AP1252 can´t join on WLC

WLC software 7.2.103.0
1. first problem: AP1252 can´t join on WLC. MAC was add on mac filter properly.
170
Mon Apr 9 15:37:32 2012
Mesh Node '2c:3f:38:be:53:ef' failed to join controller, MAC address not in MAC filter list.
171
Mon Apr 9 15:37:32 2012
AAA Authentication Failure for UserName:2c3f38be53e0 User Type: WLAN USER
172
Mon Apr 9 15:37:32 2012
Coverage hole pre alarm for client[1] 40:a6:d9:ef:87:68 on 802.11b/g interface of AP 2c:3f:38:bf:0c:80 (AP2c3f.38bf.0c80). Hist: 46 7 5 4 2 1 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
173
Mon Apr 9 15:37:32 2012
Coverage hole pre alarm for client[1] 8c:7b:9d:05:a0:67 on 802.11b/g interface of AP 2c:3f:38:bf:0c:80 (AP2c3f.38bf.0c80). Hist: 50 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
174
Mon Apr 9 15:37:30 2012
Interference Profile Failed for Base Radio MAC: 2c:3f:38:bf:1e:40 and slotNo: 0
175
Mon Apr 9 15:37:28 2012
Mesh child node 'd4:d7:48:6d:48:2f' has changed its parent to mesh node '2c:3f:38:bf:ef:60' from mesh node 'd4:d7:48:6c:7d:80'.
176
Mon Apr 9 15:37:28 2012
Mesh Node '2c:3f:38:bf:1d:2f' failed to join controller, MAC address not in MAC filter list.
177
Mon Apr 9 15:37:28 2012
AAA Authentication Failure for UserName:2c3f38bf1d20 User Type: WLAN USER
178
Mon Apr 9 15:37:28 2012
Mesh child node '2c:3f:38:bf:1d:2f' has changed its parent to mesh node 'd4:d7:48:6c:70:e0' from mesh node '2c:3f:38:be:55:00'.
179
Mon Apr 9 15:37:28 2012
Interference Profile Updated to Pass for Base Radio MAC: 2c:3f:38:bf:4b:20 and slotNo: 0
180
Mon Apr 9 15:37:27 2012
Interference Profile Failed for Base Radio MAC: d4:d7:48:6c:81:60 and slotNo: 0
Several APs can´t join on WLC and all are added on MAC filter, but they are showing this messages.
2 . Second problem.:  Operational Status = UNKNOWN
Some Access Point are in UNKNOWN status. I tried but I can´t do the reboot.
I can access Web config the APs using WLC, but when I applied the reset, it wasn´t working properly.

Murlio:
Is the AP model 1522 or 1252? I think you mean outdoor AP 1522 (which needs a mac filter). right?
please double check the mac filter you added. Try to delete then add it again if necessary.
it is obvious that it is a mac filter problem. be sure that you add the correct mac address and it is written correctly with the correct format and the mac filter created for "any WLAN" and the interface Name is "management".
Hope this will solve the issue.
Amjad

Similar Messages

  • Converted 1140 AP can't join the WLC 5508

    Hello! Please, help me to sort my problem out.
    We have bought autonomous APs   AIR-AP1141N-E-K9 and converted them to the lightweight mode, but they cannot join the WLC 5508. The errors are below. There were NO problems with the LAPs that were bought before, together with the WLC.
    AP's IP: 172.22.90.27   IOS version  12.4
    WLC's IP: 172.22.90.20   IOS version 6.0.188.0
    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    This Discussion has been converted into document:- https://supportforums.cisco.com/docs/DOC-23054
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    logs from the AP:
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:06.044: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.045: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.046: bsnInitRcbSlot: slot 1 has NO radio
    *Oct 13 21:37:06.056: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to a
    dministratively down
    *Oct 13 21:37:06.066: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to r
    eset
    *Oct 13 21:37:06.098: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:15.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLL
    ER
    *Oct 13 21:37:24.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
    LER
    *Oct 13 21:37:34.060: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.822: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:34.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.824: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap p
    acket from 172.22.90.20
    *Oct 13 21:39:33.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:39:34.000: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.001: %DTLS-5-PEER_DISCONNECT: Peer 172.22.90.20 has closed conn
    ection.
    *Oct 13 21:38:34.001: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:38:34.001: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination
    *Oct 13 21:38:34.125: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    logs from the WLC:
    debug capwap events enable
    *Dec 21 15:02:06.244: 68:bc:0c:63:3d:a0 DTLS keys for Control Plane deleted successfully for AP 172.22.90.27
      *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 DTLS connection closed event receivedserver (172:22:90:20/5246) client (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Entry exists for AP (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    Ble
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 capwap_ac_platform.c:1223 - Operation State 0 ===> 4
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 Register LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
      *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join Version: = 100711424
    *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Maximum Msg element len = 93
    debug capwap errors enable
    *Dec 21 16:16:51.879: 68:bc:0c:63:3d:a0 DTLS connection was closed
    *Dec 21 16:17:09.940: 68:bc:0c:63:3d:a0 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =5
    debug capwap detail enable
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 packet received of length 281 from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Msg Type = 3 Capwap state = 5
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: Result Code message element len = 8
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 1. 47 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 2. 232 3
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 3. 6 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 4. 12 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Descriptor message element len = 48
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 acName = Wi-Fi_Controller
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Name message element len = 68
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: WTP Radio Information message element len = 77
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Control IPV4 Address len = 87
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Sending encrypted packet to AP 172:22:90:27 (21078)
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Releasing WTP
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21077
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 DTLS connection 0x167c8b20 closed by controller
    *Dec 21 16:24:12.212: DTL Deleting AP 9 - 0.0.0.0
    *Dec 21 16:24:12.214: CAPWAP DTLS connection closed msg
    *Dec 21 16:24:12.216: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.216: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.218: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.220: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.222: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.224: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.226: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.228: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.228: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.230: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.232: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.234: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.236: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Deleting and removing AP 68:bc:0c:63:3d:a0 from fast path
    P.S. The time is set to the WLC with the NTP
    P.P.S. Don't lookup at the time the logs were made - they were made not during the same day/time

