These are the logs from the Cisco WLC Controller for ADAPTIVE and ENABLED
FT set to "Adaptive"
Client made new Association to AP/BSSID BSSID AP
WLC recognizes that the client is 802.11r-capable
The WLC/AP has found from client association request Information Element that claims PMKID Caching support
The Reassociation Request from the client comes with 0 PMKID
Client has successfully cleared AP association phase
WLC/AP is sending an Association Response to the client with status code 0 = Successful association
Client will be required to Reauthenticate in 0
seconds
WLC/AP is sending EAP-Identity-Request to the client
RADIUS Server permitted access
Client will be required to Reauthenticate in 0
4-Way PTK Handshake, Sending M1
4-Way PTK Handshake, Received M2
4-Way PTK Handshake, Client did not respond with M2
4-Way PTK Handshake, Retransmitting M1 retry #1
4-Way PTK Handshake, Received M2
4-Way PTK Handshake, Client did not respond with M2
4-Way PTK Handshake, Retransmitting M1 retry #2
4-Way PTK Handshake, Received M2
4-Way PTK Handshake, Client did not respond with M2
4-Way PTK Handshake, Retransmitting M1 retry #3
4-Way PTK Handshake, Received M2
4-Way PTK Handshake, Client did not respond with M2
4-Way PTK Handshake, Retransmitting M1 retry #4
4-Way PTK Handshake, Client did not respond with M2
Client has been deauthenticated
Client expiration timer code set for 10 seconds. The reason: Roaming failed due to WLAN security policy mismatch between controllers (configuration error). It can also be used to report EAPoL retry errors, and GTK rotation failure (in 8.5)
FT set to "Enabled"
Client made new Association to AP/BSSID BSSID AP
WLC recognizes that the client is 802.11r-capable
The WLC/AP has found from client association request Information Element that claims PMKID Caching support
Client is entering the 802.1x or PSK Authentication state
Client has successfully cleared AP association phase
WLC/AP is sending an Association Response to the client with status code 0 = Successful association
Client will be required to Reauthenticate in 0
seconds
WLC/AP is sending EAP-Identity-Request to the client
Client sent EAP-Identity-Response to WLC/AP
RADIUS Server permitted access
Client will be required to Reauthenticate in 0
seconds
WLC creates a PMK cache entry for this client, which is used for FT with AKM:802.1xin this case, so the PMKID is computed with the AP MAC address
4-Way PTK Handshake, Sending M1
4-Way PTK Handshake, Received M2
4-Way PTK Handshake, Sending M3
Client has completed PSK Dot1x or WEP authentication phase
Client has entered DHCP Required state
Received DHCP request from client
WLC begins FT fast-secure roaming over-the-Air with this client and performs a type of preauthentication, because the client asks for this with FT on the Authentication frame that is sent to the new AP over-the-Air (before the Reassociation Request).
Local roaming event triggered with the new AP to which the client roams.
WLC recognizes that the client is 802.11r-capable
FT fast-secure roaming is successful for this client.
Client is entering the 802.1x or PSK Authentication state
WLC/AP is sending an Association Response to the client with status code 0 = Successful association
Client has completed PSK Dot1x or WEP authentication phase
Received DHCP request from client
Received DHCP OFFER from DHCP server
Received DHCP request from client
Received DHCP ACK from DHCP server
Client has entered RUN state
Received DHCP ACK, assigning IP Address x.x.x.x
Received DHCP ACK from DHCP server