APs (LAP1142N) are disconnecting after joining the WLC (5508)

Hi,
We are having a problem at the school I'm working at. There are 133 APs located across campus.
They have been running for 3.5 years without any trouble.
Recently we have been having issues with APs disconnecting at random.
It started last week with just a couple. We got them running again, but later the same day new ones had disconnected.
This has continued with more APs and it looks like it happens at random and it is never the same one that disconnects.
We have a centralized support-unit that helps us with stuff like this, but they haven't come up with a solution, so I was hoping someone here had seen this behavior before.
Today at 7AM all the APs were running, but at the time of this post 6 of them have disconnected.
AP (130 of them):
Product ID: AIR-LAP1142N-E-K9
Version ID: V01
Software Version: 7.4.100.0
Boot version: 12.4.18.3
IOS: 15.2(2)JB$
Country Code: Norway (NO)
Regulatory domains: 802.11bg:-E    802.11a:-E
Controller:
Cisco 5508 Wireless Controller
Firmware: 7.4.100.0
Recovery version: 6.0.182.0
Temp is running at 35C
Memory at a stable 50%
Cores 0%/2%, 4%/2%, 3%/2%, 4%/1%, 3%/3%, 5%/2%, 0%/1%, 0%/1%, 0%/1%, 0%/1%
Only using 4 of the ports on the controller 1-4
Some of the error-messages I have located on the different APs that have disconnected:
Layer 3 discovery request not received on management VLAN
Lwapp discovery request rejected
Just give me a shout if any other information is needed.
- Hille

You may be facing this bug CSCud97983
https://tools.cisco.com/bugsearch/bug/CSCud97983
Here are some more information about bugs we experienced with this 7.4 code
http://mrncciew.com/2013/02/10/day-0-with-wlc-7-4-code/
7.4MR2 (7.4.111.x) is available (pre-release image) if you want latest bug fixed image. This is specially if you are using wireless guest service & having apple iOS 7 devices.
https://supportforums.cisco.com/docs/DOC-37334
HTH
Rasika
**** Pls rate all useful responses ****

Similar Messages

  • Converted 1140 AP can't join the WLC 5508

    Hello! Please, help me to sort my problem out.
    We have bought autonomous APs   AIR-AP1141N-E-K9 and converted them to the lightweight mode, but they cannot join the WLC 5508. The errors are below. There were NO problems with the LAPs that were bought before, together with the WLC.
    AP's IP: 172.22.90.27   IOS version  12.4
    WLC's IP: 172.22.90.20   IOS version 6.0.188.0
    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    This Discussion has been converted into document:- https://supportforums.cisco.com/docs/DOC-23054
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    logs from the AP:
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:06.044: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.045: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.046: bsnInitRcbSlot: slot 1 has NO radio
    *Oct 13 21:37:06.056: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to a
    dministratively down
    *Oct 13 21:37:06.066: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to r
    eset
    *Oct 13 21:37:06.098: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:15.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLL
    ER
    *Oct 13 21:37:24.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
    LER
    *Oct 13 21:37:34.060: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.822: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:34.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.824: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap p
    acket from 172.22.90.20
    *Oct 13 21:39:33.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:39:34.000: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.001: %DTLS-5-PEER_DISCONNECT: Peer 172.22.90.20 has closed conn
    ection.
    *Oct 13 21:38:34.001: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:38:34.001: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination
    *Oct 13 21:38:34.125: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    logs from the WLC:
    debug capwap events enable
    *Dec 21 15:02:06.244: 68:bc:0c:63:3d:a0 DTLS keys for Control Plane deleted successfully for AP 172.22.90.27
      *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 DTLS connection closed event receivedserver (172:22:90:20/5246) client (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Entry exists for AP (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    Ble
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 capwap_ac_platform.c:1223 - Operation State 0 ===> 4
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 Register LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
      *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join Version: = 100711424
    *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Maximum Msg element len = 93
    debug capwap errors enable
    *Dec 21 16:16:51.879: 68:bc:0c:63:3d:a0 DTLS connection was closed
    *Dec 21 16:17:09.940: 68:bc:0c:63:3d:a0 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =5
    debug capwap detail enable
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 packet received of length 281 from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Msg Type = 3 Capwap state = 5
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: Result Code message element len = 8
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 1. 47 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 2. 232 3
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 3. 6 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 4. 12 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Descriptor message element len = 48
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 acName = Wi-Fi_Controller
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Name message element len = 68
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: WTP Radio Information message element len = 77
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Control IPV4 Address len = 87
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Sending encrypted packet to AP 172:22:90:27 (21078)
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Releasing WTP
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21077
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 DTLS connection 0x167c8b20 closed by controller
    *Dec 21 16:24:12.212: DTL Deleting AP 9 - 0.0.0.0
    *Dec 21 16:24:12.214: CAPWAP DTLS connection closed msg
    *Dec 21 16:24:12.216: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.216: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.218: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.220: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.222: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.224: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.226: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.228: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.228: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.230: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.232: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.234: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.236: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Deleting and removing AP 68:bc:0c:63:3d:a0 from fast path
    P.S. The time is set to the WLC with the NTP
    P.P.S. Don't lookup at the time the logs were made - they were made not during the same day/time

