AP1252 can´t join on WLC
WLC software 7.2.103.0
1. first problem: AP1252 can´t join on WLC. MAC was add on mac filter properly.
170
Mon Apr 9 15:37:32 2012
Mesh Node '2c:3f:38:be:53:ef' failed to join controller, MAC address not in MAC filter list.
171
Mon Apr 9 15:37:32 2012
AAA Authentication Failure for UserName:2c3f38be53e0 User Type: WLAN USER
172
Mon Apr 9 15:37:32 2012
Coverage hole pre alarm for client[1] 40:a6:d9:ef:87:68 on 802.11b/g interface of AP 2c:3f:38:bf:0c:80 (AP2c3f.38bf.0c80). Hist: 46 7 5 4 2 1 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
173
Mon Apr 9 15:37:32 2012
Coverage hole pre alarm for client[1] 8c:7b:9d:05:a0:67 on 802.11b/g interface of AP 2c:3f:38:bf:0c:80 (AP2c3f.38bf.0c80). Hist: 50 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
174
Mon Apr 9 15:37:30 2012
Interference Profile Failed for Base Radio MAC: 2c:3f:38:bf:1e:40 and slotNo: 0
175
Mon Apr 9 15:37:28 2012
Mesh child node 'd4:d7:48:6d:48:2f' has changed its parent to mesh node '2c:3f:38:bf:ef:60' from mesh node 'd4:d7:48:6c:7d:80'.
176
Mon Apr 9 15:37:28 2012
Mesh Node '2c:3f:38:bf:1d:2f' failed to join controller, MAC address not in MAC filter list.
177
Mon Apr 9 15:37:28 2012
AAA Authentication Failure for UserName:2c3f38bf1d20 User Type: WLAN USER
178
Mon Apr 9 15:37:28 2012
Mesh child node '2c:3f:38:bf:1d:2f' has changed its parent to mesh node 'd4:d7:48:6c:70:e0' from mesh node '2c:3f:38:be:55:00'.
179
Mon Apr 9 15:37:28 2012
Interference Profile Updated to Pass for Base Radio MAC: 2c:3f:38:bf:4b:20 and slotNo: 0
180
Mon Apr 9 15:37:27 2012
Interference Profile Failed for Base Radio MAC: d4:d7:48:6c:81:60 and slotNo: 0
Several APs can´t join on WLC and all are added on MAC filter, but they are showing this messages.
2 . Second problem.: Operational Status = UNKNOWN
Some Access Point are in UNKNOWN status. I tried but I can´t do the reboot.
I can access Web config the APs using WLC, but when I applied the reset, it wasn´t working properly.
Murlio:
Is the AP model 1522 or 1252? I think you mean outdoor AP 1522 (which needs a mac filter). right?
please double check the mac filter you added. Try to delete then add it again if necessary.
it is obvious that it is a mac filter problem. be sure that you add the correct mac address and it is written correctly with the correct format and the mac filter created for "any WLAN" and the interface Name is "management".
Hope this will solve the issue.
Amjad
Similar Messages
-
Converted 1140 AP can't join the WLC 5508
Hello! Please, help me to sort my problem out.
We have bought autonomous APs AIR-AP1141N-E-K9 and converted them to the lightweight mode, but they cannot join the WLC 5508. The errors are below. There were NO problems with the LAPs that were bought before, together with the WLC.
AP's IP: 172.22.90.27 IOS version 12.4
WLC's IP: 172.22.90.20 IOS version 6.0.188.0
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
This Discussion has been converted into document:- https://supportforums.cisco.com/docs/DOC-23054
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
logs from the AP:
Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
*Oct 13 21:37:06.044: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
*Oct 13 21:37:06.045: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
*Oct 13 21:37:06.046: bsnInitRcbSlot: slot 1 has NO radio
*Oct 13 21:37:06.056: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to a
dministratively down
*Oct 13 21:37:06.066: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to r
eset
*Oct 13 21:37:06.098: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
*Oct 13 21:37:15.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLL
ER
*Oct 13 21:37:24.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
LER
*Oct 13 21:37:34.060: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
p: 172.22.90.20 peer_port: 5246
*Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
*Oct 13 21:38:34.822: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
peer_ip: 172.22.90.20 peer_port: 5246
*Oct 13 21:38:34.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
*Oct 13 21:38:34.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
*Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
ol Message from 172.22.90.20
*Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
*Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
e from controller
*Oct 13 21:38:39.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
*Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
ol Message from 172.22.90.20
*Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
*Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
e from controller
*Oct 13 21:38:39.824: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap p
acket from 172.22.90.20
*Oct 13 21:39:33.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
72.22.90.20:5246
*Oct 13 21:39:34.000: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
p: 172.22.90.20 peer_port: 5246
*Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
*Oct 13 21:38:34.001: %DTLS-5-PEER_DISCONNECT: Peer 172.22.90.20 has closed conn
ection.
*Oct 13 21:38:34.001: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
72.22.90.20:5246
*Oct 13 21:38:34.001: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination
*Oct 13 21:38:34.125: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
not established.
