LWAPP joining the WLC?

Dear Forum members.
I have a home based lab, with a cisco 4402 up to 50 APs, version code 5.x
a cisco 3500 xl series switch
and a LWAPP.
the switch can see the controller back and forth.
One flat VLAN all across here.
I get these error messages from the LWAPP.
*Mar  1 00:00:07.006: %LINK-3-UPDOWN: Interface FastEthernet0, changed state to up
*Mar  1 00:00:08.006: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0, changed state to up
*Mar  1 00:00:25.070: %LWAPP-5-CHANGED: LWAPP changed state to DISCOVERY
*Mar  1 00:00:58.207: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0 assigned DHCP address 192.168.10.100, mask 255.255.255.0, hostname DEMO_1242AG
*Mar  1 00:01:16.481: %LWAPP-5-CHANGED: LWAPP changed state to JOIN
*Mar  1 00:01:24.481: LWAPP_CLIENT_ERROR_DEBUG: spamHandleJoinTimer: Did not recieve the Join response
*Mar  1 00:01:24.481: LWAPP_CLIENT_ERROR_DEBUG: No more AP manager IP addresses remain.
*Mar  1 00:01:24.504: %SYS-5-RELOAD: Reload requested by LWAPP CLIENT. Reload Reason: DID NOT GET JOIN RESPONSE.
*Mar  1 00:01:24.504: %LWAPP-5-CHANGED: LWAPP changed state to DOWNXmodem file system is available.
Based on my research it has to do somehting with authentication of the AP against the AAA.
I have added the AP mac address on the controller as a trusted AP and still no luck.
Mind you I am using the WLC as a local DHCP server hence the IP address you see above (192.168.10.100)
Any ideas what the issue could be?
Thank you and i would appreciate your help on the matter.

