: iapp> Recvfrom RAW CMD successfully (3, 0)!
- Jun 1 19:36:05 iappd[481]: iapp> Sig = 0x50, pEvtHeader->EventLen = 8, Peer IP = 0.0.0.0
- Jun 1 19:36:05 iappd[481]: iapp> (FT_KDP_SIG_FT_ASSOCIATION) Rcv a assoc signal and send out IAPP add-notify!
- Jun 1 19:36:05 iappd[481]: iapp>[ra0]IOCTL Flags = 0x40c!
- Jun 1 19:36:05 iappd[481]: iapp> Send UDP packet ok (Len = 32)
- Jun 1 19:36:05 iappd[481]: iapp> Recvfrom UDP (len32) successfully from 192.168.2.1
- Jun 1 19:36:05 iappd[481]: iapp> Skip packet from us!
- Jun 1 19:36:11 NTP Client: Synchronizing time to ntp1.aliyun.com.
- Jun 1 19:36:40 DHCP LAN Client: bound, IP: 10.1.1.107/255.255.255.0, GW: 10.1.1.1, lease time: 86400
- Jun 1 19:36:41 NTP Client: Synchronizing time to ntp2.aliyun.com.
- Jun 1 19:36:47 NTP Client: System time changed, offset: 3.563393s
- Jun 1 19:37:44 iappd[481]: iapp> Recvfrom UDP (len32) successfully from 10.1.1.1
- Jun 1 19:37:44 iappd[481]: iapp>[rax0]IOCTL Flags = 0x40d!
- Jun 1 19:37:44 iappd[481]: iapp> IAPP SysCmd = 0
- Jun 1 19:37:44 iappd[481]: iapp> Receive IAPP_CMD_ADD_NOTIFY for xx:xx:xx:xx:xx:xx (size = 24)
- Jun 1 19:37:44 iappd[481]: iapp> Command to WLAN (OID=8408, LEN=10)
- Jun 1 19:37:44 iappd[481]: iapp>[rax0]IOCTL Flags = 0x8408!
- Jun 1 19:37:44 iappd[481]: iapp> Command to WLAN (OID=8408, LEN=10)
- Jun 1 19:37:44 iappd[481]: iapp>[ra0]IOCTL Flags = 0x8408!
- Jun 1 19:37:44 iappd[481]: iapp> Recvfrom RAW CMD successfully (3, 0)!
- Jun 1 19:37:44 iappd[481]: iapp> Sig = 0xa0, pEvtHeader->EventLen = 167, Peer IP = 10.1.1.1
- Jun 1 19:37:44 iappd[481]: iapp> FT_KDP_SecurityBlockSend to 10.1.1.1
- Jun 1 19:37:44 iappd[481]: iapp>[ra0]IOCTL Flags = 0x40c!
复制代码 Y2 AP模式
|
|