logs from the WLC:
debug capwap events enable
*Dec 21 15:02:06.244: 68:bc:0c:63:3d:a0 DTLS keys for Control Plane deleted successfully for AP 172.22.90.27
*Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 DTLS connection closed event receivedserver (172:22:90:20/5246) client (172:22:90:27/21077)
*Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Entry exists for AP (172:22:90:27/21077)
*Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
*Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
*Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
*Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
Ble
*Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 capwap_ac_platform.c:1223 - Operation State 0 ===> 4
*Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 Register LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
*Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join Version: = 100711424
*Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Maximum Msg element len = 93
debug capwap errors enable
*Dec 21 16:16:51.879: 68:bc:0c:63:3d:a0 DTLS connection was closed
*Dec 21 16:17:09.940: 68:bc:0c:63:3d:a0 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =5
debug capwap detail enable
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21078
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 packet received of length 281 from 172.22.90.27:21078
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Msg Type = 3 Capwap state = 5
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: Result Code message element len = 8
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 1. 47 0
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 2. 232 3
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 3. 6 0
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 4. 12 0
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Descriptor message element len = 48
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 acName = Wi-Fi_Controller
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Name message element len = 68
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: WTP Radio Information message element len = 77
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Control IPV4 Address len = 87
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Sending encrypted packet to AP 172:22:90:27 (21078)
*Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Releasing WTP
*Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21077
*Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 DTLS connection 0x167c8b20 closed by controller
*Dec 21 16:24:12.212: DTL Deleting AP 9 - 0.0.0.0
*Dec 21 16:24:12.214: CAPWAP DTLS connection closed msg
*Dec 21 16:24:12.216: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(0)
*Dec 21 16:24:12.216: Received SPAM_MFP_RADIO_DOWN message
*Dec 21 16:24:12.218: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(0)
*Dec 21 16:24:12.220: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(0)
*Dec 21 16:24:12.222: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(0)
*Dec 21 16:24:12.224: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(0)
*Dec 21 16:24:12.226: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(0)
*Dec 21 16:24:12.228: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(1)
*Dec 21 16:24:12.228: Received SPAM_MFP_RADIO_DOWN message
*Dec 21 16:24:12.230: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(1)
*Dec 21 16:24:12.232: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(1)
*Dec 21 16:24:12.234: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(1)
*Dec 21 16:24:12.236: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(1)
*Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(1)
*Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Deleting and removing AP 68:bc:0c:63:3d:a0 from fast path
P.S. The time is set to the WLC with the NTP
P.P.S. Don't lookup at the time the logs were made - they were made not during the same day/timeI have solved this as soon as published my problem!!!
the answer is published here:
https://supportforums.cisco.com/thread/2004491
especially in the post of Matthew Fowler
Hi,
Please take a look at CSCte01087.
I see that your WLC is 10.0.13.5 and your AP is 10.0.13.28/24 so they are on the same subnet. I also see your AP MAC address does not begin with 00. This is why I believe it is relevant.
Please try the workaround or open a TAC case if you need a fix.
-Matt
Symptom:
An access point running 6.0.188.0 code may be unable to join a WLC5508.
Messages similar to the following will be seen on the AP.
%CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
%CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
Conditions:
At least one of the following conditions pertains:
- The high order byte of the AP's MAC address is nonzero, and the AP is in
the same subnet as the WLC5508's management (or AP manager) interface
- The WLC's management (or AP manager) interface's default gateway's
MAC address' high order byte is nonzero.
Workaround:
If the MAC address of the WLC's default gateway does not begin with 00,
and if all of the APs' MAC addresses begin with 00, then: you can put
the APs into the same subnet as the WLC's management (or AP manager)
interface.
In the general case, for the situation where the WLC's default gateway's
MAC does not begin with 00, you can address this by changing it to begin
with 00. Some methods for doing this include:
-- use the "mac-address" command on the gateway, to set a MAC address
that begins with 00
-- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
IP as the WLC's gateway.
For the case where the APs' MAC addresses do not begin with 00, then make
sure that they are *not* in the same subnet as the WLC's management
(AP manager) interface, but are behind a router.
Another workaround is to downgrade to 6.0.182.0. However, after
downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
(i.e. 12.4(21a)JA2) still installed on them will be unable to join.
Therefore, after downgrading the WLC, the APs will need to have a
pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.
different vlan!!!! yes! thank you Matthew Fowler sooooo much!!!! -
Cisco LAP 2602 can not join Virtual WLC
dear all,
i just install Virtual WLC and i remove WLC 2504 , i install & configured it , but LAP can not join. it was work fine with WLC 2504.
i used the same network topology with the old WLC.
i receive this error logs.
*spamApTask4: Feb 04 06:01:30.082: <<<< Start of CAPWAP Packet >>>>
*spamApTask4: Feb 04 06:01:30.082: CAPWAP Control mesg Recd from 10.192.200.93, Port 26711
*spamApTask4: Feb 04 06:01:30.082: HLEN 4, Radio ID 0, WBID 1
*spamApTask4: Feb 04 06:01:30.082: Msg Type : CAPWAP_DISCOVERY_REQUEST
*spamApTask4: Feb 04 06:01:30.082: Msg Length : 155
*spamApTask4: Feb 04 06:01:30.082: Msg SeqNum : 0
*spamApTask4: Feb 04 06:01:30.082:
*spamApTask4: Feb 04 06:01:30.082: Type : CAPWAP_MSGELE_DISCOVERY_TYPE, Length 1
*spamApTask4: Feb 04 06:01:30.082: Discovery Type : CAPWAP_DISCOVERY_TYPE_UNKNOWN
*spamApTask4: Feb 04 06:01:30.082:
*spamApTask4: Feb 04 06:01:30.082: Type : CAPWAP_MSGELE_WTP_BOARD_DATA, Length 62
*spamApTask4: Feb 04 06:01:30.083: Vendor Identifier : 0x00409600
*spamApTask4: Feb 04 06:01:30.083: WTP_SERIAL_NUMBER : AIR-CAP2602E-I-K9
*spamApTask4: Feb 04 06:01:30.083:
*spamApTask4: Feb 04 06:01:30.083: Type : CAPWAP_MSGELE_WTP_DESCRIPTOR, Length 40
*spamApTask4: Feb 04 06:01:30.083: Maximum Radios Supported : 2
*spamApTask4: Feb 04 06:01:30.083: Radios in Use : 2
*spamApTask4: Feb 04 06:01:30.083: Encryption Capabilities : 0x00 0x01
*spamApTask4: Feb 04 06:01:30.083:
*spamApTask4: Feb 04 06:01:30.083: Type : CAPWAP_MSGELE_WTP_FRAME_TUNNEL, Length 1
*spamApTask4: Feb 04 06:01:30.083: WTP Frame Tunnel Mode : NATIVE_FRAME_TUNNEL_MODE
*spamApTask4: Feb 04 06:01:30.083:
*spamApTask4: Feb 04 06:01:30.083: Type : CAPWAP_MSGELE_WTP_MAC_TYPE, Length 1
*spamApTask4: Feb 04 06:01:30.083: WTP Mac Type : SPLIT_MAC
*spamApTask4: Feb 04 06:01:30.083:
*spamApTask4: Feb 04 06:01:30.083: Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
*spamApTask4: Feb 04 06:01:30.083: Vendor Identifier : 0x00409600
*spamApTask4: Feb 04 06:01:30.083:
IE : UNKNOWN IE 207
*spamApTask4: Feb 04 06:01:30.083: IE Length : 4
*spamApTask4: Feb 04 06:01:30.083: Decode routine not available, Printing Hex Dump
*spamApTask4: Feb 04 06:01:30.083: 00000000: 03 00 00 01 ....
