Ap won't join the WLC

Hello Guys,
I have converted ap 1131 from autonomous to lwapp successfully by using upgrade utility tool but the AP does not join the WLC 2106. I can see it as a neighbor on the switch with no IP address. please help me.
Thank you

Hello Scott,
Thank you for the reply
Please find the attached file for the config, i found out that i have not updated the time on WLC  but i did update the time on WLC and tested for other AP and this one too wont join the WLC. The ap are located remote.
atsg-wl1#show run | incl hostname
hostname atsg-wl1
atsg-wl1#test pb display
Display of the Parameter Block
Total Number of Records : 7
Number of Certs : 6
Number of Keys : 1
atsg-wl1#term length 0
atsg-wl1#show version | include Cisco IOS
Cisco IOS Software, C1130 Software (C1130-K9W7-M), Version 12.3(7)JA3, RELEASE SOFTWARE (fc1)
atsg-wl1#show controller | include Radio AIR
Radio AIR-AP1131G, Base Address 0019.0737.02f0, BBlock version 0.00, Software version 5.80.15
Radio AIR-AP1131A, Base Address 0019.073b.02d0, BBlock version 0.00, Software version 5.80.15
atsg-wl1#show controllers d0 | include Current
Current Frequency: 2447 MHz  Channel 8
Current CCK Power: 14 dBm
Current OFDM Power: 14 dBm
Current Rates:  basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
atsg-wl1#show controllers d1 | include Current
Current Frequency: 5805 MHz  Channel 161
Current Power: 17 dBm
Current Rates:  basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
atsg-wl1#show run | include station-role
station-role root
station-role root
atsg-wl1#test pb disp
Display of the Parameter Block
Total Number of Records : 7
Number of Certs : 6
Number of Keys : 1
atsg-wl1#show int F0 | include address
  Hardware is PowerPCElvis Ethernet, address is 0019.555f.ccfa (bia 0019.555f.ccfa)
atsg-wl1#show int | include Dot11Radio
Dot11Radio0 is up, line protocol is up
Dot11Radio1 is up, line protocol is up
atsg-wl1#show sntp | exclude SNTP
10.148.0.1         16        1        never     
172.16.21.57       16        1        never     
Broadcast client mode is enabled.
atsg-wl1#show run
Building configuration...
Current configuration : 6025 bytes
! Last configuration change at 19:35:46 UTC Thu Jan 31 2013 by didata
! NVRAM config last updated at 19:13:48 UTC Fri Feb 1 2013 by didata
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime localtime
service password-encryption
hostname atsg-wl1
logging buffered informational
logging console informational
enable secret 5
ip subnet-zero
ip domain name aspentech.com
ip name-server 10.96.16.230
ip name-server 10.148.0.249
ip name-server 10.32.19.1
aaa new-model
aaa group server radius rad_eap
server 10.16.16.123 auth-port 1645 acct-port 1646
aaa authentication login default group tacacs+ local
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
aaa session-id common
no dot11 igmp snooping-helper
dot11 ssid
   authentication open eap eap_methods
   authentication network-eap eap_methods
   guest-mode
   infrastructure-ssid optional
dot11 network-map
power inline negotiation prestandard source
usernamepassword 7
username privilege 15 password 7
usernamep rivilege 15 password 7
class-map match-all _class_Protocol_301_C351
match access-group name Voice_Over_IP_301
class-map match-all _class_8
match ip dscp cs1
class-map match-all _class_0
match ip dscp default
class-map match-all _class_48
match ip dscp cs6
class-map match-all _class_18
match ip dscp af21
class-map match-all _class_24
match ip dscp cs3
class-map match-all _class_16
match ip dscp cs2
class-map match-all _class_34
match ip dscp af41
class-map match-all _class_26
match ip dscp af31
class-map match-all _class_40
match ip dscp cs5
class-map match-all _class_46
match ip dscp ef
class-map match-all _class_56
match ip dscp cs7
class-map match-all _class_10
match ip dscp af11
class-map match-all _class_32
match ip dscp cs4
policy-map _policy_Voice_Over_IP_202
class _class_Protocol_301_C351
  set cos 6
policy-map _policy_fallback_policy
class _class_0
  set cos 0
class _class_8
  set cos 1
class _class_10
  set cos 1
class _class_16
  set cos 2
class _class_18
  set cos 2
class _class_24
  set cos 3
class _class_26
  set cos 3
class _class_32
  set cos 4
class _class_34
  set cos 4
class _class_40
  set cos 5
class _class_46
  set cos 5
class _class_48
  set cos 6
class _class_56
  set cos 7
bridge irb
interface Dot11Radio0
no ip address
no ip route-cache
shutdown
encryption mode wep mandatory mic key-hash
broadcast-key change 900
ssid
traffic-class background cw-min 5 cw-max 8 fixed-slot 2
traffic-class best-effort cw-min 5 cw-max 8 fixed-slot 6
traffic-class video cw-min 4 cw-max 6 fixed-slot 1
traffic-class voice cw-min 3 cw-max 7 fixed-slot 1
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
packet retries 32
fragment-threshold 2338
station-role root
rts threshold 2339
rts retries 32
world-mode legacy
no cdp enable
infrastructure-client
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface Dot11Radio1
no ip address
no ip route-cache
shutdown
encryption mode wep mandatory mic key-hash
broadcast-key change 900
ssid aspen100abcdefgh
speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
station-role root
world-mode legacy
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface FastEthernet0
no ip address
no ip route-cache
duplex auto
speed auto
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
interface BVI1
ip address 10.148.0.7 255.255.255.0
no ip route-cache
ip default-gateway 10.148.0.1
ip http server
ip http authentication aaa
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip tacacs source-interface BVI1
ip radius source-interface BVI1
ip access-list extended Voice_Over_IP_300
permit 119 any any
permit ip any any
ip access-list extended Voice_Over_IP_301
permit 119 any any
permit ip any any
logging facility local0
snmp-server view iso_view iso included
snmp-server community admin view iso_view RW
snmp-server community all4114all view iso_view RW
snmp-server community ddbos2000 RO
snmp-server location ATSG
snmp-server contact James Lee
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps disassociate
snmp-server enable traps deauthenticate
snmp-server enable traps authenticate-fail
snmp-server enable traps config
snmp-server enable traps syslog
snmp-server host 192.135.137.12 ddbos2000
tacacs-server host 10.16.16.123 key 7
tacacs-server host 10.96.16.245 key 7
tacacs-server directed-request
radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
radius-server deadtime 120
radius-server vsa send accounting
radius-server vsa send authentication
control-plane
bridge 1 route ip
line con 0
transport preferred all
transport output all
stopbits 1
line vty 0 4
exec-timeout 0 0
transport preferred all
transport input all
transport output all
line vty 5 15
exec-timeout 0 0
transport preferred all
transport input all
transport output all
end
atsg-wl1#show run | incl hostname
hostname atsg-wl1
atsg-wl1#arch down /over /create-space  tftp://10.148.0.118/images/c1130-rcvk                                                                    $over /create-space  tftp://10.148.0.118/images/c1130-rcvk9                  w8-tar.12                                                                   te-space  tftp://10.148.0.118/images/c1130-rcvk9w8-tar.123                  -11.JX1.t                                                                  ftp://10.148.0.118/images/c1130-rcvk9w8-tar.123-11.JX1.ta                  r
examining image...
Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
extracting info (273 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 1873920 bytes]
Image info:
    Version Suffix: rcvk9w8-
    Image Name: c1130-rcvk9w8-mx
    Version Directory: c1130-rcvk9w8-mx
    Ios Image Size: 1874432
    Total Image Size: 1874432
    Image Feature: WIRELESS LAN|LWAPP|RECOVERY
    Image Family: C1130
    Wireless Switch Management Version: 3.0.51.0
Extracting files...
Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
extracting info (273 bytes)
c1130-rcvk9w8-mx/ (directory) 0 (bytes)
extracting c1130-rcvk9w8-mx/c1130-rcvk9w8-mx (1867816 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
extracting c1130-rcvk9w8-mx/info (273 bytes)
extracting info.ver (273 bytes)!
[OK - 1873920 bytes]
Deleting current version...
Deleting flash:/c1130-k9w7-mx.123-7.JA3...done.
New software image installed in flash:/c1130-rcvk9w8-mx
Configuring system to use new image...done.
atsg-wl1#show archive status
SUCCESS: Upgrade complete.
atsg-wl1#write erase
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
[OK]
Erase of nvram: complete
atsg-wl1#dir flash:
Directory of flash:/
    2  -rwx        2072  Jan 31 2013 19:36:18 +00:00  private-multiple-fs
  149  drwx         128  Jan 31 2013 19:36:11 +00:00  c1130-rcvk9w8-mx
    4  -rwx         342  Jan 31 2013 19:36:14 +00:00  env_vars
15998976 bytes total (14126080 bytes free)
atsg-wl1#dir nvram:
Directory of nvram:/
   30  -rw-           0                      startup-config
   31  ----           0                      private-config
    1  -rw-           0                      ifIndex-table
    2  ----          12                      persistent-data
32768 bytes total (30668 bytes free)
atsg-wl1#sh crypto ca trustpoints
atsg-wl1#sh crypto ca certificates
atsg-wl1#terminal length 0
atsg-wl1#show run | begin BVI1
interface BVI1
ip address 10.148.0.7 255.255.255.0
no ip route-cache
ip default-gateway 10.148.0.1
ip http server
ip http authentication aaa
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip tacacs source-interface BVI1
ip radius source-interface BVI1
ip access-list extended Voice_Over_IP_300
permit 119 any any
permit ip any any
ip access-list extended Voice_Over_IP_301
permit 119 any any
permit ip any any
logging facility local0
snmp-server view iso_view iso included
snmp-server community admin view iso_view RW
snmp-server community all4114all view iso_view RW
snmp-server community ddbos2000 RO
snmp-server location ATSG
snmp-server contact James Lee
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps disassociate
snmp-server enable traps deauthenticate
snmp-server enable traps authenticate-fail
snmp-server enable traps config
snmp-server enable traps syslog
snmp-server host 192.135.137.12 ddbos2000
tacacs-server host 10.16.16.123 key 7
tacacs-server host 10.96.16.245 key 7
tacacs-server directed-request
radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
radius-server deadtime 120
radius-server vsa send accounting
radius-server vsa send authentication
control-plane
bridge 1 route ip
line con 0
transport preferred all
transport output all
stopbits 1
line vty 0 4
exec-timeout 0 0
transport preferred all
transport input all
transport output all
line vty 5 15
exec-timeout 0 0
transport preferred all
transport input all
transport output all
end

Similar Messages

  • AP 3702 not join the WLC

    Hi,
    I have two WLC 8500 working in SSO and with nat enable feature configure in management interface.
    SSO is working, but i have to configure NAT before SSO becasuse when SSO is up, ip address and nat are greyed out in managemente interface.
    Some AP's must join the controller in the private address of the management interface and others AP must join in the public ip address configured in NAT address. 
    for some reason, there are a lot of AP's that can't join the controller, i have 3 ap's joined in the public ip address and 3 ap's joined in the private ip address
    config network ap-discovery nat-only disable is already configured, from the console of one AP that can't not join i see the following:
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 212.89.5.130 peer_port: 5246
    *Sep 10 12:36:17.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Sep 10 12:36:47.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 212.89.5.130:5246
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.35.0.78 peer_port: 5246
    the AP is trying both private and public ip address to join the WLC but can't join properly.
    From the WLC console:
    debug capwap errors enable:
    *spamApTask4: Sep 10 13:13:49.837: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.13:47807)since DTLS session is not established 
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask2: Sep 10 13:13:52.103: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.11:21207)since DTLS session is not established 
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    the AP model are the same, this is not the problem, but for some reason there are AP's that have problems with the NAT configuration, if i disable NAT option, every AP with private ip address config can join the WLC.
    I've tried to break SSO, desconfigure NAT, and private ip address AP join the controller without problem.
    anybody can give me a clue?
    Regards!

    it seens like DTLS connection can't be stablished between AP and WLC.
    The AP sends discovery request
    the WLC respond with two discovery responds, the firts one, contains the public ip address of the WLC and the second one contains the private ip address.
    once discovery proccess is complete, the AP tries to send DTLS hello packet to the WLC, but this packet never arrives to WLC.
    because hello doesn't arrive, the AP sends a close notify alert to the WLC and tries to send the DTLS hello packet to the WLC private address with same result.
    the AP get into a loop trying to send DTLS hello packets to both private and public address.
    DTLS hello packet never arrive, but close notify alert arrive to WLC.
    theres is FW in the middle doing NAT, but i can understand why close notify alert packets error arrives WLC and Hello DTLS packets don't. this packets uses the same protocol UDP and the same port.
    Regards