    I have solved this as soon as published my problem!!!
    the answer is published here:
    https://supportforums.cisco.com/thread/2004491
    especially in the post of Matthew Fowler
    Hi,
    Please take a look at CSCte01087.
    I see that your WLC is 10.0.13.5 and your AP is 10.0.13.28/24 so they are on the same subnet. I also see your AP MAC address does not begin with 00. This is why I believe it is relevant.
    Please try the workaround or open a TAC case if you need a fix.
    -Matt
    Symptom:
    An access point running 6.0.188.0 code may be unable to join a WLC5508.
    Messages similar to the following will be seen on the AP.
       %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
       %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
    Conditions:
    At least one of the following conditions pertains:
    - The high order byte of the AP's MAC address is nonzero, and the AP is in
    the same subnet as the WLC5508's management (or AP manager) interface
    - The WLC's management (or AP manager) interface's default gateway's
    MAC address' high order byte is nonzero.
    Workaround:
    If the MAC address of the WLC's default gateway does not begin with 00,
    and if all of the APs' MAC addresses begin with 00, then: you can put
    the APs into the same subnet as the WLC's management (or AP manager)
    interface.
    In the general case, for the situation where the WLC's default gateway's
    MAC does not begin with 00, you can address this by changing it to begin
    with 00. Some methods for doing this include:
    -- use the "mac-address" command on the gateway, to set a MAC address
    that begins with 00
    -- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
    IP as the WLC's gateway.
    For the case where the APs' MAC addresses do not begin with 00, then make
    sure that they are *not* in the same subnet as the WLC's management
    (AP manager) interface, but are behind a router.
    Another workaround is to downgrade to 6.0.182.0.  However, after
    downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
    (i.e. 12.4(21a)JA2) still installed on them will be unable to join.
    Therefore, after downgrading the WLC, the APs will need to have a
    pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.
    different vlan!!!! yes! thank you Matthew Fowler sooooo much!!!!

  • Cisco LAP 2602 can not join Virtual WLC

    dear all, 
    i just install Virtual WLC and i remove WLC 2504 , i install & configured it , but LAP can not join. it was work fine with WLC 2504.
    i used the same network topology with the old WLC.
    i receive this error logs.
    *spamApTask4: Feb 04 06:01:30.082: <<<<  Start of CAPWAP Packet  >>>>
    *spamApTask4: Feb 04 06:01:30.082: CAPWAP Control mesg Recd from 10.192.200.93, Port 26711
    *spamApTask4: Feb 04 06:01:30.082:              HLEN 4,   Radio ID 0,    WBID 1
    *spamApTask4: Feb 04 06:01:30.082:              Msg Type   :   CAPWAP_DISCOVERY_REQUEST
    *spamApTask4: Feb 04 06:01:30.082:              Msg Length : 155
    *spamApTask4: Feb 04 06:01:30.082:              Msg SeqNum : 0
    *spamApTask4: Feb 04 06:01:30.082:   
    *spamApTask4: Feb 04 06:01:30.082:       Type : CAPWAP_MSGELE_DISCOVERY_TYPE, Length 1
    *spamApTask4: Feb 04 06:01:30.082:              Discovery Type : CAPWAP_DISCOVERY_TYPE_UNKNOWN
    *spamApTask4: Feb 04 06:01:30.082:   
    *spamApTask4: Feb 04 06:01:30.082:       Type : CAPWAP_MSGELE_WTP_BOARD_DATA, Length 62
    *spamApTask4: Feb 04 06:01:30.083:              Vendor Identifier      : 0x00409600
    *spamApTask4: Feb 04 06:01:30.083:              WTP_SERIAL_NUMBER : AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_WTP_DESCRIPTOR, Length 40
    *spamApTask4: Feb 04 06:01:30.083:              Maximum Radios Supported  : 2
    *spamApTask4: Feb 04 06:01:30.083:              Radios in Use             : 2
    *spamApTask4: Feb 04 06:01:30.083:              Encryption Capabilities   : 0x00 0x01
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_WTP_FRAME_TUNNEL, Length 1
    *spamApTask4: Feb 04 06:01:30.083:              WTP Frame Tunnel Mode : NATIVE_FRAME_TUNNEL_MODE
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_WTP_MAC_TYPE, Length 1
    *spamApTask4: Feb 04 06:01:30.083:              WTP Mac Type  : SPLIT_MAC
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *spamApTask4: Feb 04 06:01:30.083:              Vendor Identifier  : 0x00409600
    *spamApTask4: Feb 04 06:01:30.083: 
            IE            :   UNKNOWN IE 207
    *spamApTask4: Feb 04 06:01:30.083:      IE Length     :   4
    *spamApTask4: Feb 04 06:01:30.083:      Decode routine not available, Printing Hex Dump
    *spamApTask4: Feb 04 06:01:30.083: 00000000: 03 00 00 01                                       ....
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 12
    *spamApTask4: Feb 04 06:01:30.083:              Vendor Identifier  : 0x00409600
    *spamApTask4: Feb 04 06:01:30.083: 
            IE            :   RAD_NAME_PAYLOAD
    *spamApTask4: Feb 04 06:01:30.083:      IE Length     :   6
    *spamApTask4: Feb 04 06:01:30.083:      Rad  Name     :   
    *spamApTask4: Feb 04 06:01:30.083: CEO_AP
    *spamApTask4: Feb 04 06:01:30.083: <<<<  End of CAPWAP Packet  >>>>
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Request from 10.192.200.93:26711
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 ApModel: AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
    *spamApTask4: Feb 04 06:01:30.083: apModel: AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083: apType = 26 apModel: AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083: apType: Ox1a bundleApImageVer: 8.0.110.0
    *spamApTask4: Feb 04 06:01:30.083: version:8 release:0 maint:110 build:0
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Response sent to 10.192.200.93 port 26711
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Response sent to 10.192.200.93:26711
    Please any help.

    dear
    yes  the wlc  2504  is 8.0.110 but because its damaged i replaced it with  new vWLC v 8.0.110.
    also i can not put the LAP in flexconnect until its joint.