dmantill this is what I gathered, the majority of the action is on the AP and not on the controller.
==========================
DEMO_1242AG#debug dhc
DEMO_1242AG#debug dhcp detai
DEMO_1242AG#debug dhcp detail
DHCP client activity debugging is on (detailed)
DEMO_1242AG#
Apr  4 12:10:57.289: DHCP: Try 12 to acquire address for FastEthernet0
Apr  4 12:10:57.289: DHCP: allocate request
Apr  4 12:10:57.289: DHCP: new entry. add to queue
Apr  4 12:10:57.289: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:10:57.289: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:10:57.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:10:57.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:10:57.290:    DHCP transaction id: 112F
Apr  4 12:10:57.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:10:57.290:    Next timer fires after: 00:00:04
Apr  4 12:10:57.290:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:10:57.290:    Client-ID hex dump: 00193076CC7C
Apr  4 12:10:57.290:    Hostname: DEMO_1242AG
Apr  4 12:10:57.290: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:10:57.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:10:57.291: DHCP: SDiscover 296 bytes
Apr  4 12:10:57.291:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:11:00.291: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:11:00.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:11:00.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:11:00.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:11:00.291:    DHCP transaction id: 112F
Apr  4 12:11:00.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:11:00.291:    Next timer fires after: 00:00:04
Apr  4 12:11:00.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:11:00.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:11:00.291:    Hostname: DEMO_1242AG
Apr  4 12:11:00.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:11:00.292: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:11:00.292: DHCP: SDiscover 296 bytes
Apr  4 12:11:00.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:11:04.291: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:11:04.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:11:04.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:11:04.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:11:04.291:    DHCP transaction id: 112F
Apr  4 12:11:04.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:11:04.291:    Next timer fires after: 00:00:04
Apr  4 12:11:04.291:    Retry count: 3   Client-ID: 0019.3076  de.cc7c
Apr  4 12:11:04.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:11:04.291:    Hostname: DEMO_1242AG
Apr  4 12:11:04.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:11:04.292: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:11:04.292: DHCP: SDiscover 296 bytes
Apr  4 12:11:04.292:             B'cast on FastEthernet0 interface from 0.0.0.0b
ug ip udp
UDP packet debugging is on
DEMO_1242AG#
Apr  4 12:11:08.291: DHCP: QScan: Timed out Selecting statedebug lwap
DEMO_1242AG#debug lwapp cli
DEMO_1242AG#debug lwapp client ev
DEMO_1242AG#debug lwapp client event
LWAPP Client EVENT display debugging is on
DEMO_1242AG#%Unknown DHCP problem.. No allocation possible
Apr  4 12:11:17.292: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:11:22.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:11:32.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:11:42.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:11:48.291: DHCP: QScan: Purging entry
Apr  4 12:11:48.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:11:48.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:11:48.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:11:48.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:11:48.291:    DHCP transaction id: 112F
Apr  4 12:11:48.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:11:48.291:    No timer running
Apr  4 12:11:48.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:11:48.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:11:48.291:    Hostname: DEMO_1242AG
Apr  4 12:11:52.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
DEMO_1242AG#
Apr  4 12:12:02.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
DEMO_1242AG#
Apr  4 12:12:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:12:17.292: DHCP: Try 13 to acquire address for FastEthernet0
Apr  4 12:12:17.292: DHCP: allocate request
Apr  4 12:12:17.292: DHCP: new entry. add to queue
Apr  4 12:12:17.292: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:12:17.292: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:12:17.293: Temp  sub net mask: 0.0.0.0
Apr  4 12:12:17.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:12:17.293:    DHCP transaction id: 1130
Apr  4 12:12:17.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:12:17.293:    Next timer fires after: 00:00:04
Apr  4 12:12:17.293:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:12:17.293:    Client-ID hex dump: 00193076CC7C
Apr  4 12:12:17.293:    Hostname: DEMO_1242AG
Apr  4 12:12:17.293: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:12:17.294: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:12:17.294: DHCP: SDiscover 296 bytes
Apr  4 12:12:17.294:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:12:21.290: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:12:21.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:12:21.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:12:21.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:12:21.290:    DHCP transaction id: 1130
Apr  4 12:12:21.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:12:21.291:    Next timer fires after: 00:00:04
Apr  4 12:12:21.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:12:21.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:12:21.291:    Hostname: DEMO_1242AG
Apr  4 12:12:21.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:12:21.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:12:21.291: DHCP: SDiscover 296 bytes
Apr  4 12:12:21.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:12:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:12:25.290: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:12:25.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:12:25.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:12:25.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:12:25.290:    DHCP transaction id: 1130
Apr  4 12:12:25.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:12:25.291:    Next timer fires after: 00:00:04
Apr  4 12:12:25.291:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:12:25.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:12:25.291:    Hostname: DEMO_1242AG
Apr  4 12:12:25.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:12:25.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:12:25.291: DHCP: SDiscover 296 bytes
Apr  4 12:12:25.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:12:29.290: DHCP: QScan: Timed out Selecting state
Apr  4 12:12:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:12:37.294: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:12:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:12:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:08.291: DHCP: QScan: Purging entry
Apr  4 12:13:08.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:13:08.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:08.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:08.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:13:08.291:    DHCP transaction id: 1130
Apr  4 12:13:08.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:08.291:    No timer running
Apr  4 12:13:08.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:13:08.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:08.291:    Hostname: DEMO_1242AG
Apr  4 12:13:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:37.294: DHCP: Try 14 to acquire address for FastEthernet0
Apr  4 12:13:37.294: DHCP: allocate request
Apr  4 12:13:37.294: DHCP: new entry. add to queue
Apr  4 12:13:37.294: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:13:37.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:37.295: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:37.295:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:13:37.295:    DHCP transaction id: 1131
Apr  4 12:13:37.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:37.295:    Next timer fires after: 00:00:04
Apr  4 12:13:37.295:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:13:37.295:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:37.295:    Hostname: DEMO_1242AG
Apr  4 12:13:37.295: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:13:37.296: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:13:37.296: DHCP: SDiscover 296 bytes
Apr  4 12:13:37.296:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:13:41.290: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:13:41.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:41.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:41.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:13:41.290:    DHCP transaction id: 1131
Apr  4 12:13:41.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:41.291:    Next timer fires after: 00:00:04
Apr  4 12:13:41.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:13:41.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:41.291:    Hostname: DEMO_1242AG
Apr  4 12:13:41.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:13:41.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:13:41.291: DHCP: SDiscover 296 bytes
Apr  4 12:13:41.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:13:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:45.293: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:13:45.293: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:45.293: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:45.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:13:45.293:    DHCP transaction id: 1131
Apr  4 12:13:45.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:45.293:    Next timer fires after: 00:00:04
Apr  4 12:13:45.293:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:13:45.293:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:45.293:    Hostname: DEMO_1242AG
Apr  4 12:13:45.294: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:13:45.294: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:13:45.294: DHCP: SDiscover 296 bytes
Apr  4 12:13:45.294:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:13:49.295: DHCP: QScan: Timed out Selecting state
Apr  4 12:13:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:13:57.296: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:14:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:28.294: DHCP: QScan: Purging entry
Apr  4 12:14:28.294: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:14:28.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:14:28.294: Temp  sub net mask: 0.0.0.0
Apr  4 12:14:28.294:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:14:28.295:    DHCP transaction id: 1131
Apr  4 12:14:28.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:14:28.295:    No timer running
Apr  4 12:14:28.295:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:14:28.295:    Client-ID hex dump: 00193076CC7C
Apr  4 12:14:28.295:    Hostname: DEMO_1242AG
Apr  4 12:14:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:57.295: DHCP: Try 15 to acquire address for FastEthernet0
Apr  4 12:14:57.296: DHCP: allocate request
Apr  4 12:14:57.296: DHCP: new entry. add to queue
Apr  4 12:14:57.296: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:14:57.296: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:14:57.296: Temp  sub net mask: 0.0.0.0
Apr  4 12:14:57.296:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:14:57.296:    DHCP transaction id: 1132
Apr  4 12:14:57.296:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:14:57.296:    Next timer fires after: 00:00:04
Apr  4 12:14:57.296:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:14:57.297:    Client-ID hex dump: 00193076CC7C
Apr  4 12:14:57.297:    Hostname: DEMO_1242AG
Apr  4 12:14:57.297: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:14:57.297: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:14:57.297: DHCP: SDiscover 296 bytes
Apr  4 12:14:57.297:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:15:00.299: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:15:00.299: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:15:00.299: Temp  sub net mask: 0.0.0.0
Apr  4 12:15:00.300:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:15:00.300:    DHCP transaction id: 1132
Apr  4 12:15:00.300:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:15:00.300:    Next timer fires after: 00:00:04
Apr  4 12:15:00.300:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:15:00.300:    Client-ID hex dump: 00193076CC7C
Apr  4 12:15:00.300:    Hostname: DEMO_1242AG
Apr  4 12:15:00.300: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:15:00.301: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:15:00.301: DHCP: SDiscover 296 bytes
Apr  4 12:15:00.301:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:15:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:04.301: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:15:04.301: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:15:04.302: Temp  sub net mask: 0.0.0.0
Apr  4 12:15:04.302:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:15:04.302:    DHCP transaction id: 1132
Apr  4 12:15:04.302:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:15:04.302:    Next timer fires after: 00:00:04
Apr  4 12:15:04.302:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:15:04.302:    Client-ID hex dump: 00193076CC7C
Apr  4 12:15:04.302:    Hostname: DEMO_1242AG
Apr  4 12:15:04.302: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:15:04.303: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:15:04.303: DHCP: SDiscover 296 bytes
Apr  4 12:15:04.303:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:15:08.303: DHCP: QScan: Timed out Selecting state
Apr  4 12:15:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:15:17.303: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:15:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:48.303: DHCP: QScan: Purging entry
Apr  4 12:15:48.303: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:15:48.303: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:15:48.303: Temp  sub net mask: 0.0.0.0
Apr  4 12:15:48.303:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:15:48.303:    DHCP transaction id: 1132
Apr  4 12:15:48.303:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:15:48.303:    No timer running
Apr  4 12:15:48.303:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:15:48.303:    Client-ID hex dump: 00193076CC7C
Apr  4 12:15:48.303:    Hostname: DEMO_1242AG
Apr  4 12:15:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:17.303: DHCP: Try 16 to acquire address for FastEthernet0
Apr  4 12:16:17.304: DHCP: allocate request
Apr  4 12:16:17.304: DHCP: new entry. add to queue
Apr  4 12:16:17.304: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:16:17.304: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:16:17.304: Temp  sub net mask: 0.0.0.0
Apr  4 12:16:17.304:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:16:17.304:    DHCP transaction id: 1133
Apr  4 12:16:17.304:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:16:17.304:    Next timer fires after: 00:00:04
Apr  4 12:16:17.304:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:16:17.305:    Client-ID hex dump: 00193076CC7C
Apr  4 12:16:17.305:    Hostname: DEMO_1242AG
Apr  4 12:16:17.305: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:16:17.305: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:16:17.305: DHCP: SDiscover 296 bytes
Apr  4 12:16:17.305:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:16:20.307: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:16:20.307: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:16:20.307: Temp  sub net mask: 0.0.0.0
Apr  4 12:16:20.308:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:16:20.308:    DHCP transaction id: 1133
Apr  4 12:16:20.308:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:16:20.308:    Next timer fires after: 00:00:04
Apr  4 12:16:20.308:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:16:20.308:    Client-ID hex dump: 00193076CC7C
Apr  4 12:16:20.308:    Hostname: DEMO_1242AG
Apr  4 12:16:20.308: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:16:20.309: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:16:20.309: DHCP: SDiscover 296 bytes
Apr  4 12:16:20.309:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:16:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:24.309: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:16:24.309: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:16:24.310: Temp  sub net mask: 0.0.0.0
Apr  4 12:16:24.310:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:16:24.310:    DHCP transaction id: 1133
Apr  4 12:16:24.310:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:16:24.310:    Next timer fires after: 00:00:04
Apr  4 12:16:24.310:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:16:24.310:    Client-ID hex dump: 00193076CC7C
Apr  4 12:16:24.310:    Hostname: DEMO_1242AG
Apr  4 12:16:24.310: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:16:24.311: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:16:24.311: DHCP: SDiscover 296 bytes
Apr  4 12:16:24.311:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:16:28.311: DHCP: QScan: Timed out Selecting state
Apr  4 12:16:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:16:37.311: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:16:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:08.311: DHCP: QScan: Purging entry
Apr  4 12:17:08.311: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:17:08.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:08.311: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:08.311:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:17:08.312:    DHCP transaction id: 1133
Apr  4 12:17:08.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:08.312:    No timer running
Apr  4 12:17:08.312:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:17:08.312:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:08.312:    Hostname: DEMO_1242AG
Apr  4 12:17:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:37.311: DHCP: Try 17 to acquire address for FastEthernet0
Apr  4 12:17:37.311: DHCP: allocate request
Apr  4 12:17:37.311: DHCP: new entry. add to queue
Apr  4 12:17:37.311: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:17:37.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:37.312: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:37.312:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:17:37.312:    DHCP transaction id: 1134
Apr  4 12:17:37.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:37.312:    Next timer fires after: 00:00:04
Apr  4 12:17:37.312:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:17:37.312:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:37.312:    Hostname: DEMO_1242AG
Apr  4 12:17:37.312: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:17:37.313: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:17:37.313: DHCP: SDiscover 296 bytes
Apr  4 12:17:37.313:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:17:40.315: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:17:40.315: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:40.315: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:40.315:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:17:40.315:    DHCP transaction id: 1134
Apr  4 12:17:40.315:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:40.315:    Next timer fires after: 00:00:04
Apr  4 12:17:40.315:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:17:40.315:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:40.316:    Hostname: DEMO_1242AG
Apr  4 12:17:40.316: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:17:40.316: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:17:40.316: DHCP: SDiscover 296 bytes
Apr  4 12:17:40.316:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:17:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:44.317: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:17:44.317: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:44.317: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:44.317:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:17:44.317:    DHCP transaction id: 1134
Apr  4 12:17:44.317:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:44.317:    Next timer fires after: 00:00:04
Apr  4 12:17:44.317:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:17:44.318:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:44.318:    Hostname: DEMO_1242AG
Apr  4 12:17:44.318: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:17:44.318: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:17:44.318: DHCP: SDiscover 296 bytes
Apr  4 12:17:44.318:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:17:48.319: DHCP: QScan: Timed out Selecting state
Apr  4 12:17:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:17:57.319: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:18:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:18:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
DEMO_1242AG#debug dhc
DEMO_1242AG#debug dhcp detai
DEMO_1242AG#debug dhcp detail
DHCP client activity debugging is on (detailed)
DEMO_1242AG#
Apr  4 12:10:57.289: DHCP: Try 12 to acquire address for FastEthernet0
Apr  4 12:10:57.289: DHCP: allocate request
Apr  4 12:10:57.289: DHCP: new entry. add to queue
Apr  4 12:10:57.289: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:10:57.289: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:10:57.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:10:57.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:10:57.290:    DHCP transaction id: 112F
Apr  4 12:10:57.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:10:57.290:    Next timer fires after: 00:00:04
Apr  4 12:10:57.290:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:10:57.290:    Client-ID hex dump: 00193076CC7C
Apr  4 12:10:57.290:    Hostname: DEMO_1242AG
Apr  4 12:10:57.290: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:10:57.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:10:57.291: DHCP: SDiscover 296 bytes
Apr  4 12:10:57.291:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:11:00.291: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:11:00.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:11:00.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:11:00.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:11:00.291:    DHCP transaction id: 112F
Apr  4 12:11:00.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:11:00.291:    Next timer fires after: 00:00:04
Apr  4 12:11:00.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:11:00.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:11:00.291:    Hostname: DEMO_1242AG
Apr  4 12:11:00.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:11:00.292: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:11:00.292: DHCP: SDiscover 296 bytes
Apr  4 12:11:00.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:11:04.291: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:11:04.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:11:04.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:11:04.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:11:04.291:    DHCP transaction id: 112F
Apr  4 12:11:04.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:11:04.291:    Next timer fires after: 00:00:04
Apr  4 12:11:04.291:    Retry count: 3   Client-ID: 0019.3076  de.cc7c
Apr  4 12:11:04.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:11:04.291:    Hostname: DEMO_1242AG
Apr  4 12:11:04.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:11:04.292: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:11:04.292: DHCP: SDiscover 296 bytes
Apr  4 12:11:04.292:             B'cast on FastEthernet0 interface from 0.0.0.0b
ug ip udp
UDP packet debugging is on
DEMO_1242AG#
Apr  4 12:11:08.291: DHCP: QScan: Timed out Selecting statedebug lwap
DEMO_1242AG#debug lwapp cli
DEMO_1242AG#debug lwapp client ev
DEMO_1242AG#debug lwapp client event
LWAPP Client EVENT display debugging is on
DEMO_1242AG#%Unknown DHCP problem.. No allocation possible
Apr  4 12:11:17.292: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:11:22.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:11:32.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:11:42.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:11:48.291: DHCP: QScan: Purging entry
Apr  4 12:11:48.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:11:48.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:11:48.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:11:48.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:11:48.291:    DHCP transaction id: 112F
Apr  4 12:11:48.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:11:48.291:    No timer running
Apr  4 12:11:48.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:11:48.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:11:48.291:    Hostname: DEMO_1242AG
Apr  4 12:11:52.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
DEMO_1242AG#
Apr  4 12:12:02.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
DEMO_1242AG#
Apr  4 12:12:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:12:17.292: DHCP: Try 13 to acquire address for FastEthernet0
Apr  4 12:12:17.292: DHCP: allocate request
Apr  4 12:12:17.292: DHCP: new entry. add to queue
Apr  4 12:12:17.292: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:12:17.292: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:12:17.293: Temp  sub net mask: 0.0.0.0
Apr  4 12:12:17.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:12:17.293:    DHCP transaction id: 1130
Apr  4 12:12:17.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:12:17.293:    Next timer fires after: 00:00:04
Apr  4 12:12:17.293:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:12:17.293:    Client-ID hex dump: 00193076CC7C
Apr  4 12:12:17.293:    Hostname: DEMO_1242AG
Apr  4 12:12:17.293: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:12:17.294: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:12:17.294: DHCP: SDiscover 296 bytes
Apr  4 12:12:17.294:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:12:21.290: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:12:21.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:12:21.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:12:21.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:12:21.290:    DHCP transaction id: 1130
Apr  4 12:12:21.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:12:21.291:    Next timer fires after: 00:00:04
Apr  4 12:12:21.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:12:21.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:12:21.291:    Hostname: DEMO_1242AG
Apr  4 12:12:21.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:12:21.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:12:21.291: DHCP: SDiscover 296 bytes
Apr  4 12:12:21.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:12:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:12:25.290: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:12:25.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:12:25.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:12:25.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:12:25.290:    DHCP transaction id: 1130
Apr  4 12:12:25.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:12:25.291:    Next timer fires after: 00:00:04
Apr  4 12:12:25.291:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:12:25.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:12:25.291:    Hostname: DEMO_1242AG
Apr  4 12:12:25.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:12:25.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:12:25.291: DHCP: SDiscover 296 bytes
Apr  4 12:12:25.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:12:29.290: DHCP: QScan: Timed out Selecting state
Apr  4 12:12:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:12:37.294: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:12:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:12:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:08.291: DHCP: QScan: Purging entry
Apr  4 12:13:08.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:13:08.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:08.291: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:08.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:13:08.291:    DHCP transaction id: 1130
Apr  4 12:13:08.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:08.291:    No timer running
Apr  4 12:13:08.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:13:08.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:08.291:    Hostname: DEMO_1242AG
Apr  4 12:13:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:37.294: DHCP: Try 14 to acquire address for FastEthernet0
Apr  4 12:13:37.294: DHCP: allocate request
Apr  4 12:13:37.294: DHCP: new entry. add to queue
Apr  4 12:13:37.294: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:13:37.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:37.295: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:37.295:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:13:37.295:    DHCP transaction id: 1131
Apr  4 12:13:37.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:37.295:    Next timer fires after: 00:00:04
Apr  4 12:13:37.295:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:13:37.295:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:37.295:    Hostname: DEMO_1242AG
Apr  4 12:13:37.295: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:13:37.296: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:13:37.296: DHCP: SDiscover 296 bytes
Apr  4 12:13:37.296:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:13:41.290: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:13:41.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:41.290: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:41.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:13:41.290:    DHCP transaction id: 1131
Apr  4 12:13:41.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:41.291:    Next timer fires after: 00:00:04
Apr  4 12:13:41.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:13:41.291:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:41.291:    Hostname: DEMO_1242AG
Apr  4 12:13:41.291: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:13:41.291: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:13:41.291: DHCP: SDiscover 296 bytes
Apr  4 12:13:41.292:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:13:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:13:45.293: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:13:45.293: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:13:45.293: Temp  sub net mask: 0.0.0.0
Apr  4 12:13:45.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:13:45.293:    DHCP transaction id: 1131
Apr  4 12:13:45.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:13:45.293:    Next timer fires after: 00:00:04
Apr  4 12:13:45.293:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:13:45.293:    Client-ID hex dump: 00193076CC7C
Apr  4 12:13:45.293:    Hostname: DEMO_1242AG
Apr  4 12:13:45.294: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:13:45.294: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:13:45.294: DHCP: SDiscover 296 bytes
Apr  4 12:13:45.294:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:13:49.295: DHCP: QScan: Timed out Selecting state
Apr  4 12:13:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:13:57.296: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:14:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:28.294: DHCP: QScan: Purging entry
Apr  4 12:14:28.294: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:14:28.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:14:28.294: Temp  sub net mask: 0.0.0.0
Apr  4 12:14:28.294:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:14:28.295:    DHCP transaction id: 1131
Apr  4 12:14:28.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:14:28.295:    No timer running
Apr  4 12:14:28.295:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:14:28.295:    Client-ID hex dump: 00193076CC7C
Apr  4 12:14:28.295:    Hostname: DEMO_1242AG
Apr  4 12:14:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:14:57.295: DHCP: Try 15 to acquire address for FastEthernet0
Apr  4 12:14:57.296: DHCP: allocate request
Apr  4 12:14:57.296: DHCP: new entry. add to queue
Apr  4 12:14:57.296: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:14:57.296: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:14:57.296: Temp  sub net mask: 0.0.0.0
Apr  4 12:14:57.296:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:14:57.296:    DHCP transaction id: 1132
Apr  4 12:14:57.296:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:14:57.296:    Next timer fires after: 00:00:04
Apr  4 12:14:57.296:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:14:57.297:    Client-ID hex dump: 00193076CC7C
Apr  4 12:14:57.297:    Hostname: DEMO_1242AG
Apr  4 12:14:57.297: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:14:57.297: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:14:57.297: DHCP: SDiscover 296 bytes
Apr  4 12:14:57.297:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:15:00.299: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:15:00.299: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:15:00.299: Temp  sub net mask: 0.0.0.0
Apr  4 12:15:00.300:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:15:00.300:    DHCP transaction id: 1132
Apr  4 12:15:00.300:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:15:00.300:    Next timer fires after: 00:00:04
Apr  4 12:15:00.300:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:15:00.300:    Client-ID hex dump: 00193076CC7C
Apr  4 12:15:00.300:    Hostname: DEMO_1242AG
Apr  4 12:15:00.300: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:15:00.301: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:15:00.301: DHCP: SDiscover 296 bytes
Apr  4 12:15:00.301:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:15:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:04.301: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:15:04.301: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:15:04.302: Temp  sub net mask: 0.0.0.0
Apr  4 12:15:04.302:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:15:04.302:    DHCP transaction id: 1132
Apr  4 12:15:04.302:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:15:04.302:    Next timer fires after: 00:00:04
Apr  4 12:15:04.302:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:15:04.302:    Client-ID hex dump: 00193076CC7C
Apr  4 12:15:04.302:    Hostname: DEMO_1242AG
Apr  4 12:15:04.302: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:15:04.303: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:15:04.303: DHCP: SDiscover 296 bytes
Apr  4 12:15:04.303:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:15:08.303: DHCP: QScan: Timed out Selecting state
Apr  4 12:15:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:15:17.303: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:15:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:15:48.303: DHCP: QScan: Purging entry
Apr  4 12:15:48.303: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:15:48.303: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:15:48.303: Temp  sub net mask: 0.0.0.0
Apr  4 12:15:48.303:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:15:48.303:    DHCP transaction id: 1132
Apr  4 12:15:48.303:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:15:48.303:    No timer running
Apr  4 12:15:48.303:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:15:48.303:    Client-ID hex dump: 00193076CC7C
Apr  4 12:15:48.303:    Hostname: DEMO_1242AG
Apr  4 12:15:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:17.303: DHCP: Try 16 to acquire address for FastEthernet0
Apr  4 12:16:17.304: DHCP: allocate request
Apr  4 12:16:17.304: DHCP: new entry. add to queue
Apr  4 12:16:17.304: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:16:17.304: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:16:17.304: Temp  sub net mask: 0.0.0.0
Apr  4 12:16:17.304:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:16:17.304:    DHCP transaction id: 1133
Apr  4 12:16:17.304:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:16:17.304:    Next timer fires after: 00:00:04
Apr  4 12:16:17.304:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:16:17.305:    Client-ID hex dump: 00193076CC7C
Apr  4 12:16:17.305:    Hostname: DEMO_1242AG
Apr  4 12:16:17.305: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:16:17.305: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:16:17.305: DHCP: SDiscover 296 bytes
Apr  4 12:16:17.305:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:16:20.307: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:16:20.307: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:16:20.307: Temp  sub net mask: 0.0.0.0
Apr  4 12:16:20.308:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:16:20.308:    DHCP transaction id: 1133
Apr  4 12:16:20.308:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:16:20.308:    Next timer fires after: 00:00:04
Apr  4 12:16:20.308:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:16:20.308:    Client-ID hex dump: 00193076CC7C
Apr  4 12:16:20.308:    Hostname: DEMO_1242AG
Apr  4 12:16:20.308: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:16:20.309: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:16:20.309: DHCP: SDiscover 296 bytes
Apr  4 12:16:20.309:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:16:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:24.309: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:16:24.309: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:16:24.310: Temp  sub net mask: 0.0.0.0
Apr  4 12:16:24.310:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:16:24.310:    DHCP transaction id: 1133
Apr  4 12:16:24.310:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:16:24.310:    Next timer fires after: 00:00:04
Apr  4 12:16:24.310:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:16:24.310:    Client-ID hex dump: 00193076CC7C
Apr  4 12:16:24.310:    Hostname: DEMO_1242AG
Apr  4 12:16:24.310: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:16:24.311: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:16:24.311: DHCP: SDiscover 296 bytes
Apr  4 12:16:24.311:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:16:28.311: DHCP: QScan: Timed out Selecting state
Apr  4 12:16:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:16:37.311: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:16:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:16:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:08.311: DHCP: QScan: Purging entry
Apr  4 12:17:08.311: DHCP: deleting entry 7B3098 0.0.0.0 from list
Apr  4 12:17:08.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:08.311: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:08.311:    DHCP Lease server: 0.0.0.0, state: 8 Purging
Apr  4 12:17:08.312:    DHCP transaction id: 1133
Apr  4 12:17:08.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:08.312:    No timer running
Apr  4 12:17:08.312:    Retry count: 0   Client-ID: 0019.3076.cc7c
Apr  4 12:17:08.312:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:08.312:    Hostname: DEMO_1242AG
Apr  4 12:17:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:37.311: DHCP: Try 17 to acquire address for FastEthernet0
Apr  4 12:17:37.311: DHCP: allocate request
Apr  4 12:17:37.311: DHCP: new entry. add to queue
Apr  4 12:17:37.311: DHCP: SDiscover attempt # 1 for entry:
Apr  4 12:17:37.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:37.312: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:37.312:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:17:37.312:    DHCP transaction id: 1134
Apr  4 12:17:37.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:37.312:    Next timer fires after: 00:00:04
Apr  4 12:17:37.312:    Retry count: 1   Client-ID: 0019.3076.cc7c
Apr  4 12:17:37.312:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:37.312:    Hostname: DEMO_1242AG
Apr  4 12:17:37.312: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:17:37.313: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:17:37.313: DHCP: SDiscover 296 bytes
Apr  4 12:17:37.313:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:17:40.315: DHCP: SDiscover attempt # 2 for entry:
Apr  4 12:17:40.315: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:40.315: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:40.315:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:17:40.315:    DHCP transaction id: 1134
Apr  4 12:17:40.315:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:40.315:    Next timer fires after: 00:00:04
Apr  4 12:17:40.315:    Retry count: 2   Client-ID: 0019.3076.cc7c
Apr  4 12:17:40.315:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:40.316:    Hostname: DEMO_1242AG
Apr  4 12:17:40.316: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:17:40.316: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:17:40.316: DHCP: SDiscover 296 bytes
Apr  4 12:17:40.316:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:17:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:17:44.317: DHCP: SDiscover attempt # 3 for entry:
Apr  4 12:17:44.317: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
Apr  4 12:17:44.317: Temp  sub net mask: 0.0.0.0
Apr  4 12:17:44.317:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
Apr  4 12:17:44.317:    DHCP transaction id: 1134
Apr  4 12:17:44.317:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
Apr  4 12:17:44.317:    Next timer fires after: 00:00:04
Apr  4 12:17:44.317:    Retry count: 3   Client-ID: 0019.3076.cc7c
Apr  4 12:17:44.318:    Client-ID hex dump: 00193076CC7C
Apr  4 12:17:44.318:    Hostname: DEMO_1242AG
Apr  4 12:17:44.318: DHCP: SDiscover placed class-id option: 436973636F204150206
331323430
Apr  4 12:17:44.318: DHCP: SDiscover: sending 296 byte length DHCP packet
Apr  4 12:17:44.318: DHCP: SDiscover 296 bytes
Apr  4 12:17:44.318:             B'cast on FastEthernet0 interface from 0.0.0.0
Apr  4 12:17:48.319: DHCP: QScan: Timed out Selecting state
Apr  4 12:17:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
%Unknown DHCP problem.. No allocation possible
Apr  4 12:17:57.319: DHCP: Waiting for 60 seconds on interface FastEthernet0
Apr  4 12:18:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
Apr  4 12:18:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
cover any MWAR
THIS IS FROM THER CONTROLLER  BELOW THAT IS.
=============================================
(Cisco Controller) >config se?
serial         service        sessions
(Cisco Controller) >config sessions timeout 120
(Cisco Controller) >config se?
serial         service        sessions
(Cisco Controller) >config serial timeout 120
(Cisco Controller) >debug mac addr 00:19:30:76:cc:7c
(Cisco Controller) >debug client ?
     MAC address
(Cisco Controller) >debug client 00:19:30:76:cc:7c
(Cisco Controller) >debug lwapp events enable
(Cisco Controller) >debug lwapp errors enable
(Cisco Controller) >debug pm ?
all            Used to disable all debug in policy manager module
init           Configures debug of policy manager initialization events
config         Configures debug of policy manager configuration
rules          Configures debug of layer 3 policy events
message        Configures debug of policy manager message queue events
pki            Configures debug of PKI-related events
sa-export      Configures debug of SA export (mobility)
sa-import      Configures debug of SA import (mobility)
hwcrypto       Configures debug of hardware offload events
rng            Configures debug of random number generation
ssh-pmgr       Configures debug of the policy manager policy mgr
ssh-engine     Configures debug of the policy manager engine
ssh-int        Configures debug of the policy manager interceptor
ssh-appgw      Configures debug of application gateways
ssh-tcp        Configures debug of policy manager tcp handling
ssh-l2tp       Configures debug of policy manager l2tp handling
ssh-ppp        Configures debug of policy manager ppp handling
list           Configures debug of policy manager list mgmt
ikemsg         Configures debug of IKE messages
(Cisco Controller) >debug pm pki enable
(Cisco Controller) >Mon Apr  4 12:14:58 2011: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000
Mon Apr  4 12:14:58 2011: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000