  • Converted 1140 AP can't join the WLC 5508

    Hello! Please, help me to sort my problem out.
    We have bought autonomous APs   AIR-AP1141N-E-K9 and converted them to the lightweight mode, but they cannot join the WLC 5508. The errors are below. There were NO problems with the LAPs that were bought before, together with the WLC.
    AP's IP: 172.22.90.27   IOS version  12.4
    WLC's IP: 172.22.90.20   IOS version 6.0.188.0
    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    This Discussion has been converted into document:- https://supportforums.cisco.com/docs/DOC-23054
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    logs from the AP:
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:06.044: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.045: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.046: bsnInitRcbSlot: slot 1 has NO radio
    *Oct 13 21:37:06.056: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to a
    dministratively down
    *Oct 13 21:37:06.066: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to r
    eset
    *Oct 13 21:37:06.098: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:15.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLL
    ER
    *Oct 13 21:37:24.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
    LER
    *Oct 13 21:37:34.060: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.822: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:34.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.824: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap p
    acket from 172.22.90.20
    *Oct 13 21:39:33.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:39:34.000: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.001: %DTLS-5-PEER_DISCONNECT: Peer 172.22.90.20 has closed conn
    ection.
    *Oct 13 21:38:34.001: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:38:34.001: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination
    *Oct 13 21:38:34.125: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    logs from the WLC:
    debug capwap events enable
    *Dec 21 15:02:06.244: 68:bc:0c:63:3d:a0 DTLS keys for Control Plane deleted successfully for AP 172.22.90.27
      *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 DTLS connection closed event receivedserver (172:22:90:20/5246) client (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Entry exists for AP (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    Ble
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 capwap_ac_platform.c:1223 - Operation State 0 ===> 4
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 Register LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
      *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join Version: = 100711424
    *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Maximum Msg element len = 93
    debug capwap errors enable
    *Dec 21 16:16:51.879: 68:bc:0c:63:3d:a0 DTLS connection was closed
    *Dec 21 16:17:09.940: 68:bc:0c:63:3d:a0 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =5
    debug capwap detail enable
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 packet received of length 281 from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Msg Type = 3 Capwap state = 5
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: Result Code message element len = 8
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 1. 47 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 2. 232 3
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 3. 6 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 4. 12 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Descriptor message element len = 48
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 acName = Wi-Fi_Controller
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Name message element len = 68
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: WTP Radio Information message element len = 77
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Control IPV4 Address len = 87
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Sending encrypted packet to AP 172:22:90:27 (21078)
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Releasing WTP
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21077
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 DTLS connection 0x167c8b20 closed by controller
    *Dec 21 16:24:12.212: DTL Deleting AP 9 - 0.0.0.0
    *Dec 21 16:24:12.214: CAPWAP DTLS connection closed msg
    *Dec 21 16:24:12.216: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.216: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.218: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.220: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.222: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.224: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.226: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.228: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.228: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.230: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.232: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.234: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.236: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Deleting and removing AP 68:bc:0c:63:3d:a0 from fast path
    P.S. The time is set to the WLC with the NTP
    P.P.S. Don't lookup at the time the logs were made - they were made not during the same day/time

    I have solved this as soon as published my problem!!!
    the answer is published here:
    https://supportforums.cisco.com/thread/2004491
    especially in the post of Matthew Fowler
    Hi,
    Please take a look at CSCte01087.
    I see that your WLC is 10.0.13.5 and your AP is 10.0.13.28/24 so they are on the same subnet. I also see your AP MAC address does not begin with 00. This is why I believe it is relevant.
    Please try the workaround or open a TAC case if you need a fix.
    -Matt
    Symptom:
    An access point running 6.0.188.0 code may be unable to join a WLC5508.
    Messages similar to the following will be seen on the AP.
       %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
       %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
    Conditions:
    At least one of the following conditions pertains:
    - The high order byte of the AP's MAC address is nonzero, and the AP is in
    the same subnet as the WLC5508's management (or AP manager) interface
    - The WLC's management (or AP manager) interface's default gateway's
    MAC address' high order byte is nonzero.
    Workaround:
    If the MAC address of the WLC's default gateway does not begin with 00,
    and if all of the APs' MAC addresses begin with 00, then: you can put
    the APs into the same subnet as the WLC's management (or AP manager)
    interface.
    In the general case, for the situation where the WLC's default gateway's
    MAC does not begin with 00, you can address this by changing it to begin
    with 00. Some methods for doing this include:
    -- use the "mac-address" command on the gateway, to set a MAC address
    that begins with 00
    -- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
    IP as the WLC's gateway.
    For the case where the APs' MAC addresses do not begin with 00, then make
    sure that they are *not* in the same subnet as the WLC's management
    (AP manager) interface, but are behind a router.
    Another workaround is to downgrade to 6.0.182.0.  However, after
    downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
    (i.e. 12.4(21a)JA2) still installed on them will be unable to join.
    Therefore, after downgrading the WLC, the APs will need to have a
    pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.
    different vlan!!!! yes! thank you Matthew Fowler sooooo much!!!!

  • I have a new Macbook Pro. It won't join the wireless networks that my old Macbook Pro joined; only some of them (I'm talking open networks). What can I do, please?

    I have a new Macbook Pro. It can see, but won't join the open wireless networks that my existing Macbook Pro joins. What can I do, please?