  • LWAP 1231G can't join an WLC 2504 , Unsupported!!

    Dear All,
    I have WLC 2504 with  7.2.103.0 software version , & 2 different LWAP 1262n & 1231G with "c1200-rcvk9w8-mx.124-21a.JA" Image.
    The 1262n is joined to the to the controller and working fine but the 1231G it cann't join the controller , the controller says "Join request received from an unsupported AP" !!
    i will attaches the logs for this AP.
    please can any one help.

    If you want to use 1230, then the "highest" WLC version you can run is the 7.0.235.3.
    It says so in the Release Notes under the heading Software Release Support for Access Points, Table 1-1.

  • How many APs Can I join a WLC 4402 and WiSM?

    I have a WLC with 20 APs joined into the same management VLAN and
    I'll deploy other campus with 240 APs and 2 WiSMs Blade.
    Is there any recomendation about how many APs Can I put on the same management VLAN?
    thanks a lot

    Cisco recommends 60 - 100 access points per vlan. Attached is the best pratices document
    https://cisco.hosted.jivesoftware.com/docs/DOC-4204

  • Cisco2602 are unable or very hard to join 5508 wlc

    This is not happened to one AP,  all AP has the same issue,  it takes long time to join and sometimes it can't join this wlc.   Here is the debug info from wlc:
    *spamApTask2: Jun 25 08:15:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:26.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:26.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:36.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:36.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask3: Jun 25 08:15:39.444: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.8.53:61854
    *spamApTask2: Jun 25 08:15:46.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:46.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:56.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:56.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:06.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:06.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:16.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 WTP already released

    Thanks Salodh.  The issue is not fixed follow the link you provide.
    Some debug error message from AP:
    *Jul  2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
    *Jul  2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 2.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Attempting to join next controller
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Go Join the next controller
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
    *Jul  2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
    *Jul  2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.
    *Jul  2 04:13:52.039: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Jul  2 04:13:52.059: Starting Ethernet promiscuous mode
    *Jul  2 04:13:52.063: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.
    *Jul  2 04:13:52.063: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
    *Jul  2 04:14:02.067: %CAPWAP-3-ERRORLOG: Selected MWAR 'pvg01-rpi-wlc1'(index 0).
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Selected MWAR 'pvg01-rpi-wlc1' (index 0).
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Ap mgr count=1
    *Jul  2 04:14:02.067: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG:  Adding Ipv4 AP manager 10.109.118.16 to least load
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 10.109.118.16, load = 5..
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.
    *Jul  2 04:15:02.000: %CAPWAP-3-EVENTLOG: Setting time to 04:15:02 UTC Jul 2 2014
    *Jul  2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: version=117861888
    *Jul  2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: hasMaximum Message Payload
    *Jul  2 04:15:07.479: %CAPWAP-5-SENDJOIN: sending Join Request to 10.109.118.16
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: Join Response from 10.109.118.16
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: Starting Post Join timer
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Image Data.
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Configure.
    *Jul  2 04:15:07.507: %CAPWAP-3-EVENTLOG: reboot reason flag 17
    *Jul  2 04:15:07.551: Starting Ethernet promiscuous mode
    *Jul  2 04:15:07.551: %CAPWAP-3-EVENTLOG: ap sw version 15.2(4)JB4$
    *Jul  2 04:15:07.627: Flex Non AP-Specific config version mismatch. Clearing it! Current Version 7.6.110.0, stored file version 7.4.121.0
    *Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Configuration Status Response from 10.109.118.16
    *Jul  2 04:15:07.783: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:08.795: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:08.803: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:09.747: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:09.947: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Jul  2 04:15:10.143: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Jul  2 04:15:10.147: %CAPWAP-3-EVENTLOG: testWmmAC configuration is 0
    *Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
    *Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
    *Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP moved to RUN state stopping post join timer
    *Jul  2 04:15:10.855: %CAPWAP-3-EVENTLOG: CAPWAP parameters plumbing to forwarding plane succeeded
    *Jul  2 04:15:10.855: %CAPWAP-3-EVENTLOG: Send channel power and PhyTxPowerLevel message sent to10:109:118:16

  • I can't join LAP to WLC 5508 in difference subnet

    i can't join LAP to WLC in difference subnet now i create 2 interface [management / ap-manager]
    management : 192.168.1.1 / 24
    ap-manager : 192.168.1.2 / 24 vlan 10
    ap-manager2 : 192.168.2.2 / 24 vlan 11
    ap-manager3 : 192.168.3.2 / 24 vlan 12
    connect with core switch 3 interface [access port vlan same wlc]
    or how create wlc interface for join with LAP please advise me or send capture screen for me to create all interface
    Thank you for best support.