*spamApTask4: Feb 04 06:01:30.083:
*spamApTask4: Feb 04 06:01:30.083: Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 12
*spamApTask4: Feb 04 06:01:30.083: Vendor Identifier : 0x00409600
*spamApTask4: Feb 04 06:01:30.083:
IE : RAD_NAME_PAYLOAD
*spamApTask4: Feb 04 06:01:30.083: IE Length : 6
*spamApTask4: Feb 04 06:01:30.083: Rad Name :
*spamApTask4: Feb 04 06:01:30.083: CEO_AP
*spamApTask4: Feb 04 06:01:30.083: <<<< End of CAPWAP Packet >>>>
*spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Request from 10.192.200.93:26711
*spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 ApModel: AIR-CAP2602E-I-K9
*spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
*spamApTask4: Feb 04 06:01:30.083: apModel: AIR-CAP2602E-I-K9
*spamApTask4: Feb 04 06:01:30.083: apType = 26 apModel: AIR-CAP2602E-I-K9
*spamApTask4: Feb 04 06:01:30.083: apType: Ox1a bundleApImageVer: 8.0.110.0
*spamApTask4: Feb 04 06:01:30.083: version:8 release:0 maint:110 build:0
*spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Response sent to 10.192.200.93 port 26711
*spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Response sent to 10.192.200.93:26711
Please any help.dear
yes the wlc 2504 is 8.0.110 but because its damaged i replaced it with new vWLC v 8.0.110.
also i can not put the LAP in flexconnect until its joint. -
LWAP 1231G can't join an WLC 2504 , Unsupported!!
Dear All,
I have WLC 2504 with 7.2.103.0 software version , & 2 different LWAP 1262n & 1231G with "c1200-rcvk9w8-mx.124-21a.JA" Image.
The 1262n is joined to the to the controller and working fine but the 1231G it cann't join the controller , the controller says "Join request received from an unsupported AP" !!
i will attaches the logs for this AP.
please can any one help.If you want to use 1230, then the "highest" WLC version you can run is the 7.0.235.3.
It says so in the Release Notes under the heading Software Release Support for Access Points, Table 1-1. -
How many APs Can I join a WLC 4402 and WiSM?
I have a WLC with 20 APs joined into the same management VLAN and
I'll deploy other campus with 240 APs and 2 WiSMs Blade.
Is there any recomendation about how many APs Can I put on the same management VLAN?
thanks a lotCisco recommends 60 - 100 access points per vlan. Attached is the best pratices document
https://cisco.hosted.jivesoftware.com/docs/DOC-4204 -
Cisco2602 are unable or very hard to join 5508 wlc
This is not happened to one AP, all AP has the same issue, it takes long time to join and sometimes it can't join this wlc. Here is the debug info from wlc:
*spamApTask2: Jun 25 08:15:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:26.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:26.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:36.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:36.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask3: Jun 25 08:15:39.444: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.8.53:61854
*spamApTask2: Jun 25 08:15:46.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:46.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:56.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:56.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:06.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:06.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:16.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP 6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 WTP already releasedThanks Salodh. The issue is not fixed follow the link you provide.
Some debug error message from AP:
*Jul 2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
*Jul 2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 2.
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Attempting to join next controller
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Go Join the next controller
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
*Jul 2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
*Jul 2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
*Jul 2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.
*Jul 2 04:13:52.039: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
*Jul 2 04:13:52.059: Starting Ethernet promiscuous mode
*Jul 2 04:13:52.063: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.
*Jul 2 04:13:52.063: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.
*Jul 2 04:14:02.067: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
*Jul 2 04:14:02.067: %CAPWAP-3-ERRORLOG: Selected MWAR 'pvg01-rpi-wlc1'(index 0).
*Jul 2 04:14:02.067: %CAPWAP-3-EVENTLOG: Selected MWAR 'pvg01-rpi-wlc1' (index 0).
*Jul 2 04:14:02.067: %CAPWAP-3-EVENTLOG: Ap mgr count=1
*Jul 2 04:14:02.067: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Jul 2 04:14:02.067: %CAPWAP-3-EVENTLOG: Adding Ipv4 AP manager 10.109.118.16 to least load
*Jul 2 04:14:02.067: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 10.109.118.16, load = 5..
*Jul 2 04:14:02.067: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.
*Jul 2 04:15:02.000: %CAPWAP-3-EVENTLOG: Setting time to 04:15:02 UTC Jul 2 2014
*Jul 2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: version=117861888
*Jul 2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: hasMaximum Message Payload
*Jul 2 04:15:07.479: %CAPWAP-5-SENDJOIN: sending Join Request to 10.109.118.16
*Jul 2 04:15:07.483: %CAPWAP-3-EVENTLOG: Join Response from 10.109.118.16
*Jul 2 04:15:07.483: %CAPWAP-3-EVENTLOG: Starting Post Join timer
*Jul 2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Image Data.
*Jul 2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Configure.
*Jul 2 04:15:07.507: %CAPWAP-3-EVENTLOG: reboot reason flag 17
*Jul 2 04:15:07.551: Starting Ethernet promiscuous mode
*Jul 2 04:15:07.551: %CAPWAP-3-EVENTLOG: ap sw version 15.2(4)JB4$
*Jul 2 04:15:07.627: Flex Non AP-Specific config version mismatch. Clearing it! Current Version 7.6.110.0, stored file version 7.4.121.0
*Jul 2 04:15:07.691: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
*Jul 2 04:15:07.691: %CAPWAP-3-EVENTLOG: Queue Empty.