    Mac OS X 10.7 Help: Troubleshoot a network printer

  • Cisco 2702I WAPs won't join 5508 WLC

    I haven't been able to get a few WAPs to join my existing WLC and network.  They don't seem to be pulling any IP address or talking to DHCP, but everything has been already configured and the same as the other buildings that I have deployed these WAPS on.  any thoughts?
    Here is the Show Running-Config and Show ip interface brief commands output.
    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2015.04.20 13:39:23 =~=~=~=~=~=~=~=~=~=~=~=
    show ip interface briefrunning-config    
    Building configuration...
    Current configuration : 17458 bytes
    ! Last configuration change at 00:00:33 UTC Mon Mar 1 1993
    version 15.2
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname APf07f.0692.ff0c
    logging rate-limit console 9
    enable secret 5 $1$3GAl$UQHPfp.Ab7Ry0HSsQJTRn/
    aaa new-model
    aaa authentication login default local
     --More--        !
    aaa session-id common
    ip cef
    power inline negotiation prestandard source
    crypto pki trustpoint airespace-old-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint airespace-new-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint airespace-device-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint cisco-root-cert
     --More--         revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint Cisco_IOS_MIC_cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki certificate chain airespace-old-root-cert
     certificate ca 00
      30820406 3082032F A0030201 02020100 300D0609 2A864886 F70D0101 04050030 
      818F310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 0355040A 
      130D6169 72657370 61636520 496E6331 0D300B06 0355040B 13046E6F 6E65310B 
      30090603 55040313 02636131 24302206 092A8648 86F70D01 09011615 73757070 
      6F727440 61697265 73706163 652E636F 6D301E17 0D303330 32313232 33333835 
      355A170D 31323131 31313233 33383535 5A30818F 310B3009 06035504 06130255 
      53311330 11060355 0408130A 43616C69 666F726E 69613111 300F0603 55040713 
      0853616E 204A6F73 65311630 14060355 040A130D 61697265 73706163 6520496E 
      63310D30 0B060355 040B1304 6E6F6E65 310B3009 06035504 03130263 61312430 
      2206092A 864886F7 0D010901 16157375 70706F72 74406169 72657370 6163652E 
      636F6D30 81DF300D 06092A86 4886F70D 01010105 000381CD 003081C9 0281C100 
      DB9D3901 30059DD1 05CB2793 9B9907F8 1FF57FA9 24065BF7 1A5865F8 B9CFCCB3 
     --More--          679354D4 69BAB847 1CA327AE EA006AAC 90479C9D C23B67DE FACC0D28 32C6103F 
      A59C41E2 E8B4250B 4D2903EB 52629A99 D618B747 C4A94151 1AB995BB 14905404 
      5F4A0B9F F387F346 D5F3A249 2AED1B6A 3DD639D8 4924366A 1234DD2D B13CD489 
      7E2EA101 63BCCC82 2F7A6D0B 33AB5705 3C784A6D A3DD1E5B 96CF54C6 CF4D59BC 
      1BFD6CB6 E72FCB29 88DCBE6D 4D76FB83 1FAF5683 E4E20822 00A9EB2E 3BEF0DF9 
      02030100 01A381EF 3081EC30 1D060355 1D0E0416 04149457 DF7D1482 2D31BB28 
      772E8996 1886DA46 84BA3081 BC060355 1D230481 B43081B1 80149457 DF7D1482 
      2D31BB28 772E8996 1886DA46 84BAA181 95A48192 30818F31 0B300906 03550406 
      13025553 31133011 06035504 08130A43 616C6966 6F726E69 61311130 0F060355 
      04071308 53616E20 4A6F7365 31163014 06035504 0A130D61 69726573 70616365 
      20496E63 310D300B 06035504 0B13046E 6F6E6531 0B300906 03550403 13026361 
      31243022 06092A86 4886F70D 01090116 15737570 706F7274 40616972 65737061 
      63652E63 6F6D8201 00300C06 03551D13 04053003 0101FF30 0D06092A 864886F7 
      0D010104 05000381 C100AEB0 349DC0F9 2AAA3A57 75B3A79C 5421A9D0 15389261 
      95C03479 04DA81D4 120F58FA E2299223 BEB54A90 6D70F7F7 2192EFAF A4B0F488 
      604E3094 BBCC77A3 60A88129 0849B87B 5CA1AA17 21922A55 6B68E0D3 1ADC7264 
      C4C4D6B2 33345C86 254E4988 096645CD 40F12761 8BC37E71 DAD91677 25322361 
      71D87A16 F92AF7C1 51CB8892 443BC666 59BEA47B 985E8866 68A1EBD4 88BBF6E7 
      A949FDF8 7711D518 A80E203D A12BEBDC 6963EDA7 B76079A3 22380C96 0CB8D324 
      CADD949D EA39E0EF 033D
      quit
    crypto pki certificate chain airespace-new-root-cert
     certificate ca 00
     --More--          3082045A 30820383 A0030201 02020100 300D0609 2A864886 F70D0101 04050030 
      81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A 
      130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E 
      65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420 
      43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573 
      70616365 2E636F6D 301E170D 30333037 33313133 34313232 5A170D31 33303432 
      39313334 3132325A 3081A631 0B300906 03550406 13025553 31133011 06035504 
      08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 
      31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 
      040B130B 456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 
      61636520 526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 
      6F727440 61697265 73706163 652E636F 6D3081DF 300D0609 2A864886 F70D0101 
      01050003 81CD0030 81C90281 C100CCA0 F92330BD 49E947A4 3FA2ACF3 A4827F66 
      77BB66F4 6B1636BA 84EF0966 9CCAE0EA CA6F1D0F BA90FEFA 58B8502C 10FC78DC 
      C9D126D8 8F2AD059 A8A69BFE 90324BD6 4553CED9 131B99B0 282A73D9 8655EFAF 
      5EA54096 22E54B9F C4258988 78F1A51F F47B16F2 0C0A37A3 52603A5A B0DC4533 
      B0C0B7C8 02DF25F0 585DFF5F 43FDAE1F 48A34BDF F80AC27E 30BE931B D3490ADE 
      C81FF6F9 974F1408 55C8813F D334F1B8 A1892B0A 10D98A44 7DBF213E 64520D20 
      E78E9
    Not in Bound state.322 DA11CA7A 46ACEB41 46AB0203 010001A3 82011430 82011030 1D060355 
      1D0E0416 0414538D 8360478D C20F8066 3232E9E1 7070552B 17EA3081 D3060355 
     --More--          1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181 
      ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43 
      616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015 
      06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B 
      456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520 
      526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440 
      61697265 73706163 652E636F 6D820100 300C0603 551D1304 05300301 01FF300B 
      0603551D 0F040403 02010630 0D06092A 864886F7 0D010104 05000381 C10006E3 
      653D4B19 FAA0C3B9 8EAE23C5 A3305E42 4522A961 BE1B5B88 56ED2E5A E42F7AC0 
      26AA2805 9824080D 1512169B 44E42847 2EBBA573 29F070DB 56011C7B E9F3A240 
      399A3557 A50384EC A0353DCF 49E8EC01 94047469 0BC12079 2764873D 25943DCD 
      66A
    *Mar  1 02:26:43.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.9726F 4A79EB40 1C7C6897 4E925D80 2313C126 1F604763 A9D9AC1F DF0092F6 
      57DF1AB4 9B904E22 CE5515CD 44F68A00 4E2BC861 FBC1540D C1F3A66B 8CDDC1C2 
      7C442027 E6241198 B0E002DE 9E06D64F 0D538987 96C1C0DB 12B0F581 6FED
      quit
    crypto pki certificate chain airespace-device-root-cert
     certificate ca 03
      3082047F 308203A8 A0030201 02020103 300D0609 2A864886 F70D0101 04050030 
      81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A 
      130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E 
      65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420 
      43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573 
     --More--          70616365 2E636F6D 301E170D 30353034 32383232 33373133 5A170D31 35303132 
      36323233 3731335A 3081A831 0B300906 03550406 13025553 31133011 06035504 
      08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 
      31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 
      040B130B 456E6769 6E656572 696E6731 1C301A06 03550403 13134169 72657370 
      61636520 44657669 63652043 41312430 2206092A 864886F7 0D010901 16157375 
      70706F72 74406169 72657370 6163652E 636F6D30 81DF300D 06092A86 4886F70D 
      01010105 000381CD 003081C9 0281C100 A93C0158 E7284E75 FF86A57A 886ACA37 
      430BECF0 7582F56B DB6AC514 554FB06E AA327B3E CE3C9391 03C93BA4 0C0AF932 
      A6CB5DA3 F1C3C528 53BF4E19 2C1BFC48 467EBD93 06B4974A 1273BF35 8AD8540F 
      261E612B A2673B68 D239C87E 1E9E967B 2654D285 45BB7F78 5F4E9D4B 7B8001AA 
      2F455CFF 4552ECDB 5667E3FC E7093E06 8FAE353D 4228B48D 8B415D9B F496342D 
      C1459987 B69BFA4B 51FB67B4 A0C21E7F C6269A39 47EB1D48 5E83B129 8B079E5E 
      1EDAB5A0 BE5E1DE0 109FF0BD 4750E32B 02030100 01A38201 37308201 33300C06 
      03551D13 04053003 0101FF30 2E060960 86480186 F842010D 0421161F 41697265 
      73706163 65204465 76696365 20434120 43657274 69666963 61746530 1D060355 
      1D0E0416 04140A52 3BB12570 523B9CEA 747FB2AD 3D8F95EA 3FCC3081 D3060355 
      1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181 
      ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43 
      616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015 
      06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B 
      456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520 
      526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440 
     --More--          61697265 73706163 652E636F 6D820100 300D0609 2A864886 F70D0101 04050003 
      81C100A0 E8D59D9B DA9EED0C 96045DFE A37084EC 59B5C3D3 71694DB0 70664E0C 
      8060D69E E366E81F 9F3CCF68 8AB0498E CCFA6CA7 2854F2D8 046690C9 8FEC84EF 
      2F7F0F08 C90F719D C0F4C125 CED1B525 6DD93E51 777BD5E8 7F1DC79F CC502DC2 
      0242C05D 1682DEE3 DF7541B8 C55B433C 10DFE2BF D2E802E7 D923329A 23A2076F 
      86BCC048 D569B383 59AC8979 97F02C55 6F8FE318 754F605C 43CDA7C8 1847B085 
      1DADF0D6 CD62C8DE A86E6E12 4A7CDCBF A6FCC7E1 852A1DB1 529D63B3 688305F6 7BD25F
      quit
    crypto pki certificate chain cisco-root-cert
     certificate ca 5FF87B282B54DC8D42A315B568C9ADFF
      30820343 3082022B A0030201 0202105F F87B282B 54DC8D42 A315B568 C9ADFF30 
      0D06092A 864886F7 0D010105 05003035 31163014 06035504 0A130D43 6973636F 
      20537973 74656D73 311B3019 06035504 03131243 6973636F 20526F6F 74204341 
      20323034 38301E17 0D303430 35313432 30313731 325A170D 32393035 31343230 
      32353432 5A303531 16301406 0355040A 130D4369 73636F20 53797374 656D7331 
      1B301906 03550403 13124369 73636F20 526F6F74 20434120 32303438 30820120 
      300D0609 2A864886 F70D0101 01050003 82010D00 30820108 02820101 00B09AB9 
      ABA7AF0A 77A7E271 B6B46662 94788847 C6625584 4032BFC0 AB2EA51C 71D6BC6E 
      7BA8AABA 6ED21588 48459DA2 FC83D0CC B98CE026 68704A78 DF21179E F46105C9 
      15C8CF16 DA356189 9443A884 A8319878 9BB94E6F 2C53126C CD1DAD2B 24BB31C4 
      2BFF8344 6FB63D24 7709EABF 2AA81F6A 56F6200F 11549781 75A725CE 596A8265 
      EFB7EAE7 E28D758B 6EF2DD4F A65E629C CF100A64 D04E6DCE 2BCC5BF5 60A52747 
      8D69F47F CE1B70DE 701B20D6 6ECDA601 A83C12D2 A93FA06B 5EBB8E20 8B7A91E3 
     --More--          B568EEA0 E7C40174 A8530B2B 4A9A0F65 120E824D 8E63FDEF EB9B1ADB 53A61360 
      AFC27DD7 C76C1725 D473FB47 64508180 944CE1BF AE4B1CDF 92ED2E05 DF020103 
      A351304F 300B0603 551D0F04 04030201 86300F06 03551D13 0101FF04 05300301 
      01FF301D 0603551D 0E041604 1427F3C8 151E6E9A 020916AD 2BA08960 5FDA7B2F 
      AA301006 092B0601 04018237 15010403 02010030 0D06092A 864886F7 0D010105 
      05000382 0101009D 9D8484A3 41A97C77 0CB753CA 4E445062 EF547CD3 75171CE8 
      E0C6484B B6FE4C3A 198156B0 56EE1996 62AA5AA3 64C1F64E 5433C677 FEC51CBA 
      E55D25CA F5F0939A 83112EE6 CBF87445 FEE705B8 ABE7DFCB 4BE13784 DAB98B97 
      701EF0E2 8BD7B0D8 0E9DB169 D62A917B A9494F7E E68E95D8 83273CD5 68490ED4 
      9DF62EEB A7BEEB30 A4AC1F44 FC95AB33 06FB7D60 0ADEB48A 63B09CA9 F2A4B953 
      0187D068 A4277FAB FFE9FAC9 40388867 B439C684 6F57C953 DBBA8EEE C043B2F8 
      09836EFF 66CF3EEF 17B35818 2509345E E3CBD614 B6ECF292 6F74E42F 812AD592 
      91E0E097 3C326805 854BD1F7 57E2521D 931A549F 0570C04A 71601E43 0B601EFE 
      A3CE8119 E10B35
      quit
    crypto pki certificate chain Cisco_IOS_MIC_cert
     certificate 2DCD1F0500000015BE7F
      30820470 30820358 A0030201 02020A2D CD1F0500 000015BE 7F300D06 092A8648 
      86F70D01 01050500 30393116 30140603 55040A13 0D436973 636F2053 79737465 
      6D73311F 301D0603 55040313 16436973 636F204D 616E7566 61637475 72696E67 
      20434130 1E170D31 34303832 38313834 3030395A 170D3234 30383238 31383530 
      30395A30 818C310B 30090603 55040613 02555331 13301106 03550408 130A4361 
      6C69666F 726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 
     --More--          0355040A 130D4369 73636F20 53797374 656D7331 1B301906 03550403 13124150 
      3347322D 66303766 30363932 66663063 3120301E 06092A86 4886F70D 01090116 
      11737570 706F7274 40636973 636F2E63 6F6D3082 0122300D 06092A86 4886F70D 
      01010105 00038201 0F003082 010A0282 01010095 69DD9DFC D4FC9F91 6781A9EF 
      51713883 49968E78 05AF6140 CB9A08D9 E1066298 C8F3A072 3AC2FBDB 1E9E43E2 
      87E6C5A8 2FC83AE1 9C563022 17AD76D8 9D76DFD0 E5C4E01A 3A177708 FE60E3B9 
      AA362983 6DFBE7A0 7D902420 74C56700 E1DC2DEA 629E9CAE 333E3038 6EC4C07B 
      2CEF08B7 AC69E43D B06B28C7 8D6226F7 0BC77566 BFFC3B3C 26E90F05 2D342B59 
      9045D6D2 445313FE B551E815 E09C5872 69DF456F C15A81BA 1F3E6B35 7AE4C2BC 
      92B4F61B 8E4DEE97 DC569763 32578BBF 909FE970 00445AFA 1CF98D73 D5EC3ED2 
      ED0A909C 6381E83C 830D8262 23540044 FF438C72 BB21AB47 1E610815 E0737911 
      78820812 E0ED4512 04E892BD 3FA9DD0A 42409302 03010001 A3820124 30820120 
      300E0603 551D0F01 01FF0404 030205A0 301D0603 551D0E04 16041417 4C35E9C4 
      88705E88 3A3DF87C A014FD3E A6ABB930 1F060355 1D230418 30168014 D0C52226 
      AB4F4660 ECAE0591 C7DC5AD1 B047F76C 303F0603 551D1F04 38303630 34A032A0 
      30862E68 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 72697479 
      2F706B69 2F63726C 2F636D63 612E6372 6C304C06 082B0601 05050701 01044030 
      3E303C06 082B0601 05050730 02863068 7474703A 2F2F7777 772E6369 73636F2E 
      636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 6D63612E 63657230 
      3F06092B 06010401 82371402 04321E30 00490050 00530045 00430049 006E0074 
      00650072 006D0065 00640069 00610074 0065004F 00660066 006C0069 006E0065 
      300D0609 2A864886 F70D0101 05050003 82010100 59C70FBE 43641BFE 99434812 
      BEDDE616 093F4F5F 2FF1F0A4 983969F6 CF175C8A 0DF1D329 5A11ADB1 B7E81DF3 
     --More--          FFBF0415 40884186 2C2C6B2F 99798BEF ECBFCFA5 76D64C5B 0E3FA230 3AFF71D4 
      ABAB9570 8FA2F2BA 4065622A 1202FDBA 858BD99B 59DCF8AD 729279E2 12CB91BE 
      7CEEF9BC 667016B6 DB426925 CBE489F3 271EEF13 5CCBA25E 9013D989 66DE5837 
      1C5EE17B 144256A5 8473189D 8F954745 7D6543B2 1B12ED90 C38C56A7 AC941524 
      DF999DAB 87510E6B 970CFC97 66FE086A 449B3C99 C22FE3A1 74278F5E 58551DA5 
      E2442DC3 1A7A991F 4AB107CA 6CD6169E B750494C 23CFAEE3 92507539 E734D21A 
      F60D6C15 3F551769 D1BE9102 690122D7 A59E2D94
      quit
     certificate ca 6A6967B3000000000003
      308204D9 308203C1 A0030201 02020A6A 6967B300 00000000 03300D06 092A8648 
      86F70D01 01050500 30353116 30140603 55040A13 0D436973 636F2053 79737465 
      6D73311B 30190603 55040313 12436973 636F2052 6F6F7420 43412032 30343830 
      1E170D30 35303631 30323231 3630315A 170D3239 30353134 32303235 34325A30 
      39311630 14060355 040A130D 43697363 6F205379 7374656D 73311F30 1D060355 
      04031316 43697363 6F204D61 6E756661 63747572 696E6720 43413082 0120300D 
      06092A86 4886F70D 01010105 00038201 0D003082 01080282 010100A0 C5F7DC96 
      943515F1 F4994EBB 9B41E17D DB791691 BBF354F2 414A9432 6262C923 F79AE7BB 
      9B79E807 294E30F5 AE1BC521 5646B0F8 F4E68E81 B816CCA8 9B85D242 81DB7CCB 
      94A91161 121C5CEA 33201C9A 16A77DDB 99066AE2 36AFECF8 0AFF9867 07F430EE 
      A5F8881A AAE8C73C 1CCEEE48 FDCD5C37 F186939E 3D71757D 34EE4B14 A9C0297B 
      0510EF87 9E693130 F548363F D8ABCE15 E2E8589F 3E627104 8726A415 620125AA 
      D5DFC9C9 5BB8C9A1 077BBE68 92939320 A86CBD15 75D3445D 454BECA8 DA60C7D8 
      C8D5C8ED 41E1F55F 578E5332 9349D5D9 0FF836AA 07C43241 C5A7AF1D 19FFF673 
     --More--          99395A73 67621334 0D1F5E95 70526417 06EC535C 5CDB6AEA 35004102 0103A382 
      01E73082 01E33012 0603551D 130101FF 04083006 0101FF02 0100301D 0603551D 
      0E041604 14D0C522 26AB4F46 60ECAE05 91C7DC5A D1B047F7 6C300B06 03551D0F 
      04040302 01863010 06092B06 01040182 37150104 03020100 30190609 2B060104 
      01823714 02040C1E 0A005300 75006200 43004130 1F060355 1D230418 30168014 
      27F3C815 1E6E9A02 0916AD2B A089605F DA7B2FAA 30430603 551D1F04 3C303A30 
      38A036A0 34863268 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 
      72697479 2F706B69 2F63726C 2F637263 61323034 382E6372 6C305006 082B0601 
      05050701 01044430 42304006 082B0601 05050730 02863468 7474703A 2F2F7777 
      772E6369 73636F2E 636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 
      72636132 3034382E 63657230 5C060355 1D200455 30533051 060A2B06 01040109 
      15010200 30433041 06082B06 01050507 02011635 68747470 3A2F2F77 77772E63 
      6973636F 2E636F6D 2F736563 75726974 792F706B 692F706F 6C696369 65732F69 
      6E646578 2E68746D 6C305E06 03551D25 04573055 06082B06 01050507 03010608 
      2B060105 05070302 06082B06 01050507 03050608 2B060105 05070306 06082B06 
      01050507 0307060A 2B060104 0182370A 0301060A 2B060104 01823714 02010609 
      2B060104 01823715 06300D06 092A8648 86F70D01 01050500 03820101 0030F330 
      2D8CF2CA 374A6499 24290AF2 86AA42D5 23E8A2EA 2B6F6923 7A828E1C 4C09CFA4 
      4FAB842F 37E96560 D19AC6D8 F30BF5DE D027005C 6F1D91BD D14E5851 1DC9E3F7 
      38E7D30B D168BE8E 22A54B06 E1E6A4AA 337D1A75 BA26F370 C66100A5 C379265B 
      A719D193 8DAB9B10 11291FA1 82FDFD3C 4B6E65DC 934505E9 AF336B67 23070686 
      22DAEBDC 87CF5921 421AE9CF 707588E0 243D5D7D 4E963880 97D56FF0 9B71D8BA 
      6019A5B0 6186ADDD 6566F6B9 27A2EE2F 619BBAA1 3061FDBE AC3514F9 B82D9706 
     --More--          AFC3EF6D CC3D3CEB 95E981D3 8A5EB6CE FA79A46B D7A25764 C43F4CC9 DBE882EC 
      0166D410 88A256E5 3C57EDE9 02A84891 6307AB61 264B1A13 9FE4DCDA 5F
      quit
    username Cisco secret 5 $1$.UkK$3GDTdydbzaupRq0u6bml9/
    ip ssh version 2
    bridge irb
    interface GigabitEthernet0
     duplex auto
     speed auto
    interface GigabitEthernet0.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 spanning-disabled
    interface GigabitEthernet1
     shutdown
     duplex auto
     --More--         speed auto
     bridge-group 1
    interface BVI1
     ip address dhcp client-id BVI1
    ip forward-protocol nd
    ip route 0.0.0.0 0.0.0.0 BVI1
    logging trap emergencies
    logging facility kern
    logging snmp-trap notifications
    logging snmp-trap informational
    logging snmp-trap debugging
    bridge 1 protocol ieee
    bridge 1 route ip
    line con 0
    line vty 0 4
     transport input all
    line vty 5 15
     transport input all
     --More--        end
    APf07f.0692.ff0c# show running-configip interface brief
    Interface                  IP-Address      OK? Method Status                Protocol
    BVI1                       unassigned      YES DHCP   up                    up      
    GigabitEthernet0           unassigned      NO  unset  up                    up      
    GigabitEthernet0.1         unassigned      YES unset  up                    up      
    GigabitEthernet1           unassigned      NO  unset  administratively down down    
    APf07f.0692.ff0c#
    Not in Bound state.
    *Mar  1 02:27:33.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:28:23.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:29:13.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:30:03.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.