    I created a video actually how to configure option 43 on my site.
    http://www.my80211.com/cisco-wlc-labs/2009/7/4/cisco-dhcp-option-43-configuration-nugget.html
    So when you fire up an AP it goes through a few steps to find the controller.
    1) It does a broadcast and if your APs are on the same VLAN as your apmangers/managment then she will connect
    2) If it isnt on the sanme vlan it will attempt to reslove CISCO-LWAPP-CONTROLLER or CISCO-CAPWAP-CONTROLLER. This is where you would need to create an A-record in your DNS server and reslove it to your MANAGEMENT controller IP address
    3) Also Option43. When your AP gets an IP address, you can add option 43 to the scope. Option 43 again tells the AP where to find the controller.
    Now you can do a manual prime to these as well. Extend your managment vlan to a switch and have the APs join. Once they take the download and config they will know the controllers ip address. And then you can deploy them on different vlans and they will join ...
    Does this make sense?

  • AP1142N doesn't join his WLC (5508)

    Hello,
    My APs 1142N don't join their WLC. APs and WLC management interface are in the same vlan (WLC can ping all the APs). It is strange because it doesn't seem like they are trying to contact the WLC.
    What's strange is that I have other AP 1142N which joined this WLC without any problem.
    (Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.0.98.214Bootloader Version............................... 1.0.1Field Recovery Image Version..................... N/AFirmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27Build Type....................................... DATA + WPS ...
    ap#show versionCisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(21a)JA1, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by Cisco Systems, Inc.Compiled Wed 16-Sep-09 18:09 by prod_rel_teamROM: Bootstrap program is C1140 boot loaderBOOTLDR: C1140 Boot Loader (C1140-BOOT-M) Version 12.4(23c)JA6, RELEASE SOFTWARE (fc1)ap uptime is 43 minutesSystem returned to ROM by power-onSystem image file is "flash:/c1140-k9w7-mx.124-21a.JA1/c1140-k9w7-mx.124-21a.JA1" ...cisco AIR-AP1142N-E-K9     (PowerPC405ex) processor (revision A0) with 98294K/32768K bytes of memory.Processor board ID FCZ1649D2U0PowerPC405ex CPU at 586Mhz, revision number 0x147ELast reset from power-on1 Gigabit Ethernet interface2 802.11 Radio(s)32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: E0:2F:6D:A5:AA:F6Part Number                          : 73-12836-06PCA Assembly Number                  : 800-33767-06PCA Revision Number                  : A0PCB Serial Number                    : FOC164732R2Top Assembly Part Number             : 800-33775-05Top Assembly Serial Number           : FCZ1649D2U0Top Revision Number                  : A0Product/Model Number                 : AIR-AP1142N-E-K9
    Regards,

    Ok thank. I didn't notice that it was an autonomous image.
    It seems that I can't use this guide (http://www.cisco.com/en/US/docs/wireless/access_point/conversion/lwapp/upgrade/guide/lwapnote.html#wp157147) to upgrade them to lightweight (can't install software on windows seven).
    Regards

  • AP 1010 join wrong WLC

    Dear all,
    I have 1 WISM and 1 4402-50 and running on OS4.1.185
    They name are WISM-1, WISM-2, 4402-50.
    The AP was got ip by DHCP server.
    I have configure primary wlc is 4402-50, secondary wlc is WISM-2 and tertiary wlc is WISM-1.
    But, the AP1010 always join secondary and tertiary, it's not to join primary.
    Have anyone to same issus?
    THANKS
    Stephen

    My mobility group is same to all WLC. The AP is AP1010. So, I can't look at the any log on the AP.
    All the WLC's interface management is different subnet.
    The IBC-AP's are connect to Cisco 3750. I have define DHCP pool for IBC-AP's on the 3750.
    The DHCP configuration is below:
    ip dhcp pool NET_65
    network 10.100.65.0 255.255.255.0
    default-router 10.100.65.1
    domain-name wri
    option 43 ascii "10.100.64.150"
    option 60 ascii "Airespace.AP1200"
    The 4402-50-IBC management IP is 10.100.64.150 and I have configure the primary WLC to 4402-50-IBC for all IBC-AP. But, the all IBC-AP's always join to WiSM-1 and WiSM-2. I can't have any AP log on the 4402-50-IBC.
    How to confirm the WLC system name is correct on all WLC's?
    My object of IBC-APs have two SSID's. One SSID name is PUBLIC, other SSID name is IBC.
    When the 4402-50-IBC is down, the IBC-AP's can re-join WiSM-1 or WiSM-2. The client is connect to PUBLIC to ensure work.

  • AP 3702 not join the WLC

    Hi,
    I have two WLC 8500 working in SSO and with nat enable feature configure in management interface.
    SSO is working, but i have to configure NAT before SSO becasuse when SSO is up, ip address and nat are greyed out in managemente interface.
    Some AP's must join the controller in the private address of the management interface and others AP must join in the public ip address configured in NAT address. 
    for some reason, there are a lot of AP's that can't join the controller, i have 3 ap's joined in the public ip address and 3 ap's joined in the private ip address
    config network ap-discovery nat-only disable is already configured, from the console of one AP that can't not join i see the following:
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 212.89.5.130 peer_port: 5246
    *Sep 10 12:36:17.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Sep 10 12:36:47.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 212.89.5.130:5246
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.35.0.78 peer_port: 5246
    the AP is trying both private and public ip address to join the WLC but can't join properly.
    From the WLC console:
    debug capwap errors enable:
    *spamApTask4: Sep 10 13:13:49.837: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.13:47807)since DTLS session is not established 
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask2: Sep 10 13:13:52.103: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.11:21207)since DTLS session is not established 
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    the AP model are the same, this is not the problem, but for some reason there are AP's that have problems with the NAT configuration, if i disable NAT option, every AP with private ip address config can join the WLC.
    I've tried to break SSO, desconfigure NAT, and private ip address AP join the controller without problem.
    anybody can give me a clue?
    Regards!