Similar Messages

  • Converted 1140 AP can't join the WLC 5508

    Hello! Please, help me to sort my problem out.
    We have bought autonomous APs   AIR-AP1141N-E-K9 and converted them to the lightweight mode, but they cannot join the WLC 5508. The errors are below. There were NO problems with the LAPs that were bought before, together with the WLC.
    AP's IP: 172.22.90.27   IOS version  12.4
    WLC's IP: 172.22.90.20   IOS version 6.0.188.0
    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    This Discussion has been converted into document:- https://supportforums.cisco.com/docs/DOC-23054
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    logs from the AP:
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:06.044: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.045: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.046: bsnInitRcbSlot: slot 1 has NO radio
    *Oct 13 21:37:06.056: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to a
    dministratively down
    *Oct 13 21:37:06.066: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to r
    eset
    *Oct 13 21:37:06.098: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:15.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLL
    ER
    *Oct 13 21:37:24.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
    LER
    *Oct 13 21:37:34.060: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.822: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:34.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.824: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap p
    acket from 172.22.90.20
    *Oct 13 21:39:33.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:39:34.000: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.001: %DTLS-5-PEER_DISCONNECT: Peer 172.22.90.20 has closed conn
    ection.
    *Oct 13 21:38:34.001: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:38:34.001: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination
    *Oct 13 21:38:34.125: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    logs from the WLC:
    debug capwap events enable
    *Dec 21 15:02:06.244: 68:bc:0c:63:3d:a0 DTLS keys for Control Plane deleted successfully for AP 172.22.90.27
      *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 DTLS connection closed event receivedserver (172:22:90:20/5246) client (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Entry exists for AP (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    Ble
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 capwap_ac_platform.c:1223 - Operation State 0 ===> 4
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 Register LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
      *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join Version: = 100711424
    *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Maximum Msg element len = 93
    debug capwap errors enable
    *Dec 21 16:16:51.879: 68:bc:0c:63:3d:a0 DTLS connection was closed
    *Dec 21 16:17:09.940: 68:bc:0c:63:3d:a0 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =5
    debug capwap detail enable
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 packet received of length 281 from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Msg Type = 3 Capwap state = 5
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: Result Code message element len = 8
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 1. 47 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 2. 232 3
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 3. 6 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 4. 12 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Descriptor message element len = 48
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 acName = Wi-Fi_Controller
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Name message element len = 68
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: WTP Radio Information message element len = 77
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Control IPV4 Address len = 87
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Sending encrypted packet to AP 172:22:90:27 (21078)
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Releasing WTP
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21077
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 DTLS connection 0x167c8b20 closed by controller
    *Dec 21 16:24:12.212: DTL Deleting AP 9 - 0.0.0.0
    *Dec 21 16:24:12.214: CAPWAP DTLS connection closed msg
    *Dec 21 16:24:12.216: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.216: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.218: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.220: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.222: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.224: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.226: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.228: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.228: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.230: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.232: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.234: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.236: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Deleting and removing AP 68:bc:0c:63:3d:a0 from fast path
    P.S. The time is set to the WLC with the NTP
    P.P.S. Don't lookup at the time the logs were made - they were made not during the same day/time

    I have solved this as soon as published my problem!!!
    the answer is published here:
    https://supportforums.cisco.com/thread/2004491
    especially in the post of Matthew Fowler
    Hi,
    Please take a look at CSCte01087.
    I see that your WLC is 10.0.13.5 and your AP is 10.0.13.28/24 so they are on the same subnet. I also see your AP MAC address does not begin with 00. This is why I believe it is relevant.
    Please try the workaround or open a TAC case if you need a fix.
    -Matt
    Symptom:
    An access point running 6.0.188.0 code may be unable to join a WLC5508.
    Messages similar to the following will be seen on the AP.
       %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
       %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
    Conditions:
    At least one of the following conditions pertains:
    - The high order byte of the AP's MAC address is nonzero, and the AP is in
    the same subnet as the WLC5508's management (or AP manager) interface
    - The WLC's management (or AP manager) interface's default gateway's
    MAC address' high order byte is nonzero.
    Workaround:
    If the MAC address of the WLC's default gateway does not begin with 00,
    and if all of the APs' MAC addresses begin with 00, then: you can put
    the APs into the same subnet as the WLC's management (or AP manager)
    interface.
    In the general case, for the situation where the WLC's default gateway's
    MAC does not begin with 00, you can address this by changing it to begin
    with 00. Some methods for doing this include:
    -- use the "mac-address" command on the gateway, to set a MAC address
    that begins with 00
    -- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
    IP as the WLC's gateway.
    For the case where the APs' MAC addresses do not begin with 00, then make
    sure that they are *not* in the same subnet as the WLC's management
    (AP manager) interface, but are behind a router.
    Another workaround is to downgrade to 6.0.182.0.  However, after
    downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
    (i.e. 12.4(21a)JA2) still installed on them will be unable to join.
    Therefore, after downgrading the WLC, the APs will need to have a
    pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.
    different vlan!!!! yes! thank you Matthew Fowler sooooo much!!!!