    Hi,
    First check that a DHCP pool is configured for APs to pull IP address then only AP will be try to discover the WLC.
    Most of the time these problem(AP join) arise when you don't have correct software version on WLC.
    For 2702 AP, you need at-least 7.6.120.0 version on WLC.
    Here is the matrix: http://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html
    Fore more info, paste the info which Rasika asked.
    Regards

  • LWAPP joining the WLC?

    Dear Forum members.
    I have a home based lab, with a cisco 4402 up to 50 APs, version code 5.x
    a cisco 3500 xl series switch
    and a LWAPP.
    the switch can see the controller back and forth.
    One flat VLAN all across here.
    I get these error messages from the LWAPP.
    *Mar  1 00:00:07.006: %LINK-3-UPDOWN: Interface FastEthernet0, changed state to up
    *Mar  1 00:00:08.006: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0, changed state to up
    *Mar  1 00:00:25.070: %LWAPP-5-CHANGED: LWAPP changed state to DISCOVERY
    *Mar  1 00:00:58.207: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0 assigned DHCP address 192.168.10.100, mask 255.255.255.0, hostname DEMO_1242AG
    *Mar  1 00:01:16.481: %LWAPP-5-CHANGED: LWAPP changed state to JOIN
    *Mar  1 00:01:24.481: LWAPP_CLIENT_ERROR_DEBUG: spamHandleJoinTimer: Did not recieve the Join response
    *Mar  1 00:01:24.481: LWAPP_CLIENT_ERROR_DEBUG: No more AP manager IP addresses remain.
    *Mar  1 00:01:24.504: %SYS-5-RELOAD: Reload requested by LWAPP CLIENT. Reload Reason: DID NOT GET JOIN RESPONSE.
    *Mar  1 00:01:24.504: %LWAPP-5-CHANGED: LWAPP changed state to DOWNXmodem file system is available.
    Based on my research it has to do somehting with authentication of the AP against the AAA.
    I have added the AP mac address on the controller as a trusted AP and still no luck.
    Mind you I am using the WLC as a local DHCP server hence the IP address you see above (192.168.10.100)
    Any ideas what the issue could be?
    Thank you and i would appreciate your help on the matter.