    it seens like DTLS connection can't be stablished between AP and WLC.
    The AP sends discovery request
    the WLC respond with two discovery responds, the firts one, contains the public ip address of the WLC and the second one contains the private ip address.
    once discovery proccess is complete, the AP tries to send DTLS hello packet to the WLC, but this packet never arrives to WLC.
    because hello doesn't arrive, the AP sends a close notify alert to the WLC and tries to send the DTLS hello packet to the WLC private address with same result.
    the AP get into a loop trying to send DTLS hello packets to both private and public address.
    DTLS hello packet never arrive, but close notify alert arrive to WLC.
    theres is FW in the middle doing NAT, but i can understand why close notify alert packets error arrives WLC and Hello DTLS packets don't. this packets uses the same protocol UDP and the same port.
    Regards

  • APs don't join new WLC

    Hi all,
    I had to changed our WLC due a RMA. Now the APs don't join the WLC:
    spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:25.582: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP  10:169:2:147 (15930).*spamApTask6: Mar 07 14:58:25.527: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:a3: Failed to create DTLS connection for AP  10:169:2:145 (15932).*spamApTask3: Mar 07 14:58:25.193: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:63: Failed to create DTLS connection for AP  10:169:2:160 (31527).*spamApTask5: Mar 07 14:58:25.117: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:2b: Failed to create DTLS connection for AP  10:169:2:167 (15780).*spamApTask0: Mar 07 14:58:24.971: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:d1: Failed to create DTLS connection for AP  10:169:2:177 (15935).*spamApTask7: Mar 07 14:58:24.516: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:f9: Failed to create DTLS connection for AP  10:169:2:142 (31537).*spamApTask4: Mar 07 14:58:24.345: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:bb:fb: Failed to create DTLS connection for AP  10:169:2:153 (31680).*spamApTask0: Mar 07 14:58:23.737: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:23.535: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP  10:169:2:147 (15930).
    The only way that I found to solve it has been perform a reset factory default on APs. Unfortunately the APs have not SSH, TELNET or HTTP access enabled and I haven't physical access to all the APs.
    Are there some other way to solve thas?

    Hi Joan,
    spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP  10:169:2:171 (15781).
    As per logs this is the problem related to Certificate. Make sure that time setting on WLC is correct and updated.
    means Unable to create the DTLS database entry for the AP.
    Can you paste more info:
    From WLC: Sh sysinfo
    From AP: sh version
    Also paste the entire bootup process from AP console.
    Scott is right , for this kind of things you must raise a TAC case.
    Regards
    Dont forget to rate helpful posts

  • Ap won't join the WLC

    Hello Guys,
    I have converted ap 1131 from autonomous to lwapp successfully by using upgrade utility tool but the AP does not join the WLC 2106. I can see it as a neighbor on the switch with no IP address. please help me.
    Thank you