  • Ap won't join the WLC

    Hello Guys,
    I have converted ap 1131 from autonomous to lwapp successfully by using upgrade utility tool but the AP does not join the WLC 2106. I can see it as a neighbor on the switch with no IP address. please help me.
    Thank you

    Hello Scott,
    Thank you for the reply
    Please find the attached file for the config, i found out that i have not updated the time on WLC  but i did update the time on WLC and tested for other AP and this one too wont join the WLC. The ap are located remote.
    atsg-wl1#show run | incl hostname
    hostname atsg-wl1
    atsg-wl1#test pb display
    Display of the Parameter Block
    Total Number of Records : 7
    Number of Certs : 6
    Number of Keys : 1
    atsg-wl1#term length 0
    atsg-wl1#show version | include Cisco IOS
    Cisco IOS Software, C1130 Software (C1130-K9W7-M), Version 12.3(7)JA3, RELEASE SOFTWARE (fc1)
    atsg-wl1#show controller | include Radio AIR
    Radio AIR-AP1131G, Base Address 0019.0737.02f0, BBlock version 0.00, Software version 5.80.15
    Radio AIR-AP1131A, Base Address 0019.073b.02d0, BBlock version 0.00, Software version 5.80.15
    atsg-wl1#show controllers d0 | include Current
    Current Frequency: 2447 MHz  Channel 8
    Current CCK Power: 14 dBm
    Current OFDM Power: 14 dBm
    Current Rates:  basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    atsg-wl1#show controllers d1 | include Current
    Current Frequency: 5805 MHz  Channel 161
    Current Power: 17 dBm
    Current Rates:  basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
    atsg-wl1#show run | include station-role
    station-role root
    station-role root
    atsg-wl1#test pb disp
    Display of the Parameter Block
    Total Number of Records : 7
    Number of Certs : 6
    Number of Keys : 1
    atsg-wl1#show int F0 | include address
      Hardware is PowerPCElvis Ethernet, address is 0019.555f.ccfa (bia 0019.555f.ccfa)
    atsg-wl1#show int | include Dot11Radio
    Dot11Radio0 is up, line protocol is up
    Dot11Radio1 is up, line protocol is up
    atsg-wl1#show sntp | exclude SNTP
    10.148.0.1         16        1        never     
    172.16.21.57       16        1        never     
    Broadcast client mode is enabled.
    atsg-wl1#show run
    Building configuration...
    Current configuration : 6025 bytes
    ! Last configuration change at 19:35:46 UTC Thu Jan 31 2013 by didata
    ! NVRAM config last updated at 19:13:48 UTC Fri Feb 1 2013 by didata
    version 12.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime localtime
    service password-encryption
    hostname atsg-wl1
    logging buffered informational
    logging console informational
    enable secret 5
    ip subnet-zero
    ip domain name aspentech.com
    ip name-server 10.96.16.230
    ip name-server 10.148.0.249
    ip name-server 10.32.19.1
    aaa new-model
    aaa group server radius rad_eap
    server 10.16.16.123 auth-port 1645 acct-port 1646
    aaa authentication login default group tacacs+ local
    aaa authentication login eap_methods group rad_eap
    aaa authentication login mac_methods local
    aaa authentication enable default group tacacs+ enable
    aaa authorization exec default group tacacs+ local
    aaa authorization commands 15 default group tacacs+ local
    aaa accounting exec default start-stop group tacacs+
    aaa accounting commands 15 default start-stop group tacacs+
    aaa accounting system default start-stop group tacacs+
    aaa session-id common
    no dot11 igmp snooping-helper
    dot11 ssid
       authentication open eap eap_methods
       authentication network-eap eap_methods
       guest-mode
       infrastructure-ssid optional
    dot11 network-map
    power inline negotiation prestandard source
    usernamepassword 7
    username privilege 15 password 7
    usernamep rivilege 15 password 7
    class-map match-all _class_Protocol_301_C351
    match access-group name Voice_Over_IP_301
    class-map match-all _class_8
    match ip dscp cs1
    class-map match-all _class_0
    match ip dscp default
    class-map match-all _class_48
    match ip dscp cs6
    class-map match-all _class_18
    match ip dscp af21
    class-map match-all _class_24
    match ip dscp cs3
    class-map match-all _class_16
    match ip dscp cs2
    class-map match-all _class_34
    match ip dscp af41
    class-map match-all _class_26
    match ip dscp af31
    class-map match-all _class_40
    match ip dscp cs5
    class-map match-all _class_46
    match ip dscp ef
    class-map match-all _class_56
    match ip dscp cs7
    class-map match-all _class_10
    match ip dscp af11
    class-map match-all _class_32
    match ip dscp cs4
    policy-map _policy_Voice_Over_IP_202
    class _class_Protocol_301_C351
      set cos 6
    policy-map _policy_fallback_policy
    class _class_0
      set cos 0
    class _class_8
      set cos 1
    class _class_10
      set cos 1
    class _class_16
      set cos 2
    class _class_18
      set cos 2
    class _class_24
      set cos 3
    class _class_26
      set cos 3
    class _class_32
      set cos 4
    class _class_34
      set cos 4
    class _class_40
      set cos 5
    class _class_46
      set cos 5
    class _class_48
      set cos 6
    class _class_56
      set cos 7
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    shutdown
    encryption mode wep mandatory mic key-hash
    broadcast-key change 900
    ssid
    traffic-class background cw-min 5 cw-max 8 fixed-slot 2
    traffic-class best-effort cw-min 5 cw-max 8 fixed-slot 6
    traffic-class video cw-min 4 cw-max 6 fixed-slot 1
    traffic-class voice cw-min 3 cw-max 7 fixed-slot 1
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    packet retries 32
    fragment-threshold 2338
    station-role root
    rts threshold 2339
    rts retries 32
    world-mode legacy
    no cdp enable
    infrastructure-client
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface Dot11Radio1
    no ip address
    no ip route-cache
    shutdown
    encryption mode wep mandatory mic key-hash
    broadcast-key change 900
    ssid aspen100abcdefgh
    speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
    station-role root
    world-mode legacy
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    duplex auto
    speed auto
    bridge-group 1
    no bridge-group 1 source-learning
    bridge-group 1 spanning-disabled
    interface BVI1
    ip address 10.148.0.7 255.255.255.0
    no ip route-cache
    ip default-gateway 10.148.0.1
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip tacacs source-interface BVI1
    ip radius source-interface BVI1
    ip access-list extended Voice_Over_IP_300
    permit 119 any any
    permit ip any any
    ip access-list extended Voice_Over_IP_301
    permit 119 any any
    permit ip any any
    logging facility local0
    snmp-server view iso_view iso included
    snmp-server community admin view iso_view RW
    snmp-server community all4114all view iso_view RW
    snmp-server community ddbos2000 RO
    snmp-server location ATSG
    snmp-server contact James Lee
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps disassociate
    snmp-server enable traps deauthenticate
    snmp-server enable traps authenticate-fail
    snmp-server enable traps config
    snmp-server enable traps syslog
    snmp-server host 192.135.137.12 ddbos2000
    tacacs-server host 10.16.16.123 key 7
    tacacs-server host 10.96.16.245 key 7
    tacacs-server directed-request
    radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
    radius-server deadtime 120
    radius-server vsa send accounting
    radius-server vsa send authentication
    control-plane
    bridge 1 route ip
    line con 0
    transport preferred all
    transport output all
    stopbits 1
    line vty 0 4
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    line vty 5 15
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    end
    atsg-wl1#show run | incl hostname
    hostname atsg-wl1
    atsg-wl1#arch down /over /create-space  tftp://10.148.0.118/images/c1130-rcvk                                                                    $over /create-space  tftp://10.148.0.118/images/c1130-rcvk9                  w8-tar.12                                                                   te-space  tftp://10.148.0.118/images/c1130-rcvk9w8-tar.123                  -11.JX1.t                                                                  ftp://10.148.0.118/images/c1130-rcvk9w8-tar.123-11.JX1.ta                  r
    examining image...
    Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
    extracting info (273 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    [OK - 1873920 bytes]
    Image info:
        Version Suffix: rcvk9w8-
        Image Name: c1130-rcvk9w8-mx
        Version Directory: c1130-rcvk9w8-mx
        Ios Image Size: 1874432
        Total Image Size: 1874432
        Image Feature: WIRELESS LAN|LWAPP|RECOVERY
        Image Family: C1130
        Wireless Switch Management Version: 3.0.51.0
    Extracting files...
    Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
    extracting info (273 bytes)
    c1130-rcvk9w8-mx/ (directory) 0 (bytes)
    extracting c1130-rcvk9w8-mx/c1130-rcvk9w8-mx (1867816 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    extracting c1130-rcvk9w8-mx/info (273 bytes)
    extracting info.ver (273 bytes)!
    [OK - 1873920 bytes]
    Deleting current version...
    Deleting flash:/c1130-k9w7-mx.123-7.JA3...done.
    New software image installed in flash:/c1130-rcvk9w8-mx
    Configuring system to use new image...done.
    atsg-wl1#show archive status
    SUCCESS: Upgrade complete.
    atsg-wl1#write erase
    Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
    [OK]
    Erase of nvram: complete
    atsg-wl1#dir flash:
    Directory of flash:/
        2  -rwx        2072  Jan 31 2013 19:36:18 +00:00  private-multiple-fs
      149  drwx         128  Jan 31 2013 19:36:11 +00:00  c1130-rcvk9w8-mx
        4  -rwx         342  Jan 31 2013 19:36:14 +00:00  env_vars
    15998976 bytes total (14126080 bytes free)
    atsg-wl1#dir nvram:
    Directory of nvram:/
       30  -rw-           0                      startup-config
       31  ----           0                      private-config
        1  -rw-           0                      ifIndex-table
        2  ----          12                      persistent-data
    32768 bytes total (30668 bytes free)
    atsg-wl1#sh crypto ca trustpoints
    atsg-wl1#sh crypto ca certificates
    atsg-wl1#terminal length 0
    atsg-wl1#show run | begin BVI1
    interface BVI1
    ip address 10.148.0.7 255.255.255.0
    no ip route-cache
    ip default-gateway 10.148.0.1
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip tacacs source-interface BVI1
    ip radius source-interface BVI1
    ip access-list extended Voice_Over_IP_300
    permit 119 any any
    permit ip any any
    ip access-list extended Voice_Over_IP_301
    permit 119 any any
    permit ip any any
    logging facility local0
    snmp-server view iso_view iso included
    snmp-server community admin view iso_view RW
    snmp-server community all4114all view iso_view RW
    snmp-server community ddbos2000 RO
    snmp-server location ATSG
    snmp-server contact James Lee
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps disassociate
    snmp-server enable traps deauthenticate
    snmp-server enable traps authenticate-fail
    snmp-server enable traps config
    snmp-server enable traps syslog
    snmp-server host 192.135.137.12 ddbos2000
    tacacs-server host 10.16.16.123 key 7
    tacacs-server host 10.96.16.245 key 7
    tacacs-server directed-request
    radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
    radius-server deadtime 120
    radius-server vsa send accounting
    radius-server vsa send authentication
    control-plane
    bridge 1 route ip
    line con 0
    transport preferred all
    transport output all
    stopbits 1
    line vty 0 4
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    line vty 5 15
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    end

  • AP 3702 not join the WLC

    Hi,
    I have two WLC 8500 working in SSO and with nat enable feature configure in management interface.
    SSO is working, but i have to configure NAT before SSO becasuse when SSO is up, ip address and nat are greyed out in managemente interface.
    Some AP's must join the controller in the private address of the management interface and others AP must join in the public ip address configured in NAT address. 
    for some reason, there are a lot of AP's that can't join the controller, i have 3 ap's joined in the public ip address and 3 ap's joined in the private ip address
    config network ap-discovery nat-only disable is already configured, from the console of one AP that can't not join i see the following:
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 212.89.5.130 peer_port: 5246
    *Sep 10 12:36:17.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Sep 10 12:36:47.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 212.89.5.130:5246
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.35.0.78 peer_port: 5246
    the AP is trying both private and public ip address to join the WLC but can't join properly.
    From the WLC console:
    debug capwap errors enable:
    *spamApTask4: Sep 10 13:13:49.837: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.13:47807)since DTLS session is not established 
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask2: Sep 10 13:13:52.103: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.11:21207)since DTLS session is not established 
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    the AP model are the same, this is not the problem, but for some reason there are AP's that have problems with the NAT configuration, if i disable NAT option, every AP with private ip address config can join the WLC.
    I've tried to break SSO, desconfigure NAT, and private ip address AP join the controller without problem.
    anybody can give me a clue?
    Regards!

    it seens like DTLS connection can't be stablished between AP and WLC.
    The AP sends discovery request
    the WLC respond with two discovery responds, the firts one, contains the public ip address of the WLC and the second one contains the private ip address.
    once discovery proccess is complete, the AP tries to send DTLS hello packet to the WLC, but this packet never arrives to WLC.
    because hello doesn't arrive, the AP sends a close notify alert to the WLC and tries to send the DTLS hello packet to the WLC private address with same result.
    the AP get into a loop trying to send DTLS hello packets to both private and public address.
    DTLS hello packet never arrive, but close notify alert arrive to WLC.
    theres is FW in the middle doing NAT, but i can understand why close notify alert packets error arrives WLC and Hello DTLS packets don't. this packets uses the same protocol UDP and the same port.
    Regards

  • APs (LAP1142N) are disconnecting after joining the WLC (5508)