    dmantill this is what I gathered, the majority of the action is on the AP and not on the controller.
    ==========================
    DEMO_1242AG#debug dhc
    DEMO_1242AG#debug dhcp detai
    DEMO_1242AG#debug dhcp detail
    DHCP client activity debugging is on (detailed)
    DEMO_1242AG#
    Apr  4 12:10:57.289: DHCP: Try 12 to acquire address for FastEthernet0
    Apr  4 12:10:57.289: DHCP: allocate request
    Apr  4 12:10:57.289: DHCP: new entry. add to queue
    Apr  4 12:10:57.289: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:10:57.289: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:10:57.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:10:57.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:10:57.290:    DHCP transaction id: 112F
    Apr  4 12:10:57.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:10:57.290:    Next timer fires after: 00:00:04
    Apr  4 12:10:57.290:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:10:57.290:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:10:57.290:    Hostname: DEMO_1242AG
    Apr  4 12:10:57.290: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:10:57.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:10:57.291: DHCP: SDiscover 296 bytes
    Apr  4 12:10:57.291:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:00.291: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:11:00.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:00.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:00.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:00.291:    DHCP transaction id: 112F
    Apr  4 12:11:00.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:00.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:00.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:00.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:00.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:00.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:00.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:00.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:00.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:04.291: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:11:04.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:04.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:04.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:04.291:    DHCP transaction id: 112F
    Apr  4 12:11:04.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:04.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:04.291:    Retry count: 3   Client-ID: 0019.3076  de.cc7c
    Apr  4 12:11:04.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:04.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:04.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:04.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:04.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:04.292:             B'cast on FastEthernet0 interface from 0.0.0.0b
    ug ip udp
    UDP packet debugging is on
    DEMO_1242AG#
    Apr  4 12:11:08.291: DHCP: QScan: Timed out Selecting statedebug lwap
    DEMO_1242AG#debug lwapp cli
    DEMO_1242AG#debug lwapp client ev
    DEMO_1242AG#debug lwapp client event
    LWAPP Client EVENT display debugging is on
    DEMO_1242AG#%Unknown DHCP problem.. No allocation possible
    Apr  4 12:11:17.292: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:11:22.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:32.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:42.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:48.291: DHCP: QScan: Purging entry
    Apr  4 12:11:48.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:11:48.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:48.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:48.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:11:48.291:    DHCP transaction id: 112F
    Apr  4 12:11:48.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:48.291:    No timer running
    Apr  4 12:11:48.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:48.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:48.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:52.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:02.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:17.292: DHCP: Try 13 to acquire address for FastEthernet0
    Apr  4 12:12:17.292: DHCP: allocate request
    Apr  4 12:12:17.292: DHCP: new entry. add to queue
    Apr  4 12:12:17.292: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:12:17.292: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:17.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:17.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:17.293:    DHCP transaction id: 1130
    Apr  4 12:12:17.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:17.293:    Next timer fires after: 00:00:04
    Apr  4 12:12:17.293:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:17.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:17.293:    Hostname: DEMO_1242AG
    Apr  4 12:12:17.293: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:17.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:17.294: DHCP: SDiscover 296 bytes
    Apr  4 12:12:17.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:21.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:12:21.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:21.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:21.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:21.290:    DHCP transaction id: 1130
    Apr  4 12:12:21.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:21.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:21.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:21.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:21.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:21.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:21.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:21.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:21.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:25.290: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:12:25.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:25.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:25.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:25.290:    DHCP transaction id: 1130
    Apr  4 12:12:25.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:25.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:25.291:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:25.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:25.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:25.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:25.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:25.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:25.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:29.290: DHCP: QScan: Timed out Selecting state
    Apr  4 12:12:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:12:37.294: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:12:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:08.291: DHCP: QScan: Purging entry
    Apr  4 12:13:08.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:13:08.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:08.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:08.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:13:08.291:    DHCP transaction id: 1130
    Apr  4 12:13:08.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:08.291:    No timer running
    Apr  4 12:13:08.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:08.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:08.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:37.294: DHCP: Try 14 to acquire address for FastEthernet0
    Apr  4 12:13:37.294: DHCP: allocate request
    Apr  4 12:13:37.294: DHCP: new entry. add to queue
    Apr  4 12:13:37.294: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:13:37.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:37.295: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:37.295:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:37.295:    DHCP transaction id: 1131
    Apr  4 12:13:37.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:37.295:    Next timer fires after: 00:00:04
    Apr  4 12:13:37.295:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:37.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:37.295:    Hostname: DEMO_1242AG
    Apr  4 12:13:37.295: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:37.296: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:37.296: DHCP: SDiscover 296 bytes
    Apr  4 12:13:37.296:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:41.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:13:41.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:41.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:41.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:41.290:    DHCP transaction id: 1131
    Apr  4 12:13:41.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:41.291:    Next timer fires after: 00:00:04
    Apr  4 12:13:41.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:41.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:41.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:41.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:41.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:41.291: DHCP: SDiscover 296 bytes
    Apr  4 12:13:41.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:45.293: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:13:45.293: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:45.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:45.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:45.293:    DHCP transaction id: 1131
    Apr  4 12:13:45.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:45.293:    Next timer fires after: 00:00:04
    Apr  4 12:13:45.293:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:45.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:45.293:    Hostname: DEMO_1242AG
    Apr  4 12:13:45.294: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:45.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:45.294: DHCP: SDiscover 296 bytes
    Apr  4 12:13:45.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:49.295: DHCP: QScan: Timed out Selecting state
    Apr  4 12:13:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:13:57.296: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:14:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:28.294: DHCP: QScan: Purging entry
    Apr  4 12:14:28.294: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:14:28.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:28.294: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:28.294:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:14:28.295:    DHCP transaction id: 1131
    Apr  4 12:14:28.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:28.295:    No timer running
    Apr  4 12:14:28.295:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:28.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:28.295:    Hostname: DEMO_1242AG
    Apr  4 12:14:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:57.295: DHCP: Try 15 to acquire address for FastEthernet0
    Apr  4 12:14:57.296: DHCP: allocate request
    Apr  4 12:14:57.296: DHCP: new entry. add to queue
    Apr  4 12:14:57.296: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:14:57.296: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:57.296: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:57.296:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:14:57.296:    DHCP transaction id: 1132
    Apr  4 12:14:57.296:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:57.296:    Next timer fires after: 00:00:04
    Apr  4 12:14:57.296:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:57.297:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:57.297:    Hostname: DEMO_1242AG
    Apr  4 12:14:57.297: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:14:57.297: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:14:57.297: DHCP: SDiscover 296 bytes
    Apr  4 12:14:57.297:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:00.299: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:15:00.299: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:00.299: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:00.300:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:00.300:    DHCP transaction id: 1132
    Apr  4 12:15:00.300:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:00.300:    Next timer fires after: 00:00:04
    Apr  4 12:15:00.300:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:00.300:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:00.300:    Hostname: DEMO_1242AG
    Apr  4 12:15:00.300: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:00.301: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:00.301: DHCP: SDiscover 296 bytes
    Apr  4 12:15:00.301:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:04.301: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:15:04.301: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:04.302: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:04.302:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:04.302:    DHCP transaction id: 1132
    Apr  4 12:15:04.302:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:04.302:    Next timer fires after: 00:00:04
    Apr  4 12:15:04.302:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:04.302:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:04.302:    Hostname: DEMO_1242AG
    Apr  4 12:15:04.302: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:04.303: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:04.303: DHCP: SDiscover 296 bytes
    Apr  4 12:15:04.303:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:08.303: DHCP: QScan: Timed out Selecting state
    Apr  4 12:15:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:15:17.303: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:15:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:48.303: DHCP: QScan: Purging entry
    Apr  4 12:15:48.303: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:15:48.303: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:48.303: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:48.303:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:15:48.303:    DHCP transaction id: 1132
    Apr  4 12:15:48.303:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:48.303:    No timer running
    Apr  4 12:15:48.303:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:48.303:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:48.303:    Hostname: DEMO_1242AG
    Apr  4 12:15:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:17.303: DHCP: Try 16 to acquire address for FastEthernet0
    Apr  4 12:16:17.304: DHCP: allocate request
    Apr  4 12:16:17.304: DHCP: new entry. add to queue
    Apr  4 12:16:17.304: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:16:17.304: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:17.304: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:17.304:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:17.304:    DHCP transaction id: 1133
    Apr  4 12:16:17.304:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:17.304:    Next timer fires after: 00:00:04
    Apr  4 12:16:17.304:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:17.305:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:17.305:    Hostname: DEMO_1242AG
    Apr  4 12:16:17.305: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:17.305: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:17.305: DHCP: SDiscover 296 bytes
    Apr  4 12:16:17.305:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:20.307: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:16:20.307: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:20.307: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:20.308:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:20.308:    DHCP transaction id: 1133
    Apr  4 12:16:20.308:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:20.308:    Next timer fires after: 00:00:04
    Apr  4 12:16:20.308:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:20.308:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:20.308:    Hostname: DEMO_1242AG
    Apr  4 12:16:20.308: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:20.309: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:20.309: DHCP: SDiscover 296 bytes
    Apr  4 12:16:20.309:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:24.309: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:16:24.309: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:24.310: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:24.310:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:24.310:    DHCP transaction id: 1133
    Apr  4 12:16:24.310:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:24.310:    Next timer fires after: 00:00:04
    Apr  4 12:16:24.310:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:24.310:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:24.310:    Hostname: DEMO_1242AG
    Apr  4 12:16:24.310: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:24.311: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:24.311: DHCP: SDiscover 296 bytes
    Apr  4 12:16:24.311:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:28.311: DHCP: QScan: Timed out Selecting state
    Apr  4 12:16:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:16:37.311: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:16:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:08.311: DHCP: QScan: Purging entry
    Apr  4 12:17:08.311: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:17:08.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:08.311: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:08.311:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:17:08.312:    DHCP transaction id: 1133
    Apr  4 12:17:08.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:08.312:    No timer running
    Apr  4 12:17:08.312:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:08.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:08.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:37.311: DHCP: Try 17 to acquire address for FastEthernet0
    Apr  4 12:17:37.311: DHCP: allocate request
    Apr  4 12:17:37.311: DHCP: new entry. add to queue
    Apr  4 12:17:37.311: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:17:37.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:37.312: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:37.312:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:37.312:    DHCP transaction id: 1134
    Apr  4 12:17:37.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:37.312:    Next timer fires after: 00:00:04
    Apr  4 12:17:37.312:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:37.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:37.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:37.312: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:37.313: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:37.313: DHCP: SDiscover 296 bytes
    Apr  4 12:17:37.313:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:40.315: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:17:40.315: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:40.315: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:40.315:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:40.315:    DHCP transaction id: 1134
    Apr  4 12:17:40.315:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:40.315:    Next timer fires after: 00:00:04
    Apr  4 12:17:40.315:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:40.315:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:40.316:    Hostname: DEMO_1242AG
    Apr  4 12:17:40.316: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:40.316: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:40.316: DHCP: SDiscover 296 bytes
    Apr  4 12:17:40.316:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:44.317: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:17:44.317: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:44.317: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:44.317:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:44.317:    DHCP transaction id: 1134
    Apr  4 12:17:44.317:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:44.317:    Next timer fires after: 00:00:04
    Apr  4 12:17:44.317:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:44.318:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:44.318:    Hostname: DEMO_1242AG
    Apr  4 12:17:44.318: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:44.318: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:44.318: DHCP: SDiscover 296 bytes
    Apr  4 12:17:44.318:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:48.319: DHCP: QScan: Timed out Selecting state
    Apr  4 12:17:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:17:57.319: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:18:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:18:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#debug dhc
    DEMO_1242AG#debug dhcp detai
    DEMO_1242AG#debug dhcp detail
    DHCP client activity debugging is on (detailed)
    DEMO_1242AG#
    Apr  4 12:10:57.289: DHCP: Try 12 to acquire address for FastEthernet0
    Apr  4 12:10:57.289: DHCP: allocate request
    Apr  4 12:10:57.289: DHCP: new entry. add to queue
    Apr  4 12:10:57.289: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:10:57.289: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:10:57.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:10:57.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:10:57.290:    DHCP transaction id: 112F
    Apr  4 12:10:57.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:10:57.290:    Next timer fires after: 00:00:04
    Apr  4 12:10:57.290:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:10:57.290:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:10:57.290:    Hostname: DEMO_1242AG
    Apr  4 12:10:57.290: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:10:57.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:10:57.291: DHCP: SDiscover 296 bytes
    Apr  4 12:10:57.291:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:00.291: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:11:00.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:00.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:00.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:00.291:    DHCP transaction id: 112F
    Apr  4 12:11:00.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:00.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:00.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:00.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:00.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:00.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:00.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:00.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:00.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:04.291: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:11:04.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:04.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:04.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:04.291:    DHCP transaction id: 112F
    Apr  4 12:11:04.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:04.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:04.291:    Retry count: 3   Client-ID: 0019.3076  de.cc7c
    Apr  4 12:11:04.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:04.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:04.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:04.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:04.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:04.292:             B'cast on FastEthernet0 interface from 0.0.0.0b
    ug ip udp
    UDP packet debugging is on
    DEMO_1242AG#
    Apr  4 12:11:08.291: DHCP: QScan: Timed out Selecting statedebug lwap
    DEMO_1242AG#debug lwapp cli
    DEMO_1242AG#debug lwapp client ev
    DEMO_1242AG#debug lwapp client event
    LWAPP Client EVENT display debugging is on
    DEMO_1242AG#%Unknown DHCP problem.. No allocation possible
    Apr  4 12:11:17.292: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:11:22.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:32.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:42.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:48.291: DHCP: QScan: Purging entry
    Apr  4 12:11:48.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:11:48.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:48.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:48.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:11:48.291:    DHCP transaction id: 112F
    Apr  4 12:11:48.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:48.291:    No timer running
    Apr  4 12:11:48.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:48.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:48.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:52.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:02.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:17.292: DHCP: Try 13 to acquire address for FastEthernet0
    Apr  4 12:12:17.292: DHCP: allocate request
    Apr  4 12:12:17.292: DHCP: new entry. add to queue
    Apr  4 12:12:17.292: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:12:17.292: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:17.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:17.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:17.293:    DHCP transaction id: 1130
    Apr  4 12:12:17.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:17.293:    Next timer fires after: 00:00:04
    Apr  4 12:12:17.293:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:17.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:17.293:    Hostname: DEMO_1242AG
    Apr  4 12:12:17.293: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:17.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:17.294: DHCP: SDiscover 296 bytes
    Apr  4 12:12:17.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:21.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:12:21.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:21.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:21.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:21.290:    DHCP transaction id: 1130
    Apr  4 12:12:21.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:21.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:21.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:21.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:21.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:21.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:21.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:21.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:21.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:25.290: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:12:25.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:25.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:25.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:25.290:    DHCP transaction id: 1130
    Apr  4 12:12:25.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:25.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:25.291:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:25.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:25.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:25.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:25.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:25.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:25.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:29.290: DHCP: QScan: Timed out Selecting state
    Apr  4 12:12:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:12:37.294: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:12:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:08.291: DHCP: QScan: Purging entry
    Apr  4 12:13:08.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:13:08.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:08.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:08.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:13:08.291:    DHCP transaction id: 1130
    Apr  4 12:13:08.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:08.291:    No timer running
    Apr  4 12:13:08.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:08.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:08.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:37.294: DHCP: Try 14 to acquire address for FastEthernet0
    Apr  4 12:13:37.294: DHCP: allocate request
    Apr  4 12:13:37.294: DHCP: new entry. add to queue
    Apr  4 12:13:37.294: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:13:37.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:37.295: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:37.295:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:37.295:    DHCP transaction id: 1131
    Apr  4 12:13:37.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:37.295:    Next timer fires after: 00:00:04
    Apr  4 12:13:37.295:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:37.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:37.295:    Hostname: DEMO_1242AG
    Apr  4 12:13:37.295: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:37.296: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:37.296: DHCP: SDiscover 296 bytes
    Apr  4 12:13:37.296:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:41.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:13:41.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:41.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:41.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:41.290:    DHCP transaction id: 1131
    Apr  4 12:13:41.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:41.291:    Next timer fires after: 00:00:04
    Apr  4 12:13:41.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:41.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:41.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:41.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:41.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:41.291: DHCP: SDiscover 296 bytes
    Apr  4 12:13:41.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:45.293: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:13:45.293: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:45.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:45.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:45.293:    DHCP transaction id: 1131
    Apr  4 12:13:45.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:45.293:    Next timer fires after: 00:00:04
    Apr  4 12:13:45.293:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:45.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:45.293:    Hostname: DEMO_1242AG
    Apr  4 12:13:45.294: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:45.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:45.294: DHCP: SDiscover 296 bytes
    Apr  4 12:13:45.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:49.295: DHCP: QScan: Timed out Selecting state
    Apr  4 12:13:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:13:57.296: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:14:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:28.294: DHCP: QScan: Purging entry
    Apr  4 12:14:28.294: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:14:28.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:28.294: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:28.294:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:14:28.295:    DHCP transaction id: 1131
    Apr  4 12:14:28.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:28.295:    No timer running
    Apr  4 12:14:28.295:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:28.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:28.295:    Hostname: DEMO_1242AG
    Apr  4 12:14:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:57.295: DHCP: Try 15 to acquire address for FastEthernet0
    Apr  4 12:14:57.296: DHCP: allocate request
    Apr  4 12:14:57.296: DHCP: new entry. add to queue
    Apr  4 12:14:57.296: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:14:57.296: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:57.296: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:57.296:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:14:57.296:    DHCP transaction id: 1132
    Apr  4 12:14:57.296:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:57.296:    Next timer fires after: 00:00:04
    Apr  4 12:14:57.296:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:57.297:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:57.297:    Hostname: DEMO_1242AG
    Apr  4 12:14:57.297: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:14:57.297: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:14:57.297: DHCP: SDiscover 296 bytes
    Apr  4 12:14:57.297:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:00.299: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:15:00.299: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:00.299: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:00.300:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:00.300:    DHCP transaction id: 1132
    Apr  4 12:15:00.300:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:00.300:    Next timer fires after: 00:00:04
    Apr  4 12:15:00.300:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:00.300:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:00.300:    Hostname: DEMO_1242AG
    Apr  4 12:15:00.300: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:00.301: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:00.301: DHCP: SDiscover 296 bytes
    Apr  4 12:15:00.301:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:04.301: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:15:04.301: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:04.302: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:04.302:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:04.302:    DHCP transaction id: 1132
    Apr  4 12:15:04.302:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:04.302:    Next timer fires after: 00:00:04
    Apr  4 12:15:04.302:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:04.302:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:04.302:    Hostname: DEMO_1242AG
    Apr  4 12:15:04.302: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:04.303: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:04.303: DHCP: SDiscover 296 bytes
    Apr  4 12:15:04.303:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:08.303: DHCP: QScan: Timed out Selecting state
    Apr  4 12:15:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:15:17.303: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:15:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:48.303: DHCP: QScan: Purging entry
    Apr  4 12:15:48.303: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:15:48.303: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:48.303: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:48.303:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:15:48.303:    DHCP transaction id: 1132
    Apr  4 12:15:48.303:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:48.303:    No timer running
    Apr  4 12:15:48.303:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:48.303:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:48.303:    Hostname: DEMO_1242AG
    Apr  4 12:15:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:17.303: DHCP: Try 16 to acquire address for FastEthernet0
    Apr  4 12:16:17.304: DHCP: allocate request
    Apr  4 12:16:17.304: DHCP: new entry. add to queue
    Apr  4 12:16:17.304: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:16:17.304: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:17.304: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:17.304:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:17.304:    DHCP transaction id: 1133
    Apr  4 12:16:17.304:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:17.304:    Next timer fires after: 00:00:04
    Apr  4 12:16:17.304:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:17.305:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:17.305:    Hostname: DEMO_1242AG
    Apr  4 12:16:17.305: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:17.305: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:17.305: DHCP: SDiscover 296 bytes
    Apr  4 12:16:17.305:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:20.307: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:16:20.307: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:20.307: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:20.308:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:20.308:    DHCP transaction id: 1133
    Apr  4 12:16:20.308:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:20.308:    Next timer fires after: 00:00:04
    Apr  4 12:16:20.308:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:20.308:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:20.308:    Hostname: DEMO_1242AG
    Apr  4 12:16:20.308: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:20.309: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:20.309: DHCP: SDiscover 296 bytes
    Apr  4 12:16:20.309:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:24.309: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:16:24.309: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:24.310: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:24.310:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:24.310:    DHCP transaction id: 1133
    Apr  4 12:16:24.310:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:24.310:    Next timer fires after: 00:00:04
    Apr  4 12:16:24.310:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:24.310:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:24.310:    Hostname: DEMO_1242AG
    Apr  4 12:16:24.310: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:24.311: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:24.311: DHCP: SDiscover 296 bytes
    Apr  4 12:16:24.311:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:28.311: DHCP: QScan: Timed out Selecting state
    Apr  4 12:16:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:16:37.311: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:16:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:08.311: DHCP: QScan: Purging entry
    Apr  4 12:17:08.311: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:17:08.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:08.311: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:08.311:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:17:08.312:    DHCP transaction id: 1133
    Apr  4 12:17:08.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:08.312:    No timer running
    Apr  4 12:17:08.312:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:08.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:08.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:37.311: DHCP: Try 17 to acquire address for FastEthernet0
    Apr  4 12:17:37.311: DHCP: allocate request
    Apr  4 12:17:37.311: DHCP: new entry. add to queue
    Apr  4 12:17:37.311: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:17:37.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:37.312: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:37.312:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:37.312:    DHCP transaction id: 1134
    Apr  4 12:17:37.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:37.312:    Next timer fires after: 00:00:04
    Apr  4 12:17:37.312:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:37.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:37.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:37.312: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:37.313: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:37.313: DHCP: SDiscover 296 bytes
    Apr  4 12:17:37.313:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:40.315: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:17:40.315: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:40.315: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:40.315:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:40.315:    DHCP transaction id: 1134
    Apr  4 12:17:40.315:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:40.315:    Next timer fires after: 00:00:04
    Apr  4 12:17:40.315:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:40.315:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:40.316:    Hostname: DEMO_1242AG
    Apr  4 12:17:40.316: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:40.316: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:40.316: DHCP: SDiscover 296 bytes
    Apr  4 12:17:40.316:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:44.317: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:17:44.317: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:44.317: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:44.317:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:44.317:    DHCP transaction id: 1134
    Apr  4 12:17:44.317:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:44.317:    Next timer fires after: 00:00:04
    Apr  4 12:17:44.317:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:44.318:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:44.318:    Hostname: DEMO_1242AG
    Apr  4 12:17:44.318: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:44.318: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:44.318: DHCP: SDiscover 296 bytes
    Apr  4 12:17:44.318:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:48.319: DHCP: QScan: Timed out Selecting state
    Apr  4 12:17:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:17:57.319: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:18:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:18:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    THIS IS FROM THER CONTROLLER  BELOW THAT IS.
    =============================================
    (Cisco Controller) >config se?
    serial         service        sessions
    (Cisco Controller) >config sessions timeout 120
    (Cisco Controller) >config se?
    serial         service        sessions
    (Cisco Controller) >config serial timeout 120
    (Cisco Controller) >debug mac addr 00:19:30:76:cc:7c
    (Cisco Controller) >debug client ?
         MAC address
    (Cisco Controller) >debug client 00:19:30:76:cc:7c
    (Cisco Controller) >debug lwapp events enable
    (Cisco Controller) >debug lwapp errors enable
    (Cisco Controller) >debug pm ?
    all            Used to disable all debug in policy manager module
    init           Configures debug of policy manager initialization events
    config         Configures debug of policy manager configuration
    rules          Configures debug of layer 3 policy events
    message        Configures debug of policy manager message queue events
    pki            Configures debug of PKI-related events
    sa-export      Configures debug of SA export (mobility)
    sa-import      Configures debug of SA import (mobility)
    hwcrypto       Configures debug of hardware offload events
    rng            Configures debug of random number generation
    ssh-pmgr       Configures debug of the policy manager policy mgr
    ssh-engine     Configures debug of the policy manager engine
    ssh-int        Configures debug of the policy manager interceptor
    ssh-appgw      Configures debug of application gateways
    ssh-tcp        Configures debug of policy manager tcp handling
    ssh-l2tp       Configures debug of policy manager l2tp handling
    ssh-ppp        Configures debug of policy manager ppp handling
    list           Configures debug of policy manager list mgmt
    ikemsg         Configures debug of IKE messages
    (Cisco Controller) >debug pm pki enable
    (Cisco Controller) >Mon Apr  4 12:14:58 2011: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000
    Mon Apr  4 12:14:58 2011: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000

  • My iMac won't join the correct network

    This is a new iMac with Lion.  The network is ok because all my other devices work fine with it.  The network is in the list and when I select it my mac joins without problem, but won't join it automatically.  I've also tried to move my network up in the list but that doesn't seem to work either.