*Jul 2 04:15:07.691: %CAPWAP-3-EVENTLOG: Configuration Status Response from 10.109.118.16
*Jul 2 04:15:07.783: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul 2 04:15:08.795: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul 2 04:15:08.803: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul 2 04:15:09.747: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul 2 04:15:09.947: %CAPWAP-3-EVENTLOG: Sending packet to AC
*Jul 2 04:15:10.143: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
*Jul 2 04:15:10.147: %CAPWAP-3-EVENTLOG: testWmmAC configuration is 0
*Jul 2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
*Jul 2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
*Jul 2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP moved to RUN state stopping post join timer
*Jul 2 04:15:10.855: %CAPWAP-3-EVENTLOG: CAPWAP parameters plumbing to forwarding plane succeeded
*Jul 2 04:15:10.855: %CAPWAP-3-EVENTLOG: Send channel power and PhyTxPowerLevel message sent to10:109:118:16 -
I can't join LAP to WLC 5508 in difference subnet
i can't join LAP to WLC in difference subnet now i create 2 interface [management / ap-manager]
management : 192.168.1.1 / 24
ap-manager : 192.168.1.2 / 24 vlan 10
ap-manager2 : 192.168.2.2 / 24 vlan 11
ap-manager3 : 192.168.3.2 / 24 vlan 12
connect with core switch 3 interface [access port vlan same wlc]
or how create wlc interface for join with LAP please advise me or send capture screen for me to create all interface
Thank you for best support.I created a video actually how to configure option 43 on my site.
http://www.my80211.com/cisco-wlc-labs/2009/7/4/cisco-dhcp-option-43-configuration-nugget.html
So when you fire up an AP it goes through a few steps to find the controller.
1) It does a broadcast and if your APs are on the same VLAN as your apmangers/managment then she will connect
2) If it isnt on the sanme vlan it will attempt to reslove CISCO-LWAPP-CONTROLLER or CISCO-CAPWAP-CONTROLLER. This is where you would need to create an A-record in your DNS server and reslove it to your MANAGEMENT controller IP address
3) Also Option43. When your AP gets an IP address, you can add option 43 to the scope. Option 43 again tells the AP where to find the controller.
Now you can do a manual prime to these as well. Extend your managment vlan to a switch and have the APs join. Once they take the download and config they will know the controllers ip address. And then you can deploy them on different vlans and they will join ...
Does this make sense? -
AP1142N doesn't join his WLC (5508)
Hello,
My APs 1142N don't join their WLC. APs and WLC management interface are in the same vlan (WLC can ping all the APs). It is strange because it doesn't seem like they are trying to contact the WLC.
What's strange is that I have other AP 1142N which joined this WLC without any problem.
(Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.0.98.214Bootloader Version............................... 1.0.1Field Recovery Image Version..................... N/AFirmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27Build Type....................................... DATA + WPS ...
ap#show versionCisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(21a)JA1, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by Cisco Systems, Inc.Compiled Wed 16-Sep-09 18:09 by prod_rel_teamROM: Bootstrap program is C1140 boot loaderBOOTLDR: C1140 Boot Loader (C1140-BOOT-M) Version 12.4(23c)JA6, RELEASE SOFTWARE (fc1)ap uptime is 43 minutesSystem returned to ROM by power-onSystem image file is "flash:/c1140-k9w7-mx.124-21a.JA1/c1140-k9w7-mx.124-21a.JA1" ...cisco AIR-AP1142N-E-K9 (PowerPC405ex) processor (revision A0) with 98294K/32768K bytes of memory.Processor board ID FCZ1649D2U0PowerPC405ex CPU at 586Mhz, revision number 0x147ELast reset from power-on1 Gigabit Ethernet interface2 802.11 Radio(s)32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: E0:2F:6D:A5:AA:F6Part Number : 73-12836-06PCA Assembly Number : 800-33767-06PCA Revision Number : A0PCB Serial Number : FOC164732R2Top Assembly Part Number : 800-33775-05Top Assembly Serial Number : FCZ1649D2U0Top Revision Number : A0Product/Model Number : AIR-AP1142N-E-K9
Regards,Ok thank. I didn't notice that it was an autonomous image.
It seems that I can't use this guide (http://www.cisco.com/en/US/docs/wireless/access_point/conversion/lwapp/upgrade/guide/lwapnote.html#wp157147) to upgrade them to lightweight (can't install software on windows seven).
Regards -
Dear all,
I have 1 WISM and 1 4402-50 and running on OS4.1.185
They name are WISM-1, WISM-2, 4402-50.
The AP was got ip by DHCP server.
I have configure primary wlc is 4402-50, secondary wlc is WISM-2 and tertiary wlc is WISM-1.
But, the AP1010 always join secondary and tertiary, it's not to join primary.
Have anyone to same issus?
THANKS
StephenMy mobility group is same to all WLC. The AP is AP1010. So, I can't look at the any log on the AP.
All the WLC's interface management is different subnet.
The IBC-AP's are connect to Cisco 3750. I have define DHCP pool for IBC-AP's on the 3750.
The DHCP configuration is below:
ip dhcp pool NET_65
network 10.100.65.0 255.255.255.0
default-router 10.100.65.1
domain-name wri
option 43 ascii "10.100.64.150"
option 60 ascii "Airespace.AP1200"
The 4402-50-IBC management IP is 10.100.64.150 and I have configure the primary WLC to 4402-50-IBC for all IBC-AP. But, the all IBC-AP's always join to WiSM-1 and WiSM-2. I can't have any AP log on the 4402-50-IBC.
How to confirm the WLC system name is correct on all WLC's?
My object of IBC-APs have two SSID's. One SSID name is PUBLIC, other SSID name is IBC.
When the 4402-50-IBC is down, the IBC-AP's can re-join WiSM-1 or WiSM-2. The client is connect to PUBLIC to ensure work. -
Hi,
I have two WLC 8500 working in SSO and with nat enable feature configure in management interface.