    Hi,
    We are having a problem at the school I'm working at. There are 133 APs located across campus.
    They have been running for 3.5 years without any trouble.
    Recently we have been having issues with APs disconnecting at random.
    It started last week with just a couple. We got them running again, but later the same day new ones had disconnected.
    This has continued with more APs and it looks like it happens at random and it is never the same one that disconnects.
    We have a centralized support-unit that helps us with stuff like this, but they haven't come up with a solution, so I was hoping someone here had seen this behavior before.
    Today at 7AM all the APs were running, but at the time of this post 6 of them have disconnected.
    AP (130 of them):
    Product ID: AIR-LAP1142N-E-K9
    Version ID: V01
    Software Version: 7.4.100.0
    Boot version: 12.4.18.3
    IOS: 15.2(2)JB$
    Country Code: Norway (NO)
    Regulatory domains: 802.11bg:-E    802.11a:-E
    Controller:
    Cisco 5508 Wireless Controller
    Firmware: 7.4.100.0
    Recovery version: 6.0.182.0
    Temp is running at 35C
    Memory at a stable 50%
    Cores 0%/2%, 4%/2%, 3%/2%, 4%/1%, 3%/3%, 5%/2%, 0%/1%, 0%/1%, 0%/1%, 0%/1%
    Only using 4 of the ports on the controller 1-4
    Some of the error-messages I have located on the different APs that have disconnected:
    Layer 3 discovery request not received on management VLAN
    Lwapp discovery request rejected
    Just give me a shout if any other information is needed.
    - Hille

    You may be facing this bug CSCud97983
    https://tools.cisco.com/bugsearch/bug/CSCud97983
    Here are some more information about bugs we experienced with this 7.4 code
    http://mrncciew.com/2013/02/10/day-0-with-wlc-7-4-code/
    7.4MR2 (7.4.111.x) is available (pre-release image) if you want latest bug fixed image. This is specially if you are using wireless guest service & having apple iOS 7 devices.
    https://supportforums.cisco.com/docs/DOC-37334
    HTH
    Rasika
    **** Pls rate all useful responses ****

  • How to join the AP to the WLC

    Hi All,
    I am new to Cisco wireless solution and would like to ask how to add the AP to the WLC properly. All Cisco 1041 and Cisco 2500 WLC are new. I connect those AP and WLC to the switch without any VLAN tag and the AP can gain the IP address from our DHCP correctly. However, the AP 1041 could not join the WLC successfully. Here is the log. I really do not have any idea about that and hope someone can help. Many thanks.
    WLC: Cisco 2500
    IP Address: 192.168.1.225
    version: 7.4.100.0
    AP: 1041
    IP Address (DHCP): 192.168.1.195
    version: 15.2(2)JB
    I also checked the following item.
    - WLC already enable Accept Manufactured Installed Certificate (MIC) in WLC -> Security -> AP Policy
    - WLC can ping AP and vice versa
    - WLC has 5 AP license
    - All configuration are default setting
    - Tried to issued join command in AP manually but no luck "lwapp ap controller ip add 192.168.1.225"
    AP 1041 Log
    *May 16 14:02:41.145: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down*May 16 14:02:41.180: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:02:42.145: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down*May 16 14:02:42.172: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down*May 16 14:02:42.176: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset*May 16 14:02:43.197: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:02:44.197: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up*May 16 14:02:51.178: %CAPWAP-3-ERRORLOG: Go join a capwap controller *May 16 14:02:52.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.225 peer_port: 5246*May 16 14:02:52.905: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.225 peer_port: 5246*May 16 14:02:52.906: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.225
    *May 16 14:02:52.908: %CAPWAP-3-ERRORLOG: Invalid event 10 & state 5 combination.*May 16 14:02:52.908: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 10 state 5.*May 16 14:02:52.909: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller*May 16 14:02:52.909: %CAPWAP-3-ERRORLOG: Failed to process encrypted capwap packet from 192.168.1.225., 1)16 14:03:11.059: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(UNKNOWN_MESSAGE_TYPE (5)*May 16 14:03:11.059: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE*May 16 14:03:11.060: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.225:5246*May 16 14:03:11.111: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255*May 16 14:03:11.111: bsnInitRcbSlot: slot 1 has NO radio*May 16 14:03:11.132: %CAPWAP-3-ERRORLOG: Binding Config Initialization failed for binding 1*May 16 14:03:11.138: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down*May 16 14:03:11.174: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:03:12.138: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down*May 16 14:03:12.165: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down*May 16 14:03:12.170: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset*May 16 14:03:13.190: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:03:14.190: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    APbc16.65d6.7e4b#show ip int briefInterface                  IP-Address      OK? Method Status                ProtocolBVI1                       192.168.1.195   YES DHCP   up                    up      Dot11Radio0                unassigned      NO  unset  up                    up      GigabitEthernet0           unassigned      NO  unset  up                    up      GigabitEthernet0.1         unassigned      YES unset  up                    up     
    WLC 2500
    (Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.4.100.0Bootloader Version............................... 1.0.16Field Recovery Image Version..................... 1.0.0Firmware Version................................. PIC 16.0Build Type....................................... DATA + WPSSystem Name...................................... S_HK_AC_CT2504_1System Location.................................. System Contact................................... System ObjectID.................................. 1.3.6.1.4.1.9.1.1279IP Address....................................... 203.85.90.225Last Reset....................................... Power on resetSystem Up Time................................... 1 days 0 hrs 29 mins 1 secsSystem Timezone Location......................... System Stats Realtime Interval................... 5System Stats Normal Interval..................... 180
    (Cisco Controller) >show ap join stats summary allNumber of APs.............................................. 3 Base Mac             AP EthernetMac       AP Name                 IP Address         Statusbc:16:65:d6:7e:40    bc:16:65:d6:7e:40    APbc16.65d6.7e4b        192.168.1.195      Not Joinedbc:16:65:d6:7e:4b    N A                  N A                     192.168.1.195      Not Joinedf4:1f:c2:d0:bb:20    bc:16:65:d6:7e:4b    APbc16.65d6.7e4b        192.168.1.195      Not Joined
    (Cisco Controller) >show interface summary Number of Interfaces.......................... 3Interface Name                   Port Vlan Id  IP Address      Type    Ap Mgr Guest-------------------------------- ---- -------- --------------- ------- ------ -----management                       1    untagged 192.168.1.225   Static  Yes    No   virtual                          N/A  N/A      1.1.1.1         Static  No     No  
    Rgds,
    Jacky

    leolaohoo wrote:Something is missing from the output to the command "sh sysinfo".  What country code did you enable? On the AP, post the output to the command "sh version" and "sh inventory".
    Hi Leolaohoo, thanks for your prompt reply. Please it below. I am using Hong Kong as the country code in WLC. Thanks.
    WLC
    (Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.4.100.0Bootloader Version............................... 1.0.16Field Recovery Image Version..................... 1.0.0Firmware Version................................. PIC 16.0Build Type....................................... DATA + WPSSystem Name...................................... S_HK_AC_CT2504_1System Location.................................. System Contact................................... System ObjectID.................................. 1.3.6.1.4.1.9.1.1279IP Address....................................... 192.168.1.225Last Reset....................................... Power on resetSystem Up Time................................... 1 days 1 hrs 15 mins 49 secsSystem Timezone Location......................... System Stats Realtime Interval................... 5System Stats Normal Interval..................... 180--More-- or (q)uitConfigured Country............................... HK  - Hong KongOperating Environment............................ Commercial (0 to 40 C)Internal Temp Alarm Limits....................... 0 to 65 CInternal Temperature............................. +31 CExternal Temperature............................. +36 CFan Status....................................... 4100 rpmState of 802.11b Network......................... DisabledState of 802.11a Network......................... DisabledNumber of WLANs.................................. 2Number of Active Clients......................... 0Memory Current Usage............................. UnknownMemory Average Usage............................. UnknownCPU Current Usage................................ UnknownCPU Average Usage................................ UnknownBurned-in MAC Address............................ F0:29:29:88:98:20Maximum number of APs supported.................. 5
    AP
    APbc16.65d6.7e4b#show verCisco IOS Software, C1040 Software (C1140-K9W8-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems, Inc.Compiled Tue 11-Dec-12 04:03 by prod_rel_teamROM: Bootstrap program is C1040 boot loaderBOOTLDR: C1040 Boot Loader (C1140-BOOT-M) Version 12.4(23c)JA6, RELEASE SOFTWARE (fc1)APbc16.65d6.7e4b uptime is 20 hours, 32 minutesSystem returned to ROM by reloadSystem image file is "flash:/c1140-k9w8-mx.152-2.JB/c1140-k9w8-mx.152-2.JB"Last reload reason: This product contains cryptographic features and is subject to UnitedStates and local country laws governing import, export, transfer anduse. Delivery of Cisco cryptographic products does not implythird-party authority to import, export, distribute or use encryption.Importers, exporters, distributors and users are responsible forcompliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unableto comply with U.S. and local laws, return this product immediately.A summary of U.S. laws governing Cisco cryptographic products may be found at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.htmlIf you require further assistance please contact us by sending email [email protected] AIR-LAP1041N-E-K9    (PowerPC405ex) processor (revision B0) with 81910K/49152K bytes of memory.Processor board ID FGL1718S4RMPowerPC405ex CPU at 333Mhz, revision number 0x147ELast reset from reloadLWAPP image version 7.4.100.01 Gigabit Ethernet interface1 802.11 Radio32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: BC:16:65:D6:7E:4BPart Number                          : 73-14034-06PCA Assembly Number                  : 800-34273-07PCA Revision Number                  : A0PCB Serial Number                    : FOC17160EPLTop Assembly Part Number             : 800-34284-05Top Assembly Serial Number           : FGL1718S4RMTop Revision Number                  : A0Product/Model Number                 : AIR-LAP1041N-E-K9   Configuration register is 0xF
    APbc16.65d6.7e4b#show inventoryNAME: "AP1040", DESCR: "Cisco Aironet 1040 Series (IEEE 802.11n) Access Point"PID: AIR-LAP1041N-E-K9 , VID: V05, SN: FGL1718S4RM
    Thanks and Best Regards,
    Jacky