    Mine is the only network listed in the Perferred Networks List in the advanced settings.  The "Remember networks this computer has joined" is checked. 
    The problem is that when I wake my computer up, it won't find the network.  I updated my airport extreme last week and this problem started after that.  However, none of the other devices using this network are having any problems.

  • 11gR1 1 node won't join the cluster after reboot.

    This is a high level description of a problem.
    We usually run a two node cluster.
    This week we had an issue where one node needed to be taken down. It became non responsive and upon reboot the other node no longer functioned correctly.
    So one node was left running until the maintenance window.
    Apparently when it's brought back up it has the MAC of the second node in the arp cache.
    This leads to node1 not being able to join the cluster.
    I've seen workarounds that involve refreshing the arp cache but is there anything else to this?

    This is a high level description of a problem.
    We usually run a two node cluster.
    This week we had an issue where one node needed to be taken down. It became non responsive and upon reboot the other node no longer functioned correctly.
    So one node was left running until the maintenance window.
    Apparently when it's brought back up it has the MAC of the second node in the arp cache.
    This leads to node1 not being able to join the cluster.
    I've seen workarounds that involve refreshing the arp cache but is there anything else to this?

  • TS1398 my ipod touch won't join the wifi network even after entering correct password. it just keeps trying to join but I can't use internet

    My home wifi is working for all my other apple devices but my daughter's Ipod Touch won't connect. It recognises the network and attempts to join it as usual but it just keeps 'trying' without actually connecting. Have switched on and off, renewed lease, reset networks etc - basically everything I can think of but no luck. Any help much appreciated.

    Try restarting your router, if you are still having problems try resetting your network settings.  Go into your settings>reset then tap reset network settings. 

  • APs (LAP1142N) are disconnecting after joining the WLC (5508)

    Hi,
    We are having a problem at the school I'm working at. There are 133 APs located across campus.
    They have been running for 3.5 years without any trouble.
    Recently we have been having issues with APs disconnecting at random.
    It started last week with just a couple. We got them running again, but later the same day new ones had disconnected.
    This has continued with more APs and it looks like it happens at random and it is never the same one that disconnects.
    We have a centralized support-unit that helps us with stuff like this, but they haven't come up with a solution, so I was hoping someone here had seen this behavior before.
    Today at 7AM all the APs were running, but at the time of this post 6 of them have disconnected.
    AP (130 of them):
    Product ID: AIR-LAP1142N-E-K9
    Version ID: V01
    Software Version: 7.4.100.0
    Boot version: 12.4.18.3
    IOS: 15.2(2)JB$
    Country Code: Norway (NO)
    Regulatory domains: 802.11bg:-E    802.11a:-E
    Controller:
    Cisco 5508 Wireless Controller
    Firmware: 7.4.100.0
    Recovery version: 6.0.182.0
    Temp is running at 35C
    Memory at a stable 50%
    Cores 0%/2%, 4%/2%, 3%/2%, 4%/1%, 3%/3%, 5%/2%, 0%/1%, 0%/1%, 0%/1%, 0%/1%
    Only using 4 of the ports on the controller 1-4
    Some of the error-messages I have located on the different APs that have disconnected:
    Layer 3 discovery request not received on management VLAN
    Lwapp discovery request rejected
    Just give me a shout if any other information is needed.
    - Hille

    You may be facing this bug CSCud97983
    https://tools.cisco.com/bugsearch/bug/CSCud97983
    Here are some more information about bugs we experienced with this 7.4 code
    http://mrncciew.com/2013/02/10/day-0-with-wlc-7-4-code/
    7.4MR2 (7.4.111.x) is available (pre-release image) if you want latest bug fixed image. This is specially if you are using wireless guest service & having apple iOS 7 devices.
    https://supportforums.cisco.com/docs/DOC-37334
    HTH
    Rasika
    **** Pls rate all useful responses ****

  • How to join the AP to the WLC

    Hi All,
    I am new to Cisco wireless solution and would like to ask how to add the AP to the WLC properly. All Cisco 1041 and Cisco 2500 WLC are new. I connect those AP and WLC to the switch without any VLAN tag and the AP can gain the IP address from our DHCP correctly. However, the AP 1041 could not join the WLC successfully. Here is the log. I really do not have any idea about that and hope someone can help. Many thanks.
    WLC: Cisco 2500
    IP Address: 192.168.1.225
    version: 7.4.100.0
    AP: 1041
    IP Address (DHCP): 192.168.1.195
    version: 15.2(2)JB
    I also checked the following item.
    - WLC already enable Accept Manufactured Installed Certificate (MIC) in WLC -> Security -> AP Policy
    - WLC can ping AP and vice versa
    - WLC has 5 AP license
    - All configuration are default setting
    - Tried to issued join command in AP manually but no luck "lwapp ap controller ip add 192.168.1.225"
    AP 1041 Log
    *May 16 14:02:41.145: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down*May 16 14:02:41.180: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:02:42.145: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down*May 16 14:02:42.172: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down*May 16 14:02:42.176: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset*May 16 14:02:43.197: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:02:44.197: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up*May 16 14:02:51.178: %CAPWAP-3-ERRORLOG: Go join a capwap controller *May 16 14:02:52.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.225 peer_port: 5246*May 16 14:02:52.905: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.225 peer_port: 5246*May 16 14:02:52.906: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.225
    *May 16 14:02:52.908: %CAPWAP-3-ERRORLOG: Invalid event 10 & state 5 combination.*May 16 14:02:52.908: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 10 state 5.*May 16 14:02:52.909: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller*May 16 14:02:52.909: %CAPWAP-3-ERRORLOG: Failed to process encrypted capwap packet from 192.168.1.225., 1)16 14:03:11.059: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(UNKNOWN_MESSAGE_TYPE (5)*May 16 14:03:11.059: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE*May 16 14:03:11.060: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.225:5246*May 16 14:03:11.111: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255*May 16 14:03:11.111: bsnInitRcbSlot: slot 1 has NO radio*May 16 14:03:11.132: %CAPWAP-3-ERRORLOG: Binding Config Initialization failed for binding 1*May 16 14:03:11.138: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down*May 16 14:03:11.174: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:03:12.138: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down*May 16 14:03:12.165: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down*May 16 14:03:12.170: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset*May 16 14:03:13.190: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up*May 16 14:03:14.190: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    APbc16.65d6.7e4b#show ip int briefInterface                  IP-Address      OK? Method Status                ProtocolBVI1                       192.168.1.195   YES DHCP   up                    up      Dot11Radio0                unassigned      NO  unset  up                    up      GigabitEthernet0           unassigned      NO  unset  up                    up      GigabitEthernet0.1         unassigned      YES unset  up                    up     
    WLC 2500
    (Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.4.100.0Bootloader Version............................... 1.0.16Field Recovery Image Version..................... 1.0.0Firmware Version................................. PIC 16.0Build Type....................................... DATA + WPSSystem Name...................................... S_HK_AC_CT2504_1System Location.................................. System Contact................................... System ObjectID.................................. 1.3.6.1.4.1.9.1.1279IP Address....................................... 203.85.90.225Last Reset....................................... Power on resetSystem Up Time................................... 1 days 0 hrs 29 mins 1 secsSystem Timezone Location......................... System Stats Realtime Interval................... 5System Stats Normal Interval..................... 180
    (Cisco Controller) >show ap join stats summary allNumber of APs.............................................. 3 Base Mac             AP EthernetMac       AP Name                 IP Address         Statusbc:16:65:d6:7e:40    bc:16:65:d6:7e:40    APbc16.65d6.7e4b        192.168.1.195      Not Joinedbc:16:65:d6:7e:4b    N A                  N A                     192.168.1.195      Not Joinedf4:1f:c2:d0:bb:20    bc:16:65:d6:7e:4b    APbc16.65d6.7e4b        192.168.1.195      Not Joined
    (Cisco Controller) >show interface summary Number of Interfaces.......................... 3Interface Name                   Port Vlan Id  IP Address      Type    Ap Mgr Guest-------------------------------- ---- -------- --------------- ------- ------ -----management                       1    untagged 192.168.1.225   Static  Yes    No   virtual                          N/A  N/A      1.1.1.1         Static  No     No  
    Rgds,
    Jacky

    leolaohoo wrote:Something is missing from the output to the command "sh sysinfo".  What country code did you enable? On the AP, post the output to the command "sh version" and "sh inventory".
    Hi Leolaohoo, thanks for your prompt reply. Please it below. I am using Hong Kong as the country code in WLC. Thanks.
    WLC
    (Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.4.100.0Bootloader Version............................... 1.0.16Field Recovery Image Version..................... 1.0.0Firmware Version................................. PIC 16.0Build Type....................................... DATA + WPSSystem Name...................................... S_HK_AC_CT2504_1System Location.................................. System Contact................................... System ObjectID.................................. 1.3.6.1.4.1.9.1.1279IP Address....................................... 192.168.1.225Last Reset....................................... Power on resetSystem Up Time................................... 1 days 1 hrs 15 mins 49 secsSystem Timezone Location......................... System Stats Realtime Interval................... 5System Stats Normal Interval..................... 180--More-- or (q)uitConfigured Country............................... HK  - Hong KongOperating Environment............................ Commercial (0 to 40 C)Internal Temp Alarm Limits....................... 0 to 65 CInternal Temperature............................. +31 CExternal Temperature............................. +36 CFan Status....................................... 4100 rpmState of 802.11b Network......................... DisabledState of 802.11a Network......................... DisabledNumber of WLANs.................................. 2Number of Active Clients......................... 0Memory Current Usage............................. UnknownMemory Average Usage............................. UnknownCPU Current Usage................................ UnknownCPU Average Usage................................ UnknownBurned-in MAC Address............................ F0:29:29:88:98:20Maximum number of APs supported.................. 5
    AP
    APbc16.65d6.7e4b#show verCisco IOS Software, C1040 Software (C1140-K9W8-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2012 by Cisco Systems, Inc.Compiled Tue 11-Dec-12 04:03 by prod_rel_teamROM: Bootstrap program is C1040 boot loaderBOOTLDR: C1040 Boot Loader (C1140-BOOT-M) Version 12.4(23c)JA6, RELEASE SOFTWARE (fc1)APbc16.65d6.7e4b uptime is 20 hours, 32 minutesSystem returned to ROM by reloadSystem image file is "flash:/c1140-k9w8-mx.152-2.JB/c1140-k9w8-mx.152-2.JB"Last reload reason: This product contains cryptographic features and is subject to UnitedStates and local country laws governing import, export, transfer anduse. Delivery of Cisco cryptographic products does not implythird-party authority to import, export, distribute or use encryption.Importers, exporters, distributors and users are responsible forcompliance with U.S. and local country laws. By using this product youagree to comply with applicable laws and regulations. If you are unableto comply with U.S. and local laws, return this product immediately.A summary of U.S. laws governing Cisco cryptographic products may be found at:http://www.cisco.com/wwl/export/crypto/tool/stqrg.htmlIf you require further assistance please contact us by sending email [email protected] AIR-LAP1041N-E-K9    (PowerPC405ex) processor (revision B0) with 81910K/49152K bytes of memory.Processor board ID FGL1718S4RMPowerPC405ex CPU at 333Mhz, revision number 0x147ELast reset from reloadLWAPP image version 7.4.100.01 Gigabit Ethernet interface1 802.11 Radio32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: BC:16:65:D6:7E:4BPart Number                          : 73-14034-06PCA Assembly Number                  : 800-34273-07PCA Revision Number                  : A0PCB Serial Number                    : FOC17160EPLTop Assembly Part Number             : 800-34284-05Top Assembly Serial Number           : FGL1718S4RMTop Revision Number                  : A0Product/Model Number                 : AIR-LAP1041N-E-K9   Configuration register is 0xF
    APbc16.65d6.7e4b#show inventoryNAME: "AP1040", DESCR: "Cisco Aironet 1040 Series (IEEE 802.11n) Access Point"PID: AIR-LAP1041N-E-K9 , VID: V05, SN: FGL1718S4RM
    Thanks and Best Regards,
    Jacky