SSO is working, but i have to configure NAT before SSO becasuse when SSO is up, ip address and nat are greyed out in managemente interface.
Some AP's must join the controller in the private address of the management interface and others AP must join in the public ip address configured in NAT address.
for some reason, there are a lot of AP's that can't join the controller, i have 3 ap's joined in the public ip address and 3 ap's joined in the private ip address
config network ap-discovery nat-only disable is already configured, from the console of one AP that can't not join i see the following:
*Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
*Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 212.89.5.130 peer_port: 5246
*Sep 10 12:36:17.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
*Sep 10 12:36:47.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 212.89.5.130:5246
*Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
*Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.35.0.78 peer_port: 5246
the AP is trying both private and public ip address to join the WLC but can't join properly.
From the WLC console:
debug capwap errors enable:
*spamApTask4: Sep 10 13:13:49.837: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from 10.35.1.13:47807)since DTLS session is not established
*spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
*spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
*spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
*spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
*spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
*spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
*spamApTask2: Sep 10 13:13:52.103: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from 10.35.1.11:21207)since DTLS session is not established
*spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
*spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
*spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
*spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
*spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
*spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
the AP model are the same, this is not the problem, but for some reason there are AP's that have problems with the NAT configuration, if i disable NAT option, every AP with private ip address config can join the WLC.
I've tried to break SSO, desconfigure NAT, and private ip address AP join the controller without problem.
anybody can give me a clue?
Regards!it seens like DTLS connection can't be stablished between AP and WLC.
The AP sends discovery request
the WLC respond with two discovery responds, the firts one, contains the public ip address of the WLC and the second one contains the private ip address.
once discovery proccess is complete, the AP tries to send DTLS hello packet to the WLC, but this packet never arrives to WLC.
because hello doesn't arrive, the AP sends a close notify alert to the WLC and tries to send the DTLS hello packet to the WLC private address with same result.
the AP get into a loop trying to send DTLS hello packets to both private and public address.
DTLS hello packet never arrive, but close notify alert arrive to WLC.
theres is FW in the middle doing NAT, but i can understand why close notify alert packets error arrives WLC and Hello DTLS packets don't. this packets uses the same protocol UDP and the same port.
Regards -
Hi all,
I had to changed our WLC due a RMA. Now the APs don't join the WLC:
spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP 10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:25.582: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP 10:169:2:147 (15930).*spamApTask6: Mar 07 14:58:25.527: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:a3: Failed to create DTLS connection for AP 10:169:2:145 (15932).*spamApTask3: Mar 07 14:58:25.193: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:63: Failed to create DTLS connection for AP 10:169:2:160 (31527).*spamApTask5: Mar 07 14:58:25.117: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:2b: Failed to create DTLS connection for AP 10:169:2:167 (15780).*spamApTask0: Mar 07 14:58:24.971: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:d1: Failed to create DTLS connection for AP 10:169:2:177 (15935).*spamApTask7: Mar 07 14:58:24.516: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:b2:f9: Failed to create DTLS connection for AP 10:169:2:142 (31537).*spamApTask4: Mar 07 14:58:24.345: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:57:bb:fb: Failed to create DTLS connection for AP 10:169:2:153 (31680).*spamApTask0: Mar 07 14:58:23.737: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP 10:169:2:171 (15781).*spamApTask6: Mar 07 14:58:23.535: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:e3:85: Failed to create DTLS connection for AP 10:169:2:147 (15930).
The only way that I found to solve it has been perform a reset factory default on APs. Unfortunately the APs have not SSH, TELNET or HTTP access enabled and I haven't physical access to all the APs.
Are there some other way to solve thas?Hi Joan,
spamApTask0: Mar 07 14:58:25.789: #CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:7305 4c:4e:35:b3:da:37: Failed to create DTLS connection for AP 10:169:2:171 (15781).
As per logs this is the problem related to Certificate. Make sure that time setting on WLC is correct and updated.
means Unable to create the DTLS database entry for the AP.
Can you paste more info:
From WLC: Sh sysinfo
From AP: sh version
Also paste the entire bootup process from AP console.
Scott is right , for this kind of things you must raise a TAC case.
Regards
Dont forget to rate helpful posts -
Hello Guys,
I have converted ap 1131 from autonomous to lwapp successfully by using upgrade utility tool but the AP does not join the WLC 2106. I can see it as a neighbor on the switch with no IP address. please help me.
Thank youHello Scott,
Thank you for the reply
Please find the attached file for the config, i found out that i have not updated the time on WLC but i did update the time on WLC and tested for other AP and this one too wont join the WLC. The ap are located remote.
atsg-wl1#show run | incl hostname
hostname atsg-wl1
atsg-wl1#test pb display
Display of the Parameter Block
Total Number of Records : 7
Number of Certs : 6
Number of Keys : 1
atsg-wl1#term length 0
atsg-wl1#show version | include Cisco IOS
Cisco IOS Software, C1130 Software (C1130-K9W7-M), Version 12.3(7)JA3, RELEASE SOFTWARE (fc1)
atsg-wl1#show controller | include Radio AIR
Radio AIR-AP1131G, Base Address 0019.0737.02f0, BBlock version 0.00, Software version 5.80.15
Radio AIR-AP1131A, Base Address 0019.073b.02d0, BBlock version 0.00, Software version 5.80.15
atsg-wl1#show controllers d0 | include Current
Current Frequency: 2447 MHz Channel 8
Current CCK Power: 14 dBm
Current OFDM Power: 14 dBm
Current Rates: basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
atsg-wl1#show controllers d1 | include Current
Current Frequency: 5805 MHz Channel 161
Current Power: 17 dBm
Current Rates: basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
atsg-wl1#show run | include station-role
station-role root
station-role root
atsg-wl1#test pb disp
Display of the Parameter Block
Total Number of Records : 7
Number of Certs : 6
Number of Keys : 1
atsg-wl1#show int F0 | include address
Hardware is PowerPCElvis Ethernet, address is 0019.555f.ccfa (bia 0019.555f.ccfa)
atsg-wl1#show int | include Dot11Radio
Dot11Radio0 is up, line protocol is up
Dot11Radio1 is up, line protocol is up
atsg-wl1#show sntp | exclude SNTP
10.148.0.1 16 1 never
172.16.21.57 16 1 never
Broadcast client mode is enabled.
atsg-wl1#show run
Building configuration...