  • Trouble getting Cisco 2600 Series AP to stay joined to WLC 5508

    Hi,
    I have recently been tasked with upgrading our old Autonomous APs to LWAPs.  We have a 5508 WLC at our Virtual Co-Lo and I am using Flexconnect to accomadate local switching and dhcp at our sites.  I have upgraded over 50 APs and joined them to the controller.  These include only 1130AG and 1240AG models.  However they are working flawlessly and staying connected to the controller.  The issue I'm having is with a new batch of 2600 series APs staying connected to the controller.  I have attempted to do research into what may be causing the disconnects but have yet to find a solution.  I am using DNS to resolve the CAPWAP & LWAPP queries from the APs to the controller accross our WAN.  In reading other posts I thought it may be an issue with packets getting dropped but have had our Vendor who manages Sonicwalls at both ends of the WAN confirm for me there is no packet loss.  Below are logs I gathered using puttty from the AP & WLC.  Any help would be greatly appreciated.
    AP I'm doing the testing on:
    NAME: "AP2600", DESCR: "Cisco Aironet 2600 Series (IEEE 802.11n) Access Point"
    PID: AIR-CAP2602I-A-K9 , VID: V01, SN: FTX1740J8V1
    WLC in question:
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.3.112.0
    Bootloader Version............................... 1.0.1
    Field Recovery Image Version..................... 6.0.182.0
    Firmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27
    Build Type....................................... DATA + WPS
    System Name...................................... wificontroller
    System Location.................................. Corp
    System Contact................................... Net Engineer
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    Redundancy Mode.................................. Disabled
    IP Address....................................... 10.250.32.8
    Last Reset....................................... Software reset
    System Up Time................................... 190 days 3 hrs 34 mins 24 secs
    System Timezone Location......................... (GMT -5:00) Eastern Time (US and Canada)
    Configured Country............................... US  - United States
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    --More-- or (q)uit
    Internal Temperature............................. +38 C
    External Temperature............................. +20 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 14
    Number of Active Clients......................... 71
    Burned-in MAC Address............................ C8:9C:1D:8C:52:E0
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 100
    Here is the output that keeps on occuring as the AP joins the WLC for a brief time and then changes to standalone mode
    WT-4thFlr-AP3#
    *Dec 14 15:42:04.419: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(CAPWAP_WTP_EVENT_REQUEST
    ., 3)
    *Dec 14 15:42:11.443: %EVT-4-WRN: Write of flash:/event.capwap done
    *Dec 14 15:42:11.483: %LWAPP-3-CLIENTERRORLOG: Switching to Standalone mode
    *Dec 14 15:42:11.487: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE
    *Dec 14 15:42:11.487: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.250.32.8:5246
    *Dec 14 15:42:11.571: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Dec 14 15:42:21.575: %CAPWAP-3-ERRORLOG: Selected MWAR 'wificontroller'(index 0).
    *Dec 14 15:42:21.575: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 14 15:42:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:42:14.303: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:42:14.303: %CAPWAP-5-SENDJOIN: sending Join Request to 10.250.32.8
    *Dec 14 15:42:15.127: Starting Ethernet promiscuous mode
    *Dec 14 15:42:15.535: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Dec 14 15:42:15.667: ac_first_hop_mac - IP:10.1.2.250 Hop IP:10.1.2.250 IDB:BVI1
    *Dec 14 15:42:15.667: Setting AC first hop MAC: 0017.c575.a23c
    *Dec 14 15:42:15.855: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller wificontroller
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No LS Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.915: %LWAPP-4-CLIENTEVENTLOG: No Central Dhcp map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.915: %LWAPP-3-CLIENTERRORLOG: Switching to Connected mode
    *Dec 14 15:42:23.639: %WIDS-6-ENABLED: IDS Signature is loaded and enabled
    *Dec 14 15:42:34.615: %CLEANAIR-6-STATE: Slot 0 disabled
    *Dec 14 15:42:34.615: %CLEANAIR-6-STATE: Slot 1 disabled
    *Dec 14 15:45:43.783: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(CAPWAP_WTP_EVENT_REQUEST
    ., 11)
    *Dec 14 15:45:43.787: %LWAPP-3-CLIENTERRORLOG: Switching to Standalone mode
    *Dec 14 15:45:43.787: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE
    *Dec 14 15:45:43.787: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.250.32.8:5246
    *Dec 14 15:45:43.867: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Dec 14 15:45:53.867: %CAPWAP-3-ERRORLOG: Selected MWAR 'wificontroller'(index 0).
    *Dec 14 15:45:53.867: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 14 15:45:44.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:45:46.315: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:45:46.315: %CAPWAP-5-SENDJOIN: sending Join Request to 10.250.32.8
    *Dec 14 15:45:46.487: Starting Ethernet promiscuous mode
    *Dec 14 15:45:49.903: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Dec 14 15:45:50.031: ac_first_hop_mac - IP:10.1.2.250 Hop IP:10.1.2.250 IDB:BVI1
    *Dec 14 15:45:50.031: Setting AC first hop MAC: 0017.c575.a23c
    Here are the results of debug capwap client event on the AP:
    WT-4thFlr-AP3#debug capwap client event
    CAPWAP Client EVENT display debugging is on
    WT-4thFlr-AP3#
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:55:08.000: %CAPWAP-3-EVENTLOG: Setting time to 15:55:08 UTC Dec 14 2013
    *Dec 14 15:55:25.579: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:55:25.827: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:55:56.000: %CAPWAP-3-EVENTLOG: Setting time to 15:55:56 UTC Dec 14 2013
    *Dec 14 15:56:25.735: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:56:25.983: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:56:56.000: %CAPWAP-3-EVENTLOG: Setting time to 15:56:56 UTC Dec 14 2013
    Here are the results of debug capwap client packet detail:
    WT-4thFlr-AP3#
    *Dec 14 15:59:01.823: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.823: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:01.823:         Msg Type   : CAPWAP_ECHO_REQUEST
    *Dec 14 15:59:01.823:         Msg Length : 0
    *Dec 14 15:59:01.823:         Msg SeqNum : 44
    *Dec 14 15:59:01.823: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.831: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.831: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:01.831:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:01.831:         Msg Type   : CAPWAP_ECHO_RESPONSE
    *Dec 14 15:59:01.831:         Msg Length : 15
    *Dec 14 15:59:01.831:         Msg SeqNum : 44
    *Dec 14 15:59:01.831: 
    *Dec 14 15:59:01.831:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 11
    *Dec 14 15:59:01.831:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:01.831:
    *Dec 14 15:59:01.831:
        IE            :   UNKNOWN IE 151
    *Dec 14 15:59:01.831:     IE Length     :   5
    *Dec 14 15:59:01.831:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:01.831:
    52 AC 80 46 00
    *Dec 14 15:59:01.831: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:20.931:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:20.931:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:20.931:         Msg Length : 93
    *Dec 14 15:59:20.931:         Msg SeqNum : 38
    *Dec 14 15:59:20.931: 
    *Dec 14 15:59:20.931:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 89
    *Dec 14 15:59:20.931:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:20.931:
    *Dec 14 15:59:20.931:
        IE            :   RRM_NEIGHBOR_CTRL_PAYLOAD
    *Dec 14 15:59:20.931:     IE Length     :   83
    *Dec 14 15:59:20.931:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:20.931:
    00 0A FA 20 08 01 F4 00 07 0A FA 20 08 03 00 01
    01 00 3C 00 B4 2E 06 2E E7 B4 94 51 B2 C7 79 25
    22 FD BE 04 F6 00 00 00 00 00 00 00 00 4F 50 52
    53 2D 57 69 46 69 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 01 06 0B
    01 01 01
    *Dec 14 15:59:20.931: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:20.931:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:20.931:         Msg Length : 8
    *Dec 14 15:59:20.931:         Msg SeqNum : 38
    *Dec 14 15:59:20.931: 
    *Dec 14 15:59:20.931:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:20.931:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:20.931: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.139: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.139: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:21.139:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:21.139:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:21.139:         Msg Length : 111
    *Dec 14 15:59:21.139:         Msg SeqNum : 39
    *Dec 14 15:59:21.139: 
    *Dec 14 15:59:21.139:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 107
    *Dec 14 15:59:21.139:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:21.139:
    *Dec 14 15:59:21.139:
        IE            :   RRM_NEIGHBOR_CTRL_PAYLOAD
    *Dec 14 15:59:21.139:     IE Length     :   101
    *Dec 14 15:59:21.139:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:21.143:
    01 0A FA 20 08 01 F4 00 07 0A FA 20 08 0C 00 01
    01 00 3C 00 B4 2E 06 2E E7 B4 94 51 B2 C7 79 25
    22 FD BE 04 F6 00 00 00 00 00 00 00 00 4F 50 52
    53 2D 57 69 46 69 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 24 28 2C
    30 34 38 3C 40 95 99 9D A1 01 01 01 01 01 01 01
    01 01 01 01 01
    *Dec 14 15:59:21.143: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.143: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.143: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:21.143:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:21.143:         Msg Length : 8
    *Dec 14 15:59:21.143:         Msg SeqNum : 39
    *Dec 14 15:59:21.143: 
    *Dec 14 15:59:21.143:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:21.143:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:21.143: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.547: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.547: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:25.547:         Msg Type   : CAPWAP_WTP_EVENT_REQUEST
    *Dec 14 15:59:25.547:         Msg Length : 14
    *Dec 14 15:59:25.547:         Msg SeqNum : 45
    *Dec 14 15:59:25.547: 
    *Dec 14 15:59:25.547:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *Dec 14 15:59:25.547:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:25.547:
    *Dec 14 15:59:25.547:
        IE            :   RRM_LOAD_DATA_PAYLOAD
    *Dec 14 15:59:25.547:     IE Length     :   4
    *Dec 14 15:59:25.547:          slot 0 rxLoad 0 txLoad 0 ccaLoad 33
    *Dec 14 15:59:25.547: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.555: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.555: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:25.555:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:25.555:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:25.555:         Msg Length : 0
    *Dec 14 15:59:25.555:         Msg SeqNum : 45
    *Dec 14 15:59:25.555: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.795: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.795: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:25.795:         Msg Type   : CAPWAP_WTP_EVENT_REQUEST
    *Dec 14 15:59:25.795:         Msg Length : 14
    *Dec 14 15:59:25.795:         Msg SeqNum : 46
    *Dec 14 15:59:25.795: 
    *Dec 14 15:59:25.795:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *Dec 14 15:59:25.795:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:25.795:
    *Dec 14 15:59:25.795:
        IE            :   RRM_LOAD_DATA_PAYLOAD
    *Dec 14 15:59:25.795:     IE Length     :   4
    *Dec 14 15:59:25.795:          slot 1 rxLoad 0 txLoad 0 ccaLoad 0
    *Dec 14 15:59:25.795: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.803: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.803: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:25.803:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:25.803:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:25.803:         Msg Length : 0
    *Dec 14 15:59:25.803:         Msg SeqNum : 46
    *Dec 14 15:59:25.803: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:30.375:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:30.375:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:30.375:         Msg Length : 17
    *Dec 14 15:59:30.375:         Msg SeqNum : 40
    *Dec 14 15:59:30.375: 
    *Dec 14 15:59:30.375:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 13
    *Dec 14 15:59:30.375:         Vendor Identifier  : 0x00409600
            SlotId                  :   0
            Mobile Mac Addr         :   BC:52:B7:E3:17:CB
    *Dec 14 15:59:30.375: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:30.375:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:30.379:         Msg Length : 8
    *Dec 14 15:59:30.379:         Msg SeqNum : 40
    *Dec 14 15:59:30.379: 
    *Dec 14 15:59:30.379:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:30.379:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:30.379: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.387: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.387: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:30.387:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:30.387:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:30.387:         Msg Length : 0
    *Dec 14 15:59:30.387:         Msg SeqNum : 47
    *Dec 14 15:59:30.387: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.387: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.387: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 16:00:00.387:         Msg Type   : CAPWAP_ECHO_REQUEST
    *Dec 14 16:00:00.387:         Msg Length : 0
    *Dec 14 16:00:00.387:         Msg SeqNum : 48
    *Dec 14 16:00:00.387: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.395: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.395: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 16:00:00.395:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 16:00:00.395:         Msg Type   : CAPWAP_ECHO_RESPONSE
    *Dec 14 16:00:00.395:         Msg Length : 15
    *Dec 14 16:00:00.395:         Msg SeqNum : 48
    *Dec 14 16:00:00.395: 
    *Dec 14 16:00:00.395:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 11
    *Dec 14 16:00:00.395:         Vendor Identifier  : 0x00409600
    *Dec 14 16:00:00.395:
    *Dec 14 16:00:00.395:
        IE            :   UNKNOWN IE 151
    *Dec 14 16:00:00.395:     IE Length     :   5
    *Dec 14 16:00:00.395:     Decode routine not available, Printing Hex Dump
    *Dec 14 16:00:00.395:
    52 AC 80 81 00
    *Dec 14 16:00:00.395: <<<<  End of CAPWAP Packet  >>>>

    Under my AP Policies I only have "Accept Manufactured Installed Certificate (MIC)" checked.  I attempted to add the AP based on MAC Address (c0:67:af:6f:25:70) with this certificate type but still have the same issue.  I then ran the following debug on my controller and this is the output I recieve regarding that MAC.  I tried to cut the output short because it get's somewhat redundant but was unsure what exactly to look for in the output.  Should I be selecting a different certificate type?  I am somewhat new to wireless technologies but doing my best to pick things up so if this seems trivial please forgive my ignorance.
    debug pm pki enable
    *sshpmLscTask: Dec 14 20:42:56.450: sshpmLscTask: LSC Task received a message 4
    *spamApTask6: Dec 14 20:42:58.840: sshpmGetIssuerHandles: locking ca cert table
    *spamApTask6: Dec 14 20:42:58.841: sshpmGetIssuerHandles: calling x509_alloc() for user cert
    *spamApTask6: Dec 14 20:42:58.841: sshpmGetIssuerHandles: calling x509_decode()
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-c067af6f2570, [email protected]
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Mac Address in subject is c0:67:af:6f:25:70
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-c067af6f2570
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: called to evaluate
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: called to get cert for CID 282aef7e
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.845: ssphmUserCertVerify: calling x509_decode()
    *spamApTask6: Dec 14 20:42:58.856: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (current): 2013/12/15/01:42:58
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/08/25/13:01:22
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/08/25/13:11:22
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: getting cisco ID cert handle...
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: called to evaluate
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.857: sshpmFreePublicKeyHandle: called with 0x2c5f0cb8
    *spamApTask6: Dec 14 20:42:58.857: sshpmFreePublicKeyHandle: freeing public key
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: called to evaluate
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: called to get cert for CID 183fd2b6
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: called to evaluate

  • AIR-CAP3501I access point not joining the Cisco 2100 Wireless Lan controller.