    Hello Scott,
    Thank you for the reply
    Please find the attached file for the config, i found out that i have not updated the time on WLC  but i did update the time on WLC and tested for other AP and this one too wont join the WLC. The ap are located remote.
    atsg-wl1#show run | incl hostname
    hostname atsg-wl1
    atsg-wl1#test pb display
    Display of the Parameter Block
    Total Number of Records : 7
    Number of Certs : 6
    Number of Keys : 1
    atsg-wl1#term length 0
    atsg-wl1#show version | include Cisco IOS
    Cisco IOS Software, C1130 Software (C1130-K9W7-M), Version 12.3(7)JA3, RELEASE SOFTWARE (fc1)
    atsg-wl1#show controller | include Radio AIR
    Radio AIR-AP1131G, Base Address 0019.0737.02f0, BBlock version 0.00, Software version 5.80.15
    Radio AIR-AP1131A, Base Address 0019.073b.02d0, BBlock version 0.00, Software version 5.80.15
    atsg-wl1#show controllers d0 | include Current
    Current Frequency: 2447 MHz  Channel 8
    Current CCK Power: 14 dBm
    Current OFDM Power: 14 dBm
    Current Rates:  basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    atsg-wl1#show controllers d1 | include Current
    Current Frequency: 5805 MHz  Channel 161
    Current Power: 17 dBm
    Current Rates:  basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
    atsg-wl1#show run | include station-role
    station-role root
    station-role root
    atsg-wl1#test pb disp
    Display of the Parameter Block
    Total Number of Records : 7
    Number of Certs : 6
    Number of Keys : 1
    atsg-wl1#show int F0 | include address
      Hardware is PowerPCElvis Ethernet, address is 0019.555f.ccfa (bia 0019.555f.ccfa)
    atsg-wl1#show int | include Dot11Radio
    Dot11Radio0 is up, line protocol is up
    Dot11Radio1 is up, line protocol is up
    atsg-wl1#show sntp | exclude SNTP
    10.148.0.1         16        1        never     
    172.16.21.57       16        1        never     
    Broadcast client mode is enabled.
    atsg-wl1#show run
    Building configuration...
    Current configuration : 6025 bytes
    ! Last configuration change at 19:35:46 UTC Thu Jan 31 2013 by didata
    ! NVRAM config last updated at 19:13:48 UTC Fri Feb 1 2013 by didata
    version 12.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime localtime
    service password-encryption
    hostname atsg-wl1
    logging buffered informational
    logging console informational
    enable secret 5
    ip subnet-zero
    ip domain name aspentech.com
    ip name-server 10.96.16.230
    ip name-server 10.148.0.249
    ip name-server 10.32.19.1
    aaa new-model
    aaa group server radius rad_eap
    server 10.16.16.123 auth-port 1645 acct-port 1646
    aaa authentication login default group tacacs+ local
    aaa authentication login eap_methods group rad_eap
    aaa authentication login mac_methods local
    aaa authentication enable default group tacacs+ enable
    aaa authorization exec default group tacacs+ local
    aaa authorization commands 15 default group tacacs+ local
    aaa accounting exec default start-stop group tacacs+
    aaa accounting commands 15 default start-stop group tacacs+
    aaa accounting system default start-stop group tacacs+
    aaa session-id common
    no dot11 igmp snooping-helper
    dot11 ssid
       authentication open eap eap_methods
       authentication network-eap eap_methods
       guest-mode
       infrastructure-ssid optional
    dot11 network-map
    power inline negotiation prestandard source
    usernamepassword 7
    username privilege 15 password 7
    usernamep rivilege 15 password 7
    class-map match-all _class_Protocol_301_C351
    match access-group name Voice_Over_IP_301
    class-map match-all _class_8
    match ip dscp cs1
    class-map match-all _class_0
    match ip dscp default
    class-map match-all _class_48
    match ip dscp cs6
    class-map match-all _class_18
    match ip dscp af21
    class-map match-all _class_24
    match ip dscp cs3
    class-map match-all _class_16
    match ip dscp cs2
    class-map match-all _class_34
    match ip dscp af41
    class-map match-all _class_26
    match ip dscp af31
    class-map match-all _class_40
    match ip dscp cs5
    class-map match-all _class_46
    match ip dscp ef
    class-map match-all _class_56
    match ip dscp cs7
    class-map match-all _class_10
    match ip dscp af11
    class-map match-all _class_32
    match ip dscp cs4
    policy-map _policy_Voice_Over_IP_202
    class _class_Protocol_301_C351
      set cos 6
    policy-map _policy_fallback_policy
    class _class_0
      set cos 0
    class _class_8
      set cos 1
    class _class_10
      set cos 1
    class _class_16
      set cos 2
    class _class_18
      set cos 2
    class _class_24
      set cos 3
    class _class_26
      set cos 3
    class _class_32
      set cos 4
    class _class_34
      set cos 4
    class _class_40
      set cos 5
    class _class_46
      set cos 5
    class _class_48
      set cos 6
    class _class_56
      set cos 7
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    shutdown
    encryption mode wep mandatory mic key-hash
    broadcast-key change 900
    ssid
    traffic-class background cw-min 5 cw-max 8 fixed-slot 2
    traffic-class best-effort cw-min 5 cw-max 8 fixed-slot 6
    traffic-class video cw-min 4 cw-max 6 fixed-slot 1
    traffic-class voice cw-min 3 cw-max 7 fixed-slot 1
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    packet retries 32
    fragment-threshold 2338
    station-role root
    rts threshold 2339
    rts retries 32
    world-mode legacy
    no cdp enable
    infrastructure-client
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface Dot11Radio1
    no ip address
    no ip route-cache
    shutdown
    encryption mode wep mandatory mic key-hash
    broadcast-key change 900
    ssid aspen100abcdefgh
    speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
    station-role root
    world-mode legacy
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    duplex auto
    speed auto
    bridge-group 1
    no bridge-group 1 source-learning
    bridge-group 1 spanning-disabled
    interface BVI1
    ip address 10.148.0.7 255.255.255.0
    no ip route-cache
    ip default-gateway 10.148.0.1
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip tacacs source-interface BVI1
    ip radius source-interface BVI1
    ip access-list extended Voice_Over_IP_300
    permit 119 any any
    permit ip any any
    ip access-list extended Voice_Over_IP_301
    permit 119 any any
    permit ip any any
    logging facility local0
    snmp-server view iso_view iso included
    snmp-server community admin view iso_view RW
    snmp-server community all4114all view iso_view RW
    snmp-server community ddbos2000 RO
    snmp-server location ATSG
    snmp-server contact James Lee
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps disassociate
    snmp-server enable traps deauthenticate
    snmp-server enable traps authenticate-fail
    snmp-server enable traps config
    snmp-server enable traps syslog
    snmp-server host 192.135.137.12 ddbos2000
    tacacs-server host 10.16.16.123 key 7
    tacacs-server host 10.96.16.245 key 7
    tacacs-server directed-request
    radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
    radius-server deadtime 120
    radius-server vsa send accounting
    radius-server vsa send authentication
    control-plane
    bridge 1 route ip
    line con 0
    transport preferred all
    transport output all
    stopbits 1
    line vty 0 4
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    line vty 5 15
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    end
    atsg-wl1#show run | incl hostname
    hostname atsg-wl1
    atsg-wl1#arch down /over /create-space  tftp://10.148.0.118/images/c1130-rcvk                                                                    $over /create-space  tftp://10.148.0.118/images/c1130-rcvk9                  w8-tar.12                                                                   te-space  tftp://10.148.0.118/images/c1130-rcvk9w8-tar.123                  -11.JX1.t                                                                  ftp://10.148.0.118/images/c1130-rcvk9w8-tar.123-11.JX1.ta                  r
    examining image...
    Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
    extracting info (273 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    [OK - 1873920 bytes]
    Image info:
        Version Suffix: rcvk9w8-
        Image Name: c1130-rcvk9w8-mx
        Version Directory: c1130-rcvk9w8-mx
        Ios Image Size: 1874432
        Total Image Size: 1874432
        Image Feature: WIRELESS LAN|LWAPP|RECOVERY
        Image Family: C1130
        Wireless Switch Management Version: 3.0.51.0
    Extracting files...
    Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
    extracting info (273 bytes)
    c1130-rcvk9w8-mx/ (directory) 0 (bytes)
    extracting c1130-rcvk9w8-mx/c1130-rcvk9w8-mx (1867816 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    extracting c1130-rcvk9w8-mx/info (273 bytes)
    extracting info.ver (273 bytes)!
    [OK - 1873920 bytes]
    Deleting current version...
    Deleting flash:/c1130-k9w7-mx.123-7.JA3...done.
    New software image installed in flash:/c1130-rcvk9w8-mx
    Configuring system to use new image...done.
    atsg-wl1#show archive status
    SUCCESS: Upgrade complete.
    atsg-wl1#write erase
    Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
    [OK]
    Erase of nvram: complete
    atsg-wl1#dir flash:
    Directory of flash:/
        2  -rwx        2072  Jan 31 2013 19:36:18 +00:00  private-multiple-fs
      149  drwx         128  Jan 31 2013 19:36:11 +00:00  c1130-rcvk9w8-mx
        4  -rwx         342  Jan 31 2013 19:36:14 +00:00  env_vars
    15998976 bytes total (14126080 bytes free)
    atsg-wl1#dir nvram:
    Directory of nvram:/
       30  -rw-           0                      startup-config
       31  ----           0                      private-config
        1  -rw-           0                      ifIndex-table
        2  ----          12                      persistent-data
    32768 bytes total (30668 bytes free)
    atsg-wl1#sh crypto ca trustpoints
    atsg-wl1#sh crypto ca certificates
    atsg-wl1#terminal length 0
    atsg-wl1#show run | begin BVI1
    interface BVI1
    ip address 10.148.0.7 255.255.255.0
    no ip route-cache
    ip default-gateway 10.148.0.1
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip tacacs source-interface BVI1
    ip radius source-interface BVI1
    ip access-list extended Voice_Over_IP_300
    permit 119 any any
    permit ip any any
    ip access-list extended Voice_Over_IP_301
    permit 119 any any
    permit ip any any
    logging facility local0
    snmp-server view iso_view iso included
    snmp-server community admin view iso_view RW
    snmp-server community all4114all view iso_view RW
    snmp-server community ddbos2000 RO
    snmp-server location ATSG
    snmp-server contact James Lee
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps disassociate
    snmp-server enable traps deauthenticate
    snmp-server enable traps authenticate-fail
    snmp-server enable traps config
    snmp-server enable traps syslog
    snmp-server host 192.135.137.12 ddbos2000
    tacacs-server host 10.16.16.123 key 7
    tacacs-server host 10.96.16.245 key 7
    tacacs-server directed-request
    radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
    radius-server deadtime 120
    radius-server vsa send accounting
    radius-server vsa send authentication
    control-plane
    bridge 1 route ip
    line con 0
    transport preferred all
    transport output all
    stopbits 1
    line vty 0 4
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    line vty 5 15
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    end