Current configuration : 6025 bytes
! Last configuration change at 19:35:46 UTC Thu Jan 31 2013 by didata
! NVRAM config last updated at 19:13:48 UTC Fri Feb 1 2013 by didata
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime localtime
service password-encryption
hostname atsg-wl1
logging buffered informational
logging console informational
enable secret 5
ip subnet-zero
ip domain name aspentech.com
ip name-server 10.96.16.230
ip name-server 10.148.0.249
ip name-server 10.32.19.1
aaa new-model
aaa group server radius rad_eap
server 10.16.16.123 auth-port 1645 acct-port 1646
aaa authentication login default group tacacs+ local
aaa authentication login eap_methods group rad_eap
aaa authentication login mac_methods local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
aaa session-id common
no dot11 igmp snooping-helper
dot11 ssid
authentication open eap eap_methods
authentication network-eap eap_methods
guest-mode
infrastructure-ssid optional
dot11 network-map
power inline negotiation prestandard source
usernamepassword 7
username privilege 15 password 7
usernamep rivilege 15 password 7
class-map match-all _class_Protocol_301_C351
match access-group name Voice_Over_IP_301
class-map match-all _class_8
match ip dscp cs1
class-map match-all _class_0
match ip dscp default
class-map match-all _class_48
match ip dscp cs6
class-map match-all _class_18
match ip dscp af21
class-map match-all _class_24
match ip dscp cs3
class-map match-all _class_16
match ip dscp cs2
class-map match-all _class_34
match ip dscp af41
class-map match-all _class_26
match ip dscp af31
class-map match-all _class_40
match ip dscp cs5
class-map match-all _class_46
match ip dscp ef
class-map match-all _class_56
match ip dscp cs7
class-map match-all _class_10
match ip dscp af11
class-map match-all _class_32
match ip dscp cs4
policy-map _policy_Voice_Over_IP_202
class _class_Protocol_301_C351
set cos 6
policy-map _policy_fallback_policy
class _class_0
set cos 0
class _class_8
set cos 1
class _class_10
set cos 1
class _class_16
set cos 2
class _class_18
set cos 2
class _class_24
set cos 3
class _class_26
set cos 3
class _class_32
set cos 4
class _class_34
set cos 4
class _class_40
set cos 5
class _class_46
set cos 5
class _class_48
set cos 6
class _class_56
set cos 7
bridge irb
interface Dot11Radio0
no ip address
no ip route-cache
shutdown
encryption mode wep mandatory mic key-hash
broadcast-key change 900
ssid
traffic-class background cw-min 5 cw-max 8 fixed-slot 2
traffic-class best-effort cw-min 5 cw-max 8 fixed-slot 6
traffic-class video cw-min 4 cw-max 6 fixed-slot 1
traffic-class voice cw-min 3 cw-max 7 fixed-slot 1
speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
packet retries 32
fragment-threshold 2338
station-role root
rts threshold 2339
rts retries 32
world-mode legacy
no cdp enable
infrastructure-client
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface Dot11Radio1
no ip address
no ip route-cache
shutdown
encryption mode wep mandatory mic key-hash
broadcast-key change 900
ssid aspen100abcdefgh
speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
station-role root
world-mode legacy
bridge-group 1
bridge-group 1 subscriber-loop-control
bridge-group 1 block-unknown-source
no bridge-group 1 source-learning
no bridge-group 1 unicast-flooding
bridge-group 1 spanning-disabled
interface FastEthernet0
no ip address
no ip route-cache
duplex auto
speed auto
bridge-group 1
no bridge-group 1 source-learning
bridge-group 1 spanning-disabled
interface BVI1
ip address 10.148.0.7 255.255.255.0
no ip route-cache
ip default-gateway 10.148.0.1
ip http server
ip http authentication aaa
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip tacacs source-interface BVI1
ip radius source-interface BVI1
ip access-list extended Voice_Over_IP_300
permit 119 any any
permit ip any any
ip access-list extended Voice_Over_IP_301
permit 119 any any
permit ip any any
logging facility local0
snmp-server view iso_view iso included
snmp-server community admin view iso_view RW
snmp-server community all4114all view iso_view RW
snmp-server community ddbos2000 RO
snmp-server location ATSG
snmp-server contact James Lee
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps disassociate
snmp-server enable traps deauthenticate
snmp-server enable traps authenticate-fail
snmp-server enable traps config
snmp-server enable traps syslog
snmp-server host 192.135.137.12 ddbos2000
tacacs-server host 10.16.16.123 key 7
tacacs-server host 10.96.16.245 key 7
tacacs-server directed-request
radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
radius-server deadtime 120
radius-server vsa send accounting
radius-server vsa send authentication
control-plane
bridge 1 route ip
line con 0
transport preferred all
transport output all
stopbits 1
line vty 0 4
exec-timeout 0 0
transport preferred all
transport input all
transport output all
line vty 5 15
exec-timeout 0 0
transport preferred all
transport input all
transport output all
end
atsg-wl1#show run | incl hostname
hostname atsg-wl1
atsg-wl1#arch down /over /create-space tftp://10.148.0.118/images/c1130-rcvk $over /create-space tftp://10.148.0.118/images/c1130-rcvk9 w8-tar.12 te-space tftp://10.148.0.118/images/c1130-rcvk9w8-tar.123 -11.JX1.t ftp://10.148.0.118/images/c1130-rcvk9w8-tar.123-11.JX1.ta r
examining image...
Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
extracting info (273 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 1873920 bytes]
Image info:
Version Suffix: rcvk9w8-
Image Name: c1130-rcvk9w8-mx
Version Directory: c1130-rcvk9w8-mx
Ios Image Size: 1874432
Total Image Size: 1874432
Image Feature: WIRELESS LAN|LWAPP|RECOVERY
Image Family: C1130
Wireless Switch Management Version: 3.0.51.0
Extracting files...
Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
extracting info (273 bytes)
c1130-rcvk9w8-mx/ (directory) 0 (bytes)
extracting c1130-rcvk9w8-mx/c1130-rcvk9w8-mx (1867816 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
extracting c1130-rcvk9w8-mx/info (273 bytes)
extracting info.ver (273 bytes)!
[OK - 1873920 bytes]
Deleting current version...
Deleting flash:/c1130-k9w7-mx.123-7.JA3...done.
New software image installed in flash:/c1130-rcvk9w8-mx
Configuring system to use new image...done.
atsg-wl1#show archive status
SUCCESS: Upgrade complete.
atsg-wl1#write erase
Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
[OK]
Erase of nvram: complete
atsg-wl1#dir flash:
Directory of flash:/
2 -rwx 2072 Jan 31 2013 19:36:18 +00:00 private-multiple-fs
149 drwx 128 Jan 31 2013 19:36:11 +00:00 c1130-rcvk9w8-mx
4 -rwx 342 Jan 31 2013 19:36:14 +00:00 env_vars
15998976 bytes total (14126080 bytes free)
atsg-wl1#dir nvram:
Directory of nvram:/
30 -rw- 0 startup-config
31 ---- 0 private-config
1 -rw- 0 ifIndex-table
2 ---- 12 persistent-data
32768 bytes total (30668 bytes free)
atsg-wl1#sh crypto ca trustpoints
atsg-wl1#sh crypto ca certificates
atsg-wl1#terminal length 0
atsg-wl1#show run | begin BVI1
interface BVI1
ip address 10.148.0.7 255.255.255.0
no ip route-cache
ip default-gateway 10.148.0.1
ip http server
ip http authentication aaa
no ip http secure-server
ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
ip tacacs source-interface BVI1
ip radius source-interface BVI1
ip access-list extended Voice_Over_IP_300
permit 119 any any
permit ip any any
ip access-list extended Voice_Over_IP_301
permit 119 any any
permit ip any any
logging facility local0
snmp-server view iso_view iso included
snmp-server community admin view iso_view RW
snmp-server community all4114all view iso_view RW
snmp-server community ddbos2000 RO
snmp-server location ATSG
snmp-server contact James Lee
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps tty
snmp-server enable traps disassociate
snmp-server enable traps deauthenticate
snmp-server enable traps authenticate-fail
snmp-server enable traps config
snmp-server enable traps syslog
snmp-server host 192.135.137.12 ddbos2000
tacacs-server host 10.16.16.123 key 7
tacacs-server host 10.96.16.245 key 7
tacacs-server directed-request
radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
radius-server deadtime 120
radius-server vsa send accounting
radius-server vsa send authentication
control-plane
bridge 1 route ip
line con 0
transport preferred all
transport output all
stopbits 1
line vty 0 4
exec-timeout 0 0
transport preferred all
transport input all
transport output all
line vty 5 15
exec-timeout 0 0
transport preferred all
transport input all
transport output all
end -
LAP's are unable to join Cisco WLC
Dear all,
I have moved my WLC to my datacentre from branch office. after movement i have updated DHCP options with the new ip address but all of my access point are not joining to WLC.Kindly check the attached cofiguration of WLC as well as LAP logs and It will be a great help if somebody can help me to relsolve this issue.
Please note that for datacenter - Branch connectivity we are using L3 MPLS line and there is no firewall between the office and I am using Ver 7 software on my WLC/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
Hi,
Your DHCP option 43 is good
From your file ‘AP error logs.txt’ it’s clear that the DHCP server provides option 43 that point to 10.204.20.4.
I also see that the controller name is AEDXBWLC01.
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
The AP cannot guess this name so this means that it can communicate with the controller.
You do not need to configure DNS
Your DNS server is not configured with CISCO-LWAPP-CONTROLLER.localdomain. But you do not need to configure DNS since you already have a working option 43.
If you want to use DNS you should configure both CISCO-CAPWAP-CONTROLLER.localdomain and CISCO-LWAPP-CONTROLLER.localdomain, where localdomain is the access point domain name. Old software use LWAPP and new software uses CAPWAP.
What might cause the problems?
I believe that you have a certificate mismatch between the controller and the AP. In order to fix this you can manually add the AP to the AP authorization list.
In order to allow APs to join, use one of these options:
Add them to the authorization list of the WLC: use the config auth-list add mic command.
Add them as clients to the RADIUS server. The Called-Station-ID is the MAC address of the controller. If you separate the APs into groups, you can create policies to define which APs can authenticate against which Called-Station-IDs.
Debug
You can debug to see what’s happening when the AP tries to join the controller.
You can also use this debug to obtain the Ethernet address for the AP:
(Cisco Controller) >debug lwapp events enable
Mon May 22 12:00:21 2006: Received LWAPP DISCOVERY REQUEST from AP 00:0b:85:5b:fb:d0 to ff:ff:ff:ff:ff:ff on port '1'
Mon May 22 12:00:21 2006: Successful transmission of LWAPP Discovery-Response to AP 00:0b:85:5b:fb:d0 on Port 1
/André -
Hi all,
I have a Cisco 2500 series Wirless Controller and AP : AIR-LAP1310G-E-K9 with can't join a cisco controller, when i looked at the Log file for WLC i found this message :
AP Disassociated. Base Radio MAC:1c:df:0f:cf:da:88.