  • Trouble getting Cisco 2600 Series AP to stay joined to WLC 5508

    Hi,
    I have recently been tasked with upgrading our old Autonomous APs to LWAPs.  We have a 5508 WLC at our Virtual Co-Lo and I am using Flexconnect to accomadate local switching and dhcp at our sites.  I have upgraded over 50 APs and joined them to the controller.  These include only 1130AG and 1240AG models.  However they are working flawlessly and staying connected to the controller.  The issue I'm having is with a new batch of 2600 series APs staying connected to the controller.  I have attempted to do research into what may be causing the disconnects but have yet to find a solution.  I am using DNS to resolve the CAPWAP & LWAPP queries from the APs to the controller accross our WAN.  In reading other posts I thought it may be an issue with packets getting dropped but have had our Vendor who manages Sonicwalls at both ends of the WAN confirm for me there is no packet loss.  Below are logs I gathered using puttty from the AP & WLC.  Any help would be greatly appreciated.
    AP I'm doing the testing on:
    NAME: "AP2600", DESCR: "Cisco Aironet 2600 Series (IEEE 802.11n) Access Point"
    PID: AIR-CAP2602I-A-K9 , VID: V01, SN: FTX1740J8V1
    WLC in question:
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.3.112.0
    Bootloader Version............................... 1.0.1
    Field Recovery Image Version..................... 6.0.182.0
    Firmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27
    Build Type....................................... DATA + WPS
    System Name...................................... wificontroller
    System Location.................................. Corp
    System Contact................................... Net Engineer
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    Redundancy Mode.................................. Disabled
    IP Address....................................... 10.250.32.8
    Last Reset....................................... Software reset
    System Up Time................................... 190 days 3 hrs 34 mins 24 secs
    System Timezone Location......................... (GMT -5:00) Eastern Time (US and Canada)
    Configured Country............................... US  - United States
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    --More-- or (q)uit
    Internal Temperature............................. +38 C
    External Temperature............................. +20 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 14
    Number of Active Clients......................... 71
    Burned-in MAC Address............................ C8:9C:1D:8C:52:E0
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 100
    Here is the output that keeps on occuring as the AP joins the WLC for a brief time and then changes to standalone mode
    WT-4thFlr-AP3#
    *Dec 14 15:42:04.419: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(CAPWAP_WTP_EVENT_REQUEST
    ., 3)
    *Dec 14 15:42:11.443: %EVT-4-WRN: Write of flash:/event.capwap done
    *Dec 14 15:42:11.483: %LWAPP-3-CLIENTERRORLOG: Switching to Standalone mode
    *Dec 14 15:42:11.487: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE
    *Dec 14 15:42:11.487: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.250.32.8:5246
    *Dec 14 15:42:11.571: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Dec 14 15:42:21.575: %CAPWAP-3-ERRORLOG: Selected MWAR 'wificontroller'(index 0).
    *Dec 14 15:42:21.575: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 14 15:42:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:42:14.303: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:42:14.303: %CAPWAP-5-SENDJOIN: sending Join Request to 10.250.32.8
    *Dec 14 15:42:15.127: Starting Ethernet promiscuous mode
    *Dec 14 15:42:15.535: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Dec 14 15:42:15.667: ac_first_hop_mac - IP:10.1.2.250 Hop IP:10.1.2.250 IDB:BVI1
    *Dec 14 15:42:15.667: Setting AC first hop MAC: 0017.c575.a23c
    *Dec 14 15:42:15.855: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller wificontroller
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No LS Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.915: %LWAPP-4-CLIENTEVENTLOG: No Central Dhcp map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.915: %LWAPP-3-CLIENTERRORLOG: Switching to Connected mode
    *Dec 14 15:42:23.639: %WIDS-6-ENABLED: IDS Signature is loaded and enabled
    *Dec 14 15:42:34.615: %CLEANAIR-6-STATE: Slot 0 disabled
    *Dec 14 15:42:34.615: %CLEANAIR-6-STATE: Slot 1 disabled
    *Dec 14 15:45:43.783: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(CAPWAP_WTP_EVENT_REQUEST
    ., 11)
    *Dec 14 15:45:43.787: %LWAPP-3-CLIENTERRORLOG: Switching to Standalone mode
    *Dec 14 15:45:43.787: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE
    *Dec 14 15:45:43.787: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.250.32.8:5246
    *Dec 14 15:45:43.867: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Dec 14 15:45:53.867: %CAPWAP-3-ERRORLOG: Selected MWAR 'wificontroller'(index 0).
    *Dec 14 15:45:53.867: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 14 15:45:44.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:45:46.315: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:45:46.315: %CAPWAP-5-SENDJOIN: sending Join Request to 10.250.32.8
    *Dec 14 15:45:46.487: Starting Ethernet promiscuous mode
    *Dec 14 15:45:49.903: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Dec 14 15:45:50.031: ac_first_hop_mac - IP:10.1.2.250 Hop IP:10.1.2.250 IDB:BVI1
    *Dec 14 15:45:50.031: Setting AC first hop MAC: 0017.c575.a23c
    Here are the results of debug capwap client event on the AP:
    WT-4thFlr-AP3#debug capwap client event
    CAPWAP Client EVENT display debugging is on
    WT-4thFlr-AP3#
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:55:08.000: %CAPWAP-3-EVENTLOG: Setting time to 15:55:08 UTC Dec 14 2013
    *Dec 14 15:55:25.579: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:55:25.827: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:55:56.000: %CAPWAP-3-EVENTLOG: Setting time to 15:55:56 UTC Dec 14 2013
    *Dec 14 15:56:25.735: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:56:25.983: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:56:56.000: %CAPWAP-3-EVENTLOG: Setting time to 15:56:56 UTC Dec 14 2013
    Here are the results of debug capwap client packet detail:
    WT-4thFlr-AP3#
    *Dec 14 15:59:01.823: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.823: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:01.823:         Msg Type   : CAPWAP_ECHO_REQUEST
    *Dec 14 15:59:01.823:         Msg Length : 0
    *Dec 14 15:59:01.823:         Msg SeqNum : 44
    *Dec 14 15:59:01.823: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.831: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.831: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:01.831:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:01.831:         Msg Type   : CAPWAP_ECHO_RESPONSE
    *Dec 14 15:59:01.831:         Msg Length : 15
    *Dec 14 15:59:01.831:         Msg SeqNum : 44
    *Dec 14 15:59:01.831: 
    *Dec 14 15:59:01.831:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 11
    *Dec 14 15:59:01.831:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:01.831:
    *Dec 14 15:59:01.831:
        IE            :   UNKNOWN IE 151
    *Dec 14 15:59:01.831:     IE Length     :   5
    *Dec 14 15:59:01.831:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:01.831:
    52 AC 80 46 00
    *Dec 14 15:59:01.831: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:20.931:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:20.931:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:20.931:         Msg Length : 93
    *Dec 14 15:59:20.931:         Msg SeqNum : 38
    *Dec 14 15:59:20.931: 
    *Dec 14 15:59:20.931:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 89
    *Dec 14 15:59:20.931:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:20.931:
    *Dec 14 15:59:20.931:
        IE            :   RRM_NEIGHBOR_CTRL_PAYLOAD
    *Dec 14 15:59:20.931:     IE Length     :   83
    *Dec 14 15:59:20.931:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:20.931:
    00 0A FA 20 08 01 F4 00 07 0A FA 20 08 03 00 01
    01 00 3C 00 B4 2E 06 2E E7 B4 94 51 B2 C7 79 25
    22 FD BE 04 F6 00 00 00 00 00 00 00 00 4F 50 52
    53 2D 57 69 46 69 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 01 06 0B
    01 01 01
    *Dec 14 15:59:20.931: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:20.931:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:20.931:         Msg Length : 8
    *Dec 14 15:59:20.931:         Msg SeqNum : 38
    *Dec 14 15:59:20.931: 
    *Dec 14 15:59:20.931:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:20.931:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:20.931: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.139: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.139: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:21.139:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:21.139:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:21.139:         Msg Length : 111
    *Dec 14 15:59:21.139:         Msg SeqNum : 39
    *Dec 14 15:59:21.139: 
    *Dec 14 15:59:21.139:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 107
    *Dec 14 15:59:21.139:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:21.139:
    *Dec 14 15:59:21.139:
        IE            :   RRM_NEIGHBOR_CTRL_PAYLOAD
    *Dec 14 15:59:21.139:     IE Length     :   101
    *Dec 14 15:59:21.139:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:21.143:
    01 0A FA 20 08 01 F4 00 07 0A FA 20 08 0C 00 01
    01 00 3C 00 B4 2E 06 2E E7 B4 94 51 B2 C7 79 25
    22 FD BE 04 F6 00 00 00 00 00 00 00 00 4F 50 52
    53 2D 57 69 46 69 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 24 28 2C
    30 34 38 3C 40 95 99 9D A1 01 01 01 01 01 01 01
    01 01 01 01 01
    *Dec 14 15:59:21.143: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.143: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.143: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:21.143:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:21.143:         Msg Length : 8
    *Dec 14 15:59:21.143:         Msg SeqNum : 39
    *Dec 14 15:59:21.143: 
    *Dec 14 15:59:21.143:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:21.143:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:21.143: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.547: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.547: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:25.547:         Msg Type   : CAPWAP_WTP_EVENT_REQUEST
    *Dec 14 15:59:25.547:         Msg Length : 14
    *Dec 14 15:59:25.547:         Msg SeqNum : 45
    *Dec 14 15:59:25.547: 
    *Dec 14 15:59:25.547:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *Dec 14 15:59:25.547:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:25.547:
    *Dec 14 15:59:25.547:
        IE            :   RRM_LOAD_DATA_PAYLOAD
    *Dec 14 15:59:25.547:     IE Length     :   4
    *Dec 14 15:59:25.547:          slot 0 rxLoad 0 txLoad 0 ccaLoad 33
    *Dec 14 15:59:25.547: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.555: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.555: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:25.555:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:25.555:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:25.555:         Msg Length : 0
    *Dec 14 15:59:25.555:         Msg SeqNum : 45
    *Dec 14 15:59:25.555: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.795: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.795: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:25.795:         Msg Type   : CAPWAP_WTP_EVENT_REQUEST
    *Dec 14 15:59:25.795:         Msg Length : 14
    *Dec 14 15:59:25.795:         Msg SeqNum : 46
    *Dec 14 15:59:25.795: 
    *Dec 14 15:59:25.795:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *Dec 14 15:59:25.795:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:25.795:
    *Dec 14 15:59:25.795:
        IE            :   RRM_LOAD_DATA_PAYLOAD
    *Dec 14 15:59:25.795:     IE Length     :   4
    *Dec 14 15:59:25.795:          slot 1 rxLoad 0 txLoad 0 ccaLoad 0
    *Dec 14 15:59:25.795: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.803: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.803: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:25.803:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:25.803:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:25.803:         Msg Length : 0
    *Dec 14 15:59:25.803:         Msg SeqNum : 46
    *Dec 14 15:59:25.803: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:30.375:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:30.375:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:30.375:         Msg Length : 17
    *Dec 14 15:59:30.375:         Msg SeqNum : 40
    *Dec 14 15:59:30.375: 
    *Dec 14 15:59:30.375:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 13
    *Dec 14 15:59:30.375:         Vendor Identifier  : 0x00409600
            SlotId                  :   0
            Mobile Mac Addr         :   BC:52:B7:E3:17:CB
    *Dec 14 15:59:30.375: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:30.375:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:30.379:         Msg Length : 8
    *Dec 14 15:59:30.379:         Msg SeqNum : 40
    *Dec 14 15:59:30.379: 
    *Dec 14 15:59:30.379:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:30.379:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:30.379: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.387: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.387: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:30.387:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:30.387:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:30.387:         Msg Length : 0
    *Dec 14 15:59:30.387:         Msg SeqNum : 47
    *Dec 14 15:59:30.387: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.387: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.387: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 16:00:00.387:         Msg Type   : CAPWAP_ECHO_REQUEST
    *Dec 14 16:00:00.387:         Msg Length : 0
    *Dec 14 16:00:00.387:         Msg SeqNum : 48
    *Dec 14 16:00:00.387: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.395: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.395: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 16:00:00.395:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 16:00:00.395:         Msg Type   : CAPWAP_ECHO_RESPONSE
    *Dec 14 16:00:00.395:         Msg Length : 15
    *Dec 14 16:00:00.395:         Msg SeqNum : 48
    *Dec 14 16:00:00.395: 
    *Dec 14 16:00:00.395:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 11
    *Dec 14 16:00:00.395:         Vendor Identifier  : 0x00409600
    *Dec 14 16:00:00.395:
    *Dec 14 16:00:00.395:
        IE            :   UNKNOWN IE 151
    *Dec 14 16:00:00.395:     IE Length     :   5
    *Dec 14 16:00:00.395:     Decode routine not available, Printing Hex Dump
    *Dec 14 16:00:00.395:
    52 AC 80 81 00
    *Dec 14 16:00:00.395: <<<<  End of CAPWAP Packet  >>>>