  • LAP's are unable to join Cisco WLC

    Dear all,
    I  have moved my WLC to my datacentre from branch office. after movement i have updated DHCP options with the new ip address but all of my access point are not joining  to WLC.Kindly check the attached cofiguration of WLC as well as LAP logs and It will be a great help if somebody can help me to relsolve this issue.
    Please note that  for datacenter -  Branch connectivity we are using L3  MPLS line and there is no firewall between the office and I am using Ver 7 software on my WLC

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin-top:0cm;
    mso-para-margin-right:0cm;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0cm;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;
    mso-bidi-font-family:"Times New Roman";
    mso-bidi-theme-font:minor-bidi;}
    Hi,
    Your DHCP option 43 is good
    From your file ‘AP error logs.txt’ it’s clear that the DHCP server provides option 43 that point to 10.204.20.4.
    I also see that the controller name is AEDXBWLC01.
    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin-top:0cm;
    mso-para-margin-right:0cm;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0cm;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;
    mso-bidi-font-family:"Times New Roman";
    mso-bidi-theme-font:minor-bidi;}
    The AP cannot guess this name so this means that it can communicate with the controller.
    You do not need to configure DNS
    Your DNS server is not configured with CISCO-LWAPP-CONTROLLER.localdomain. But you do not need to configure DNS since you already have a working option 43.
    If you want to use DNS you should configure both CISCO-CAPWAP-CONTROLLER.localdomain and CISCO-LWAPP-CONTROLLER.localdomain, where localdomain is the access point domain name. Old software use LWAPP and new software uses CAPWAP.
    What might cause the problems?
    I believe that you have a certificate mismatch between the controller and the AP. In order to fix this you can manually add the AP to the AP authorization list.
    In order to allow APs to join, use one of these options:
    Add them to the authorization list of the WLC: use the config auth-list add mic command.
    Add them as clients to the RADIUS server. The Called-Station-ID is the MAC address of the controller. If you separate the APs into groups, you can create policies to define which APs can authenticate against which Called-Station-IDs.
    Debug
    You can debug to see what’s happening when the AP tries to join the controller.
    You can also use this debug to obtain the Ethernet address for the AP:
    (Cisco Controller) >debug lwapp events enable
    Mon May 22 12:00:21 2006: Received LWAPP DISCOVERY REQUEST from AP 00:0b:85:5b:fb:d0 to ff:ff:ff:ff:ff:ff on port '1'
    Mon May 22 12:00:21 2006: Successful transmission of LWAPP Discovery-Response to AP 00:0b:85:5b:fb:d0 on Port 1
    /André