    Hello All,
    I am installing a new LAP (AIR-CAP3501I ) through the wireless lan controller (AIR-WLC2112-K9) with software version 7.0. I have an external ADSL modem which will act as the DHCP server for the wireless clients and the LAP.
    Please find my network setup as below:
    The ISP ADSL modem , WLC and LAP are connected to a unmanaged POE switch. The LAP gets its power through the POE switch. When i connect the LAP and the WLC to the switch along with the ADSL modem, the LAPs are getting the ip address from the ADSL modem, however they are not joining the WLC for further process.
    ADSL Modem ip address: 192.168.1.254
    Management ip address on the LAP: 192.168.1.1 ( Assigned to port 1, untagged Vlan).
    Ap Manager ip address: 192.168.1.1 ( Assigned to the same port i.e port1, Untagged Vlan).
    The LAP is getting an IP address from the ADSL modem in the range of the DHCP scope.
    I will paste the logs very soon.
    Please let me know if i am doing anything wrong oe what will be the issue.
    Thanks in advance,
    Mohammed Ameen

    Hello All,
    Please find the logs for  "debug capwap event" from the WLC below:
    *spamReceiveTask: Sep 26 19:44:59.196: e8:04:62:0a:3f:10 Join Version: = 117465600
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 Join resp: CAPWAP Maximum Msg element len = 92
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 Join Response sent to 192.168.1.156:45510
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 CAPWAP State: Join
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 capwap_ac_platform.c:1216 - Operation State 0 ===> 4
    *apfReceiveTask: Sep 26 19:44:59.198: e8:04:62:0a:3f:10 Register LWAPP event for AP e8:04:62:0a:3f:10 slot 0
    *spamReceiveTask: Sep 26 19:44:59.341: e8:04:62:0a:d1:20 DTLS connection not found, creating new connection for 192:168:1:158 (45644) 192:168:1:2 (5246)
    *spamReceiveTask: Sep 26 19:45:00.119: e8:04:62:0a:d1:20 DTLS Session established server (192.168.1.2:5246), client (192.168.1.158:45644)
    *spamReceiveTask: Sep 26 19:45:00.119: e8:04:62:0a:d1:20 Starting wait join timer for AP: 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.121: e8:04:62:0a:d1:20 Join Request from 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.123: e8:04:62:0a:d1:20 Join Version: = 117465600
    *spamReceiveTask: Sep 26 19:45:00.123: e8:04:62:0a:d1:20 Join resp: CAPWAP Maximum Msg element len = 92
    *spamReceiveTask: Sep 26 19:45:00.124: e8:04:62:0a:d1:20 Join Response sent to 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.124: e8:04:62:0a:d1:20 CAPWAP State: Join
    *spamReceiveTask: Sep 26 19:45:00.124: e8:04:62:0a:d1:20 capwap_ac_platform.c:1216 - Operation State 0 ===> 4
    *apfReceiveTask: Sep 26 19:45:00.125: e8:04:62:0a:d1:20 Register LWAPP event for AP e8:04:62:0a:d1:20 slot 0
    *spamReceiveTask: Sep 26 19:45:00.273: e8:04:62:0a:d1:20 Configuration Status from 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.273: e8:04:62:0a:d1:20 CAPWAP State: Configure
    *spamReceiveTask: Sep 26 19:45:00.273: Invalid channel 1 spacified for the AP APf866.f2ab.24b6, slotId = 0
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Updating IP info for AP e8:04:62:0a:d1:20 -- static 0, 192.168.1.158/255.255.255.0, gtw 192.168.1.254
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Updating IP 192.168.1.158 ===> 192.168.1.158 for AP e8:04:62:0a:d1:20
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Setting MTU to 1485
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Finding DTLS connection to delete for AP (192:168:1:158/45644)
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Disconnecting DTLS Capwap-Ctrl session 0xa06d6a4 for AP (192:168:1:158/45644)
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 CAPWAP State: Dtls tear down
    *spamReceiveTask: Sep 26 19:45:00.277: spamProcessGlobalPathMtuUpdate: Changing Global LRAD MTU to 576
    *spamReceiveTask: Sep 26 19:45:00.277: e8:04:62:0a:d1:20 DTLS connection closed event receivedserver (192:168:1:2/5246) client 192:168:1:158/45644).
    The Acess point joins the Controller for 2-3 seconds and then unjoins again. I am not sure what i am doing wrong here. The access points are getting the IPs from the ADSL modem through the switch, then it talks to the WLC, however it does not join the controller for further process.
    Note:
    The Managemnet interface and the AP manager interface are assigned to the same port 1 with unassigned Vlan as mention above.

  • Aironet 1200 LWAPP Conversion and WLC Authorization Issues

    Please excuse the length of this.
    I am trying to convert several Aironet 1200 series APs to the LWAPP Recovery image and register them with a WLC. There is no WCS involved.
    All of the 1200s have b/g cards in them, specifically MP21G and MP31G, so per the "Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode" guide, I am good. The 1200s are older and obviously do not have the manufacturer certificate.
    The WLC is running the latest code, AIR-WLC4400-K9-3-2-116-21.aes.
    The APs are running 12.3(7)JA2 or 12.3(7)JA3, all of which per the upgrade document and the Upgrade Tool utility meet the minimum requirements being 12.(7)JA or greater.
    I will first dive into the disaster of the conversion process.
    First, I upgraded a 1200 with a MP21G radio module. As far as the Upgrade Tool, I specified everything mandatory (AP credential file, recovery image, time source) while leaving the WLC and DNS server information absent. It successfully loaded the image and created all the necessary keys. Soon after I upgraded the image, the AP started rebooting continuously. I downgraded the AP to IOS, and found that the AP no longer has visibility of it’s radio module. It is simply gone. I upgraded and downgraded the code on the AP, hoping in the process that it would rediscover the radio module but it never did. I have not taken it apart yet to see if there is anything physically wrong and I will, but it was working fine previously, so even though it is possible that the radio module has checked out, my mind just can’t go there. Scratch one.
    So, AP number two has the same hardware. After attempting to convert it seven times with complete failure, on the eighth it successfully converted. I changed nothing is the upgrade process. Cool. So, with this success, I wanted to add it to WLC.
    Network overview: the AP and WLC (Management and AP-Manager) are in the same broadcast domain.
    Ok, the WLC configuration. The WLC is in Layer 3 mode which per the documentation is the only supported configuration that the converted Aironet APs will support. The Management and AP-Manager interfaces have been defined and are up and pingable by the converted AP. The AP information (AP MAC address, SSC, SHA key hash) has been entered in the WLC AP Authorization list as well. SSC certificates have been allowed.
    As far as DHCP options 43 and 60, none have been defined. Per the documentation, even if the WLC Controller is in Layer 3 mode, as long as the AP is in the same broadcast domain, the AP should do a LWAPP discovery and make a join request to the controller. Again, the AP can ping both the Managment and AP-Manager interfaces.
    So far, the AP has not been able to join the WLC. There is nothing in the logs. I have failed to do a debug on the WLC to see what is going on, but one thing I have seen is on the AP debug, a “AP-Manager not enough interfaces” message.
    All the documentation I have been referring to is the "Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode" guide.
    I will put the AP on a different segment tomorrow and try the DHCP route.
    It is probably something simple.
    Any ideas? :)

    Jason
    From your post I belive you've done everything the right way...excetp: Have you activated Master Controller Mode? If you haven't, no AP is ever gonna be able to register with a controller. You need to activate it temporarily when you want to add new (converted only?) radios. Once the AP is visible on the master controller (in the Wireless tab), define the primary / secondary / tertiary controller for it. If you're finished with registering any new radios, disable it again.
    You can find it under Controller -> Master Controller Mode
    And yes...always keep the AP you want to convert in the same subnet as the management int (so you don't have to use DHCP and fumble around with the option 43 setting to find the controller). To help the Upgrade Tool work troublefree: Enable Telnet mode on the controller. Also, don't forget to enter the mgmt IP / user name / password in the Upgrade Tool. At least with this I was able to complete my upgrading and registering process successfully in my own environment.
    Hope this helps...
    Toni

  • LAP join the wrong controller

    Hello everybody,
    I have an issue with my LAP and my two WLC. I have one WLC in production and another one in test, and I want to associate the LAP with the one in test but I can't, and my LAP join the WLC in production with this messages on the LAP :
    *May 13 13:17:07.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'TESTWLC'(index 0).
    *May 13 13:17:07.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *May 13 13:16:03.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.30.117.10 peer_port: 5246
    *May 13 13:16:03.036: %CAPWAP-3-ERRORLOG: Failed to authorize controller using trust config.
    *May 13 13:16:03.036: %CAPWAP-1-SSC_CERT_AUTH_FAILED: Failed to authorize controller, SSC certificate validation failed.Peer certificate verification failed FFFFFFFF
    *May 13 13:16:03.040: %CAPWAP-3-ERRORLOG: Certificate verification failed!
    *May 13 13:16:03.040: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:447 Certificate verified failed!
    *May 13 13:16:03.040: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 172.30.117.10:5246
    *May 13 13:16:03.041: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.30.117.10:5246
    *May 13 13:16:03.042: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination.
    I have disabled certificate checking, regulatory domain are the same between WLC and LAP, my LAP(1041), my WLC are updated with the good software version and the both WLC are "Virtual" WLC.
    If you have any idea to resolve this problem, I will be happy to know it :)
    Thanks

    (Cisco Controller) >show sysinfo
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.6.110.0
    RTOS Version..................................... 7.6.110.0
    Bootloader Version............................... 7.6.110.0
    Emergency Image Version.......................... 7.6.110.0
    Build Type....................................... DATA + WPS
    System Name...................................... TESTWLC
    System Location..................................
    System Contact...................................
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
    IP Address....................................... 172.30.117.10
    System Up Time................................... 1 days 15 hrs 40 mins 5 secs
    System Timezone Location......................... (GMT +1:00) Amsterdam, Berlin, Rome, Vienna
    System Stats Realtime Interval................... 5
    System Stats Normal Interval..................... 180
    Configured Country............................... LU  - Luxembourg
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 1
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ 00:50:56:94:0E:12
    Maximum number of APs supported.................. 200
    TESTLAP#sh version
    Cisco IOS Software, C1600 Software (AP1G2-K9W8-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2012 by Cisco Systems, Inc.
    Compiled Tue 11-Dec-12 04:45 by prod_rel_team
    ROM: Bootstrap program is C1600 boot loader
    BOOTLDR: C1600 Boot Loader (AP1G2-BOOT-M) LoaderVersion 15.2(2)JAX, RELEASE SOFTWARE (fc1)
    TESTLAP uptime is 15 hours, 36 minutes
    System returned to ROM by power-on
    System image file is "flash:/ap1g2-k9w8-mx.152-2.JB/ap1g2-k9w8-mx.152-2.JB"
    Last reload reason:
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    cisco AIR-CAP1602I-E-K9    (PowerPC) processor (revision B0) with 98294K/32768K bytes of memory.
    Processor board ID FGL1807S09R
    PowerPC CPU at 533Mhz, revision number 0x2151
    Last reset from power-on
    LWAPP image version 7.4.100.0
    1 Gigabit Ethernet interface
    2 802.11 Radios
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: 18:E7:28:1A:3B:1B
    Part Number                          : 73-14671-04
    PCA Assembly Number                  : 000-00000-00
    PCA Revision Number                  :
    PCB Serial Number                    : FOC18045ZD1
    Top Assembly Part Number             : 800-38552-01
    Top Assembly Serial Number           : FGL1807S09R
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-CAP1602I-E-K9
    Configuration register is 0xF
    As you can see, I use the LU country code, maybe it can be a mismatch between the WLC version and the LAP version?
    Thanks.

  • LAP1242 cannot join the WLC2500

    Hi,
    I have some LAP1242 which by mistake were bought for Mesh. I am trying to convert them to LWAPP so what I did first was to convert them to Stand Alone then to LWAPP but I cannot get the AP to join the WLC and sends several error logs.
    I attached some logs taken from AP and WLC so that you can figure out what's going on.
    I wonder if I have to remove anything from flash either on SA or LWAPP mode (I know that in some cases you have to delete privete-config in order to avoid the AP taken previous configurations). By the way I think I had never seen this c1240-k9w8-mx.124-25e.JA2 on an AP IOS before, I wonder if it has to do with the mesh thing.
    Thank you!

    Hi,
    I have done that process thousands of times but this time the APs came with an IOS for mesh and once it is back in LWAPP it still shows the mesh stuff in the flash.
    Flash Stand Alone:
    Directory of flash:/
       17  drwx         320  Jan 01 1970 00:05:46 +00:00  c1240-k9w7-mx.123-8.JEA3
        7  -rwx          62  Nov 14 2012 14:35:46 +00:00  mesh_cfg.txt
        8  -rwx        6168  Nov 14 2012 14:45:49 +00:00  private-multiple-fs
        9  -rwx       97561  Nov 14 2012 15:15:44 +00:00  event.log
       10  drwx         256  Jan 17 2013 17:52:05 +00:00  c1240-k9w8-mx.124-25e.JA2
       15  -rwx          36  Nov 14 2012 14:35:46 +00:00  mesh_port_cfg.txt
       16  drwx           0  Nov 14 2012 14:35:49 +00:00  configs
        4  -rwx         266  Jan 01 1970 00:05:52 +00:00  env_vars
    Flash LWAPP:
    Directory of flash:/
        2  -rwx         318   Mar 1 2002 00:00:06 +00:00  env_vars
        3  -rwx        6168  Nov 14 2012 14:36:04 +00:00  private-multiple-fs
        4  drwx         128  Jan 16 2013 15:11:30 +00:00  c1240-rcvk9w8-mx
        7  -rwx          62  Nov 14 2012 14:35:46 +00:00  mesh_cfg.txt
        8  -rwx           5  Jan 16 2013 15:11:56 +00:00  private-config
        9  -rwx       97561  Nov 14 2012 15:15:44 +00:00  event.log
       19  drwx         256  Jan 17 2013 21:12:38 +00:00  c1240-k9w8-mx.124-25e.JA2
       15  -rwx          36  Nov 14 2012 14:35:46 +00:00  mesh_port_cfg.txt
       16  drwx           0  Nov 14 2012 14:35:49 +00:00  configs
       10  -rwx           0  Nov 14 2012 14:36:05 +00:00  config.txt
    Logs from AP
    Jan 17 18:28:15.377: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jan 17 18:28:15.382: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jan 17 18:28:16.407: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jan 17 18:28:17.407: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jan 17 18:28:24.810: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Jan 17 18:28:26.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.2 peer_port: 5246
    *Jan 17 18:28:26.002: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jan 17 18:28:26.007: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jan 17 18:28:27.187: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jan 17 18:28:27.322: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jan 17 18:28:27.400: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.2 peer_port: 5246
    *Jan 17 18:28:27.401: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Jan 17 18:28:27.403: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jan 17 18:28:27.404: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.2
    *Jan 17 18:28:27.404: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.2:5246
    *Jan 17 18:28:27.405: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Jan 17 18:28:26.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.2 peer_port: 5246
    *Jan 17 18:28:27.330: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jan 17 18:28:27.335: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jan 17 18:28:27.340: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jan 17 18:28:27.409: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.2 peer_port: 5246
    *Jan 17 18:28:27.410: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Jan 17 18:28:27.413: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.2
    *Jan 17 18:28:27.413: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.2:5246
    Logs from WLC
    *spamApTask0: Jan 17 15:18:25.695: %LWAPP-3-RADIUS_ERR: spam_radius.c:137 The system could not send join reply, AP authorization failed; AP:6c:20:56:e8:ea:f4
    *spamApTask0: Jan 17 15:18:24.273: %LWAPP-3-RADIUS_ERR: spam_radius.c:137 The system could not send join reply, AP authorization failed; AP:6c:20:56:e8:ea:f4
    *spamApTask0: Jan 17 15:18:12.435: %LWAPP-3-RADIUS_ERR: spam_radius.c:137 The system could not send join reply, AP authorization failed; AP:6c:20:56:e8:ea:f4
    *spamApTask0: Jan 17 15:18:11.023: %LWAPP-3-RADIUS_ERR: spam_radius.c:137 The system could not send join reply, AP authorization failed; AP:6c:20:56:e8:ea:f4
    *spamApTask0: Jan 17 15:16:18.080: %LWAPP-3-ECHO_ERR: spam_tmr.c:1381 Did not receive heartbeat reply; AP: 6c:20:56:e8:ea:f4
    *spamApTask0: Jan 17 15:13:49.192: %LWAPP-3-RX_ERR3: spam_l2.c:440 The system has received LWAPP packet with invalid sequence number (got 3expected 4) - from AP 6c:20:56:e8:ea:f4
    *spamApTask0: Jan 17 15:13:45.935: %LWAPP-3-PAYLOAD_MISSING: spam_lrad.c:5730  Join request does not contain BOARD_DATA payload