    Under my AP Policies I only have "Accept Manufactured Installed Certificate (MIC)" checked.  I attempted to add the AP based on MAC Address (c0:67:af:6f:25:70) with this certificate type but still have the same issue.  I then ran the following debug on my controller and this is the output I recieve regarding that MAC.  I tried to cut the output short because it get's somewhat redundant but was unsure what exactly to look for in the output.  Should I be selecting a different certificate type?  I am somewhat new to wireless technologies but doing my best to pick things up so if this seems trivial please forgive my ignorance.
    debug pm pki enable
    *sshpmLscTask: Dec 14 20:42:56.450: sshpmLscTask: LSC Task received a message 4
    *spamApTask6: Dec 14 20:42:58.840: sshpmGetIssuerHandles: locking ca cert table
    *spamApTask6: Dec 14 20:42:58.841: sshpmGetIssuerHandles: calling x509_alloc() for user cert
    *spamApTask6: Dec 14 20:42:58.841: sshpmGetIssuerHandles: calling x509_decode()
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-c067af6f2570, [email protected]
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Mac Address in subject is c0:67:af:6f:25:70
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-c067af6f2570
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: called to evaluate
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: called to get cert for CID 282aef7e
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.845: ssphmUserCertVerify: calling x509_decode()
    *spamApTask6: Dec 14 20:42:58.856: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (current): 2013/12/15/01:42:58
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/08/25/13:01:22
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/08/25/13:11:22
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: getting cisco ID cert handle...
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: called to evaluate
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.857: sshpmFreePublicKeyHandle: called with 0x2c5f0cb8
    *spamApTask6: Dec 14 20:42:58.857: sshpmFreePublicKeyHandle: freeing public key
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: called to evaluate
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: called to get cert for CID 183fd2b6
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: called to evaluate

  • AIR-CAP3501I access point not joining the Cisco 2100 Wireless Lan controller.

    Hello All,
    I am installing a new LAP (AIR-CAP3501I ) through the wireless lan controller (AIR-WLC2112-K9) with software version 7.0. I have an external ADSL modem which will act as the DHCP server for the wireless clients and the LAP.
    Please find my network setup as below:
    The ISP ADSL modem , WLC and LAP are connected to a unmanaged POE switch. The LAP gets its power through the POE switch. When i connect the LAP and the WLC to the switch along with the ADSL modem, the LAPs are getting the ip address from the ADSL modem, however they are not joining the WLC for further process.
    ADSL Modem ip address: 192.168.1.254
    Management ip address on the LAP: 192.168.1.1 ( Assigned to port 1, untagged Vlan).
    Ap Manager ip address: 192.168.1.1 ( Assigned to the same port i.e port1, Untagged Vlan).
    The LAP is getting an IP address from the ADSL modem in the range of the DHCP scope.
    I will paste the logs very soon.
    Please let me know if i am doing anything wrong oe what will be the issue.
    Thanks in advance,
    Mohammed Ameen

    Hello All,
    Please find the logs for  "debug capwap event" from the WLC below:
    *spamReceiveTask: Sep 26 19:44:59.196: e8:04:62:0a:3f:10 Join Version: = 117465600
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 Join resp: CAPWAP Maximum Msg element len = 92
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 Join Response sent to 192.168.1.156:45510
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 CAPWAP State: Join
    *spamReceiveTask: Sep 26 19:44:59.197: e8:04:62:0a:3f:10 capwap_ac_platform.c:1216 - Operation State 0 ===> 4
    *apfReceiveTask: Sep 26 19:44:59.198: e8:04:62:0a:3f:10 Register LWAPP event for AP e8:04:62:0a:3f:10 slot 0
    *spamReceiveTask: Sep 26 19:44:59.341: e8:04:62:0a:d1:20 DTLS connection not found, creating new connection for 192:168:1:158 (45644) 192:168:1:2 (5246)
    *spamReceiveTask: Sep 26 19:45:00.119: e8:04:62:0a:d1:20 DTLS Session established server (192.168.1.2:5246), client (192.168.1.158:45644)
    *spamReceiveTask: Sep 26 19:45:00.119: e8:04:62:0a:d1:20 Starting wait join timer for AP: 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.121: e8:04:62:0a:d1:20 Join Request from 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.123: e8:04:62:0a:d1:20 Join Version: = 117465600
    *spamReceiveTask: Sep 26 19:45:00.123: e8:04:62:0a:d1:20 Join resp: CAPWAP Maximum Msg element len = 92
    *spamReceiveTask: Sep 26 19:45:00.124: e8:04:62:0a:d1:20 Join Response sent to 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.124: e8:04:62:0a:d1:20 CAPWAP State: Join
    *spamReceiveTask: Sep 26 19:45:00.124: e8:04:62:0a:d1:20 capwap_ac_platform.c:1216 - Operation State 0 ===> 4
    *apfReceiveTask: Sep 26 19:45:00.125: e8:04:62:0a:d1:20 Register LWAPP event for AP e8:04:62:0a:d1:20 slot 0
    *spamReceiveTask: Sep 26 19:45:00.273: e8:04:62:0a:d1:20 Configuration Status from 192.168.1.158:45644
    *spamReceiveTask: Sep 26 19:45:00.273: e8:04:62:0a:d1:20 CAPWAP State: Configure
    *spamReceiveTask: Sep 26 19:45:00.273: Invalid channel 1 spacified for the AP APf866.f2ab.24b6, slotId = 0
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Updating IP info for AP e8:04:62:0a:d1:20 -- static 0, 192.168.1.158/255.255.255.0, gtw 192.168.1.254
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Updating IP 192.168.1.158 ===> 192.168.1.158 for AP e8:04:62:0a:d1:20
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Setting MTU to 1485
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Finding DTLS connection to delete for AP (192:168:1:158/45644)
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 Disconnecting DTLS Capwap-Ctrl session 0xa06d6a4 for AP (192:168:1:158/45644)
    *spamReceiveTask: Sep 26 19:45:00.274: e8:04:62:0a:d1:20 CAPWAP State: Dtls tear down
    *spamReceiveTask: Sep 26 19:45:00.277: spamProcessGlobalPathMtuUpdate: Changing Global LRAD MTU to 576
    *spamReceiveTask: Sep 26 19:45:00.277: e8:04:62:0a:d1:20 DTLS connection closed event receivedserver (192:168:1:2/5246) client 192:168:1:158/45644).
    The Acess point joins the Controller for 2-3 seconds and then unjoins again. I am not sure what i am doing wrong here. The access points are getting the IPs from the ADSL modem through the switch, then it talks to the WLC, however it does not join the controller for further process.
    Note:
    The Managemnet interface and the AP manager interface are assigned to the same port 1 with unassigned Vlan as mention above.

  • APs don't join new WLC

    Hi all,
    I had to changed our WLC due a RMA. Now the APs don't join the WLC:
    spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:25.582: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP  10:169:2:147 (15930).*spamApTask6: Mar 07 14:58:25.527: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:a3: Failed to create DTLS connection for AP  10:169:2:145 (15932).*spamApTask3: Mar 07 14:58:25.193: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:63: Failed to create DTLS connection for AP  10:169:2:160 (31527).*spamApTask5: Mar 07 14:58:25.117: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:2b: Failed to create DTLS connection for AP  10:169:2:167 (15780).*spamApTask0: Mar 07 14:58:24.971: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:d1: Failed to create DTLS connection for AP  10:169:2:177 (15935).*spamApTask7: Mar 07 14:58:24.516: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:f9: Failed to create DTLS connection for AP  10:169:2:142 (31537).*spamApTask4: Mar 07 14:58:24.345: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:bb:fb: Failed to create DTLS connection for AP  10:169:2:153 (31680).*spamApTask0: Mar 07 14:58:23.737: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:23.535: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP  10:169:2:147 (15930).
    The only way that I found to solve it has been perform a reset factory default on APs. Unfortunately the APs have not SSH, TELNET or HTTP access enabled and I haven't physical access to all the APs.
    Are there some other way to solve thas?

    Hi Joan,
    spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).
    As per logs this is the problem related to Certificate. Make sure that time setting on WLC is correct and updated.
    means Unable to create the DTLS database entry for the AP.
    Can you paste more info:
    From WLC: Sh sysinfo
    From AP: sh version
    Also paste the entire bootup process from AP console.
    Scott is right , for this kind of things you must raise a TAC case.
    Regards
    Dont forget to rate helpful posts

  • LAP join the wrong controller

    Hello everybody,
    I have an issue with my LAP and my two WLC. I have one WLC in production and another one in test, and I want to associate the LAP with the one in test but I can't, and my LAP join the WLC in production with this messages on the LAP :
    *May 13 13:17:07.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'TESTWLC'(index 0).
    *May 13 13:17:07.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *May 13 13:16:03.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.30.117.10 peer_port: 5246
    *May 13 13:16:03.036: %CAPWAP-3-ERRORLOG: Failed to authorize controller using trust config.
    *May 13 13:16:03.036: %CAPWAP-1-SSC_CERT_AUTH_FAILED: Failed to authorize controller, SSC certificate validation failed.Peer certificate verification failed FFFFFFFF
    *May 13 13:16:03.040: %CAPWAP-3-ERRORLOG: Certificate verification failed!
    *May 13 13:16:03.040: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:447 Certificate verified failed!
    *May 13 13:16:03.040: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 172.30.117.10:5246
    *May 13 13:16:03.041: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.30.117.10:5246
    *May 13 13:16:03.042: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination.
    I have disabled certificate checking, regulatory domain are the same between WLC and LAP, my LAP(1041), my WLC are updated with the good software version and the both WLC are "Virtual" WLC.
    If you have any idea to resolve this problem, I will be happy to know it :)
    Thanks

    (Cisco Controller) >show sysinfo
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.6.110.0
    RTOS Version..................................... 7.6.110.0
    Bootloader Version............................... 7.6.110.0
    Emergency Image Version.......................... 7.6.110.0
    Build Type....................................... DATA + WPS
    System Name...................................... TESTWLC
    System Location..................................
    System Contact...................................
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1631
    IP Address....................................... 172.30.117.10
    System Up Time................................... 1 days 15 hrs 40 mins 5 secs
    System Timezone Location......................... (GMT +1:00) Amsterdam, Berlin, Rome, Vienna
    System Stats Realtime Interval................... 5
    System Stats Normal Interval..................... 180
    Configured Country............................... LU  - Luxembourg
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 1
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ 00:50:56:94:0E:12
    Maximum number of APs supported.................. 200
    TESTLAP#sh version
    Cisco IOS Software, C1600 Software (AP1G2-K9W8-M), Version 15.2(2)JB, RELEASE SOFTWARE (fc1)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2012 by Cisco Systems, Inc.
    Compiled Tue 11-Dec-12 04:45 by prod_rel_team
    ROM: Bootstrap program is C1600 boot loader
    BOOTLDR: C1600 Boot Loader (AP1G2-BOOT-M) LoaderVersion 15.2(2)JAX, RELEASE SOFTWARE (fc1)
    TESTLAP uptime is 15 hours, 36 minutes
    System returned to ROM by power-on
    System image file is "flash:/ap1g2-k9w8-mx.152-2.JB/ap1g2-k9w8-mx.152-2.JB"
    Last reload reason:
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    cisco AIR-CAP1602I-E-K9    (PowerPC) processor (revision B0) with 98294K/32768K bytes of memory.
    Processor board ID FGL1807S09R
    PowerPC CPU at 533Mhz, revision number 0x2151
    Last reset from power-on
    LWAPP image version 7.4.100.0
    1 Gigabit Ethernet interface
    2 802.11 Radios
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: 18:E7:28:1A:3B:1B
    Part Number                          : 73-14671-04
    PCA Assembly Number                  : 000-00000-00
    PCA Revision Number                  :
    PCB Serial Number                    : FOC18045ZD1
    Top Assembly Part Number             : 800-38552-01
    Top Assembly Serial Number           : FGL1807S09R
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-CAP1602I-E-K9
    Configuration register is 0xF
    As you can see, I use the LU country code, maybe it can be a mismatch between the WLC version and the LAP version?
    Thanks.

Maybe you are looking for

  • G5 Froze & No Longer Able To Start Up - Indicator Light Flashes 3 Times

    I was using Logic while my PowerMac G5 DP 1.8 froze completely. I wasn't able to escape the program or do anything else for that matter so I manually powered down and then when I turned my G5 on again the computer would not start up while the indicat

  • MAC QUESTION--I'm looking for the toggle button for thumbnails

    MAC QUESTION--I'm looking for the toggle button that use to be on the bottom right of desktop folders to increase and decrease the size of the thumbnails.  Does this still exist?

  • Headsets for Lumia 900 (and lumia 1520)

    Hi I currently own a Lumia 900 which I mostly use with Plantronics Bluetoth - and it works fine. Now I try to use it with my Razer Kraken Pro and it does not work at all - very low and scatchy noise - and if I try with my wifes headset (an iPhone com

  • Open PC file on a Mac

    How can I open a .exe file and have it work on a Mac? Thanks!

  • Sent Date in email is invalid

    Hi All, I want one solution, in our application we will send a email notification to some user but the sent date that appears in mail is been shown as 01 jan 1991 even if we send mail on today's date, can anybody please give me solution for this. Tha