  • LWAP AP not join a WLC

    Hi all,
    I have a  Cisco 2500 series Wirless Controller and AP : AIR-LAP1310G-E-K9 with can't join a cisco controller, when i looked at the Log file for WLC i found this message : 
    AP Disassociated. Base Radio MAC:1c:df:0f:cf:da:88.
     So when i did this on the controller  ( command) : debug capwap errors enable
      This appear : 
    *spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Received LWAPP DISCOVERY REQUEST to ff:ff:ff:ff:ff:ff on port '1'
    *spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 15,joined Aps =3
    *spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Successful transmission of LWAPP Discovery Response to AP 1c:df:0f:cf:da:88 on port 1
    *spamApTask0: Jan 20 14:45:36.851: 1c:df:0f:cf:da:88 Received LWAPP JOIN REQUEST from AP 1c:df:0f:cf:da:88 to 68:86:a7:36:37:00 on port '1'
    *spamApTask0: Jan 20 14:45:36.851: Could not find BoardDataPayload
    *spamApTask0: Jan 20 14:45:36.865: 1c:df:0f:cf:da:88 AP AP_BEJ: txNonce  00:00:00:00:00:00 rxNonce  00:00:00:00:00:00
    *spamApTask0: Jan 20 14:45:36.865: 1c:df:0f:cf:da:88 LWAPP Join Request MTU path from AP 1c:df:0f:cf:da:88 is 1500, remote debug mode is 0
    *spamApTask0: Jan 20 14:45:37.048: 1c:df:0f:cf:da:88 Successful transmission of LWAPP Join Reply to AP 1c:df:0f:cf:da:88
    *spamApTask0: Jan 20 14:45:37.049: 1c:df:0f:cf:da:88 spam_lrad.c:2080 - Operation State 0 ===> 4
    *spamApTask0: Jan 20 14:45:38.231: 1c:df:0f:cf:da:88 Received LWAPP IMAGE_DATA from AP 1c:df:0f:cf:da:88
    *spamApTask0: Jan 20 14:45:38.232: 1c:df:0f:cf:da:88 Refusing image download to AP 1c:df:0f:cf:da:88 - unable to open image file /bsn/ap//c1310
           Error:No such file or directory(2)
    Please help ?

    Hi George Stefanick ,
    the problème is : i want to convert it to autonomous so  to do , it must to plug the AP with the WLC , and in the CLI for WLC : tape this command  : o this 
    config ap tftp-downgrade tftp-server-ip-address filename access-point-name
    Refer to this link :  http://www.cisco.com/c/en/us/td/docs/wireless/controller/3-2/configuration/guide/ccfig32/c32lwap.html.
    but the WLC dont support the AP 1300 series , so please how to convert this AP  to autonomos ? 

  • I have a mid-2010 iMac and just purchased a 2TB TC, can't join existing wireless network with AC standard so attached to iMac via ethernet with TC wifi turned off.  How do i access TC now? not showing up in disk utility or on desktop. working fine with TM

    I have a mid-2010 iMac and just purchased a 2TB TC, I just found out that it can't join existing wireless network with new AC standard so attached to iMac via ethernet with TC's wifi turned off.  How do i access TC now? not showing up in disk utility or on desktop. It is working fine with TM.  My cheeper seagate drives etc kept crashing, so i didnt trust cheeper back up options anymore.  Connected those drives to TM via firewire and could see the drives and access them.
    Also, I didn't want to bridge TC with my new fios router that I paid 100 dollars for, to get N speed and also paying 10 dollars more a month for fast speed.  I heard that bridging slows down everything and then there can be port issues with mail etc.  I connect to the internet via airport only and it is pretty fast. Getting over 50mbs downloads and over 30mbs uploads.  Plus everything in my home it connected to my fios router, airport express for music streaming, two apple tvs, vuezone camer system.  I really didn't want to monkey around too much with my system.  But are there other options to connect the new TC.  Can't find info anywhere for this and called apple who gave me the info above.  after hanging up, i see that i cant access my TC and I am wondering if i would have to reset it to turn wifi on again to make changes to the drive, turn off blinking light  or repair it in disk utility if it should become corrupted.
    For other with similar issues i did solve some other problems: when i connected it to my ethernet port on my iMac wifi stopped working.  Found that I had to turn off the ethernet in the system>network screen, but then TM didn't see the TC so i restarted after changes and then it saw it.
    Now a rant.  I can't believe in this wireless age that Apple would make a product that cant join a wireless net work.  The apple rep said i could return it and look for the previous TC that would join an existing wireless network.  Are we going backwards?
    Thanks!
    lennydas

    Ok... it is getting a bit clearer but there are still some questions.
    I connect to the internet via airport only and it is pretty fast.
    I was assuming airport in this statement in your first post meant the TC or the Express.. but I now realise we are still in the mass confusion stage where apple calls everything wireless an airport. So what you mean is the airport internal card of the computer??
    Also, I didn't want to bridge TC with my new fios router that I paid 100 dollars for, to get N speed and also paying 10 dollars more a month for fast speed.  I heard that bridging slows down everything and then there can be port issues with mail etc.
    I think this is mistaken.
    Putting the TC in bridge mode plugged into your FIOS will not slow the network.. nor will it cause mail or port issues.. in bridge the TC is just a fancy WAP and switch plus the network hard drive.
    If the computer is close it will be faster than the FIOS.
    You can run both wireless networks with different names.. so it is clear which is which. But you can also setup roaming so the computers themselves pick which is the best wireless.
    I tried extending the wireless net work and tried joining wireless network, but the TC kept crashing and I had to keep resetting the TC.  the Apple support person said these, extend wireless network and joint wireless network, are no longer a connection option with the new TC because of the new AC protocol.
    Thanks again!
    You cannot extend to a non-apple wireless router.
    You cannot use join a wireless network because when you do the ethernet ports will be cut off.
    But that has not changed.. I don't think Apple support is correct.. there has been no change with the AC model.. it is simply a fact that apple routers do not work in join wireless mode other than as a dumb client. The same applies to AC as to the earlier version.. but I have asked another person to check this.
    Join in the express is the only apple router that still allows an ethernet connection.
    For now you best use of the TC is bridged to the FIOS. Wireless you can sort out between several options.

Maybe you are looking for