  • APs join the wrong controller

    When I set up access points , for some reason some of them want to join the wrong controller. I have set the dhcpd option 43 as well as have the dns name in our server. We are running the 4.0.179.11 version of the software. Also, two access points that were on the correct switch, are now on the wrong one. Anyone have any ideas what I am missing?
    Thanks in advance.
    konrad

    Hi Konrad,
    Have a look at the methods the AP uses to determine which of the WLC's to register to;
    WLCs embed this important information in the LWAPP discovery response:
    The controller sysName
    The controller type
    The controller AP capacity and its current AP load
    The Master Controller flag
    An AP-manager IP address
    The LAP uses this information to make a controller selection, with use of these precedence rules:
    If the LAP has previously been configured with a primary, secondary, and/or tertiary controller, the LAP examines the controller sysName field (from the LWAPP discovery responses) in an attempt to find the WLC that is configured as primary. If the LAP finds a matching sysName for the primary controller, the LAP sends an LWAPP join request to that WLC. If the LAP cannot find its primary controller or if the LWAPP join fails, the LAP tries to match the secondary controller sysName to the LWAPP discovery responses. If the LAP finds a match, it then sends an LWAPP join to the secondary controller. If the secondary WLC cannot be found or the LWAPP join fails, the LAP repeats the process for its tertiary controller.
    The LAP looks at the Master Controller flag field in the LWAPP discovery responses from the candidate WLCs if one of these items is true:
    No primary, secondary, and/or tertiary controllers have been configured for an AP.
    These controllers cannot be found in the candidate list.
    The LWAPP joins to those controllers have failed.
    If a WLC is configured as a Master Controller, the LAP selects that WLC and send it an LWAPP join request.
    If the LAP cannot successfully join a WLC on the basis of the criteria in step 1 and step 2, the LAP attempts to join the WLC that has the greatest excess capacity.
    From this good doc;
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a00806c9e51.shtml
    Hope this helps!
    Rob

  • APs don't join new WLC

    Hi all,
    I had to changed our WLC due a RMA. Now the APs don't join the WLC:
    spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:25.582: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP  10:169:2:147 (15930).*spamApTask6: Mar 07 14:58:25.527: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:a3: Failed to create DTLS connection for AP  10:169:2:145 (15932).*spamApTask3: Mar 07 14:58:25.193: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:63: Failed to create DTLS connection for AP  10:169:2:160 (31527).*spamApTask5: Mar 07 14:58:25.117: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:2b: Failed to create DTLS connection for AP  10:169:2:167 (15780).*spamApTask0: Mar 07 14:58:24.971: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:d1: Failed to create DTLS connection for AP  10:169:2:177 (15935).*spamApTask7: Mar 07 14:58:24.516: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:f9: Failed to create DTLS connection for AP  10:169:2:142 (31537).*spamApTask4: Mar 07 14:58:24.345: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:bb:fb: Failed to create DTLS connection for AP  10:169:2:153 (31680).*spamApTask0: Mar 07 14:58:23.737: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:23.535: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP  10:169:2:147 (15930).
    The only way that I found to solve it has been perform a reset factory default on APs. Unfortunately the APs have not SSH, TELNET or HTTP access enabled and I haven't physical access to all the APs.
    Are there some other way to solve thas?

    Hi Joan,
    spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).
    As per logs this is the problem related to Certificate. Make sure that time setting on WLC is correct and updated.
    means Unable to create the DTLS database entry for the AP.
    Can you paste more info:
    From WLC: Sh sysinfo
    From AP: sh version
    Also paste the entire bootup process from AP console.
    Scott is right , for this kind of things you must raise a TAC case.
    Regards
    Dont forget to rate helpful posts

  • AP not joining the new WLC

    Hi,
    I have an existing setup where in i have a 4400 WLC and AP 1242 registered to it.
    I had to replace the WLC with a new 5500 WLC. I tried registering the the 1242 AP with this new controller but i'm getting the following error message:
    AP0026.0b4d.093a#
    *Apr 25 07:51:59.216: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.7.51.11:5246
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Apr 25 07:52:13.735: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLLER
    AP0026.0b4d.093a#
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    *Apr 25 07:52:22.736: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
    *Apr 25 07:52:22.736: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is not established.
    *Apr 25 07:52:22.794: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Apr 25 07:52:22.795: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 25 07:52:22.796: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 25 07:52:22.863: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
    *Apr 25 07:52:22.863: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
    *Apr 25 07:52:22.885: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Apr 25 07:52:22.885: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
    *Apr 25 07:52:22.886: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Apr 25 07:52:22.918: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Apr 25 07:52:22.918: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
    *Apr 25 07:52:22.946: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
    *Apr 25 07:52:22.947: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Apr 25 07:52:31.885: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLLER
    *Apr 25 07:52:40.886: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER
    *Apr 25 07:52:40.888:  status of voice_diag_test from WLC is false
    *Apr 25 07:52:40.889: %CAPWAP-3-ERRORLOG: Could not send primary discoveryrequest. The CAPWAP state has not moved to RUN yet
    *Apr 25 07:52:40.890: %CAPWAP-3-ERRORLOG: Could not send primary discoveryrequest. The CAPWAP state has not moved to RUN yet
    *Apr 25 07:52:40.900: %LWAPP-3-CLIENTERRORLOG: Primary Discovery Reply: received primary discovery reply when connected to a Primary/Secondary/Tertiary controller
    *Apr 25 07:52:50.887: %CAPWAP-3-ERRORLOG: Selected MWAR 'L&T-WLC-Powai'(index 0).
    *Apr 25 07:52:50.887: %CAPWAP-3-ERRORLOG: Go join a capwap controller 
    *Apr 25 13:23:03.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.16.5.3 peer_port: 5246
    *Apr 25 13:23:03.001: %CAPWAP-5-CHANGED: CAPWAP changed state to  
    *Apr 25 13:23:04.717: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.16.5.3 peer_port: 5246
    *Apr 25 13:23:04.718: %CAPWAP-5-SENDJOIN: sending Join Request to 172.16.5.3
    *Apr 25 13:23:04.718: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Apr 25 13:23:04.719: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.16.5.3
    *Apr 25 13:23:04.719: %DTLS-5-PEER_DISCONNECT: Peer 172.16.5.3 has closed connection.
    *Apr 25 13:23:04.720: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.16.5.3:5246
    *Apr 25 13:23:04.721: %CAPWAP-3-ERRORLOG: Go join a capwap controller 
    *Apr 25 07:52:41.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.7.51.11 peer_port: 5246
    *Apr 25 07:52:41.001: %CAPWAP-5-CHANGED: CAPWAP changed state to  
    *Apr 25 07:52:42.449: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.7.51.11 peer_port: 5246
    *Apr 25 07:52:42.450: %CAPWAP-5-SENDJOIN: sending Join Request to 10.7.51.11
    *Apr 25 07:52:42.450: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Apr 25 07:52:42.647: %CAPWAP-5-CHANGED: CAPWAP changed state to CFG
    *Apr 25 07:52:42.794: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Apr 25 07:52:42.807: %CAPWAP-5-CHANGED: CAPWAP changed state to UP
    *Apr 25 07:52:42.808: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Apr 25 07:52:42.879: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller WLC1-T
    *Apr 25 07:52:42.940: %LWAPP-3-CLIENTEVENTLOG: SSID LTHE-Mobile added to the slot[0]
    Writing out the event log to nvram...
    The AP is getting a close message from the new controller. What could the issue be?

    After the AP gets a close message from the new WLC, it gets re associated to the old WLC.

  • Cisco LWAPP 2602e can't join the controller

    i have a problem with a 2602e access point that he wouldn't join the controller (wlc 8510)
    i gave him the image --> p3g2-k9w8-tar.152-2.JB.tar
    we have a lot of capwap ap's but ive never had this problem before
    *Jul 19 07:53:59.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.45.29.101:5246
    *Jul 19 07:54:00.059: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Jul 19 07:54:00.067: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
    *Jul 19 07:54:00.095: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:01.067: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:01.099: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:01.107: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:54:02.127: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:03.127: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:10.095: %CAPWAP-3-ERRORLOG: Selected MWAR 'WLC041D1M120101'(index 0).
    *Jul 19 07:54:10.095: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Jul 19 07:54:10.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.45.29.101 peer_port: 5246
    *Jul 19 07:54:10.003: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:10.187: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:54:10.199: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.45.29.101 peer_port: 5246
    *Jul 19 07:54:10.199: %CAPWAP-5-SENDJOIN: sending Join Request to 10.45.29.101
    *Jul 19 07:54:10.199: %CAPWAP-3-ERRORLOG: Invalid event 10 & state 5 combination.
    *Jul 19 07:54:10.199: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 10 state 5.
    *Jul 19 07:54:11.003: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:11.031: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:11.039: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:11.047: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:54:12.067: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:13.067: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:15.199: %CAPWAP-5-SENDJOIN: sending Join Request to 10.45.29.101
    *Jul 19 07:54:15.203: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:15.211: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:54:16.203: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jul 19 07:54:16.231: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:54:17.231: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:00.155: %MESH-3-TIMER_EXPIRED: Mesh Lwapp join timer expired
    *Jul 19 07:55:00.155: %MESH-3-TIMER_EXPIRED: Mesh Lwapp join failed expired
    *Jul 19 07:55:00.155: %MESH-6-LINK_UPDOWN: Mesh station 4c4e.3563.a6bc link Down
    *Jul 19 07:55:02.155: %LINK-6-UPDOWN: Interface BVI1, changed state to down
    *Jul 19 07:55:07.655: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to down
    *Jul 19 07:55:09.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.45.29.101:5246
    *Jul 19 07:55:13.071: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
    *Jul 19 07:55:13.087: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:14.071: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jul 19 07:55:14.111: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:55:14.119: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:55:15.139: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:16.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:23.091: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:55:23.099: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:55:24.091: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jul 19 07:55:24.119: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:25.119: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:33.091: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Jul 19 07:55:33.099: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Jul 19 07:55:34.091: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Jul 19 07:55:34.119: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:35.119: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Jul 19 07:55:40.539: %MESH-6-CAPWAP_RESTART: Mesh Capwap re-started
    *Jul 19 07:55:42.539: %LINK-6-UPDOWN: Interface BVI1, changed state to up
    *Jul 19 07:55:43.087: %CAPWAP-3-ERRORLOG: Invalid event 29 & state 4 combination.
    *Jul 19 07:55:43.087: %CAPWAP-3-ERRORLOG: SM handler: Failed to process timer message. Event 29, state 4
    *Jul 19 07:55:43.087: %CAPWAP-3-ERRORLOG: Failed to handle timer message.
    *Jul 19 07:55:43.087: %CAPWAP-3-ERRORLOG: Failed to process timer message.
    *Jul 19 07:55:43.539: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
    *Jul 19 07:55:45.607: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
    *Jul 19 07:55:46.607: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down

    One is mesh the other is non mesh. So changing the code or setting up the ap as mesh would fix your issue. Either could of been the wrong ap purchased or the wrong image placed on the ap. the thing now is that you have to put the ap in local mode and delete the mesh files in flash. This will prevent the ap from still thinking its mesh.
    Sent from Cisco Technical Support iPhone App

Maybe you are looking for