So when i did this on the controller ( command) : debug capwap errors enable
This appear :
*spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Received LWAPP DISCOVERY REQUEST to ff:ff:ff:ff:ff:ff on port '1'
*spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 15,joined Aps =3
*spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Successful transmission of LWAPP Discovery Response to AP 1c:df:0f:cf:da:88 on port 1
*spamApTask0: Jan 20 14:45:36.851: 1c:df:0f:cf:da:88 Received LWAPP JOIN REQUEST from AP 1c:df:0f:cf:da:88 to 68:86:a7:36:37:00 on port '1'
*spamApTask0: Jan 20 14:45:36.851: Could not find BoardDataPayload
*spamApTask0: Jan 20 14:45:36.865: 1c:df:0f:cf:da:88 AP AP_BEJ: txNonce 00:00:00:00:00:00 rxNonce 00:00:00:00:00:00
*spamApTask0: Jan 20 14:45:36.865: 1c:df:0f:cf:da:88 LWAPP Join Request MTU path from AP 1c:df:0f:cf:da:88 is 1500, remote debug mode is 0
*spamApTask0: Jan 20 14:45:37.048: 1c:df:0f:cf:da:88 Successful transmission of LWAPP Join Reply to AP 1c:df:0f:cf:da:88
*spamApTask0: Jan 20 14:45:37.049: 1c:df:0f:cf:da:88 spam_lrad.c:2080 - Operation State 0 ===> 4
*spamApTask0: Jan 20 14:45:38.231: 1c:df:0f:cf:da:88 Received LWAPP IMAGE_DATA from AP 1c:df:0f:cf:da:88
*spamApTask0: Jan 20 14:45:38.232: 1c:df:0f:cf:da:88 Refusing image download to AP 1c:df:0f:cf:da:88 - unable to open image file /bsn/ap//c1310
Error:No such file or directory(2)
Please help ?Hi George Stefanick ,
the problème is : i want to convert it to autonomous so to do , it must to plug the AP with the WLC , and in the CLI for WLC : tape this command : o this
config ap tftp-downgrade tftp-server-ip-address filename access-point-name
Refer to this link : http://www.cisco.com/c/en/us/td/docs/wireless/controller/3-2/configuration/guide/ccfig32/c32lwap.html.
but the WLC dont support the AP 1300 series , so please how to convert this AP to autonomos ? -
I have a mid-2010 iMac and just purchased a 2TB TC, I just found out that it can't join existing wireless network with new AC standard so attached to iMac via ethernet with TC's wifi turned off. How do i access TC now? not showing up in disk utility or on desktop. It is working fine with TM. My cheeper seagate drives etc kept crashing, so i didnt trust cheeper back up options anymore. Connected those drives to TM via firewire and could see the drives and access them.
Also, I didn't want to bridge TC with my new fios router that I paid 100 dollars for, to get N speed and also paying 10 dollars more a month for fast speed. I heard that bridging slows down everything and then there can be port issues with mail etc. I connect to the internet via airport only and it is pretty fast. Getting over 50mbs downloads and over 30mbs uploads. Plus everything in my home it connected to my fios router, airport express for music streaming, two apple tvs, vuezone camer system. I really didn't want to monkey around too much with my system. But are there other options to connect the new TC. Can't find info anywhere for this and called apple who gave me the info above. after hanging up, i see that i cant access my TC and I am wondering if i would have to reset it to turn wifi on again to make changes to the drive, turn off blinking light or repair it in disk utility if it should become corrupted.
For other with similar issues i did solve some other problems: when i connected it to my ethernet port on my iMac wifi stopped working. Found that I had to turn off the ethernet in the system>network screen, but then TM didn't see the TC so i restarted after changes and then it saw it.
Now a rant. I can't believe in this wireless age that Apple would make a product that cant join a wireless net work. The apple rep said i could return it and look for the previous TC that would join an existing wireless network. Are we going backwards?
Thanks!
lennydasOk... it is getting a bit clearer but there are still some questions.
I connect to the internet via airport only and it is pretty fast.
I was assuming airport in this statement in your first post meant the TC or the Express.. but I now realise we are still in the mass confusion stage where apple calls everything wireless an airport. So what you mean is the airport internal card of the computer??
Also, I didn't want to bridge TC with my new fios router that I paid 100 dollars for, to get N speed and also paying 10 dollars more a month for fast speed. I heard that bridging slows down everything and then there can be port issues with mail etc.
I think this is mistaken.
Putting the TC in bridge mode plugged into your FIOS will not slow the network.. nor will it cause mail or port issues.. in bridge the TC is just a fancy WAP and switch plus the network hard drive.
If the computer is close it will be faster than the FIOS.
You can run both wireless networks with different names.. so it is clear which is which. But you can also setup roaming so the computers themselves pick which is the best wireless.
I tried extending the wireless net work and tried joining wireless network, but the TC kept crashing and I had to keep resetting the TC. the Apple support person said these, extend wireless network and joint wireless network, are no longer a connection option with the new TC because of the new AC protocol.
Thanks again!
You cannot extend to a non-apple wireless router.
You cannot use join a wireless network because when you do the ethernet ports will be cut off.
But that has not changed.. I don't think Apple support is correct.. there has been no change with the AC model.. it is simply a fact that apple routers do not work in join wireless mode other than as a dumb client. The same applies to AC as to the earlier version.. but I have asked another person to check this.
Join in the express is the only apple router that still allows an ethernet connection.
For now you best use of the TC is bridged to the FIOS. Wireless you can sort out between several options.
Maybe you are looking for
-
Generating hashes for multiple shares in one folder using BranchCache Publish-BCFileContent -Path
When using Publish-BCFileContent to generate hashes for multiple shared directories that are all within the same parent directory, can I just specify the parent directory as the "-Path" parameter or do I need to run the cmdlet for each share separate
-
When I Print a Document to PDF and Save a PDF the format displays differently.
We use PDF with Microsoft Dynamics GP. When we Print a document to PDF the format of the form is fine. When we SAVE a document to PDF the format is off. We believe we have ruled out application issues.
-
Learn how to create your first Business Catalyst site using Muse, then push it live online with just a few clicks. http://adobe.ly/OU3cnr
-
How to create an authorized URL
Hi, From the documentation: To add a new URL: Click Create. Authorized URL - Enter an authorized URL that can be used as the parameter value to certain Application Express procedures. The entire authorized URL value will be compared with the URL para
-
My iTunes is plugged up to my stereo, and it won't play back, what should I do?
Okay.. My computer is plugged up to my stereo via a usb PC link, and it's working fine, and everything. I can watch movies, and play anything on Pandora, or Netflix, or YouTube. All of my audio is working fine except for anything on iTunes. It will p