    I have solved this as soon as published my problem!!!
    the answer is published here:
    https://supportforums.cisco.com/thread/2004491
    especially in the post of Matthew Fowler
    Hi,
    Please take a look at CSCte01087.
    I see that your WLC is 10.0.13.5 and your AP is 10.0.13.28/24 so they are on the same subnet. I also see your AP MAC address does not begin with 00. This is why I believe it is relevant.
    Please try the workaround or open a TAC case if you need a fix.
    -Matt
    Symptom:
    An access point running 6.0.188.0 code may be unable to join a WLC5508.
    Messages similar to the following will be seen on the AP.
       %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
       %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
    Conditions:
    At least one of the following conditions pertains:
    - The high order byte of the AP's MAC address is nonzero, and the AP is in
    the same subnet as the WLC5508's management (or AP manager) interface
    - The WLC's management (or AP manager) interface's default gateway's
    MAC address' high order byte is nonzero.
    Workaround:
    If the MAC address of the WLC's default gateway does not begin with 00,
    and if all of the APs' MAC addresses begin with 00, then: you can put
    the APs into the same subnet as the WLC's management (or AP manager)
    interface.
    In the general case, for the situation where the WLC's default gateway's
    MAC does not begin with 00, you can address this by changing it to begin
    with 00. Some methods for doing this include:
    -- use the "mac-address" command on the gateway, to set a MAC address
    that begins with 00
    -- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
    IP as the WLC's gateway.
    For the case where the APs' MAC addresses do not begin with 00, then make
    sure that they are *not* in the same subnet as the WLC's management
    (AP manager) interface, but are behind a router.
    Another workaround is to downgrade to 6.0.182.0.  However, after
    downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
    (i.e. 12.4(21a)JA2) still installed on them will be unable to join.
    Therefore, after downgrading the WLC, the APs will need to have a
    pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.
    different vlan!!!! yes! thank you Matthew Fowler sooooo much!!!!

  • AP 3702 not join the WLC

    Hi,
    I have two WLC 8500 working in SSO and with nat enable feature configure in management interface.
    SSO is working, but i have to configure NAT before SSO becasuse when SSO is up, ip address and nat are greyed out in managemente interface.
    Some AP's must join the controller in the private address of the management interface and others AP must join in the public ip address configured in NAT address. 
    for some reason, there are a lot of AP's that can't join the controller, i have 3 ap's joined in the public ip address and 3 ap's joined in the private ip address
    config network ap-discovery nat-only disable is already configured, from the console of one AP that can't not join i see the following:
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:32:48.115: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 212.89.5.130 peer_port: 5246
    *Sep 10 12:36:17.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Sep 10 12:36:47.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 212.89.5.130:5246
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Selected MWAR 'GI12WLC001A'(index 0).
    *Sep 10 12:36:47.999: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Sep 10 12:35:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.35.0.78 peer_port: 5246
    the AP is trying both private and public ip address to join the WLC but can't join properly.
    From the WLC console:
    debug capwap errors enable:
    *spamApTask4: Sep 10 13:13:49.837: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.13:47807)since DTLS session is not established 
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: 1c:6a:7a:5b:e0:30 ApModel: AIR-CAP3702I-E-K9
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask3: Sep 10 13:13:49.958: Unknown AP type. Using Controller Version!!!
    *spamApTask2: Sep 10 13:13:52.103: 00:10:db:ff:50:06 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  10.35.1.11:21207)since DTLS session is not established 
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: 1c:6a:7a:5e:0f:10 ApModel: AIR-CAP3702I-E-K9
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    *spamApTask1: Sep 10 13:13:52.224: Unknown AP type. Using Controller Version!!!
    the AP model are the same, this is not the problem, but for some reason there are AP's that have problems with the NAT configuration, if i disable NAT option, every AP with private ip address config can join the WLC.
    I've tried to break SSO, desconfigure NAT, and private ip address AP join the controller without problem.
    anybody can give me a clue?
    Regards!

    it seens like DTLS connection can't be stablished between AP and WLC.
    The AP sends discovery request
    the WLC respond with two discovery responds, the firts one, contains the public ip address of the WLC and the second one contains the private ip address.
    once discovery proccess is complete, the AP tries to send DTLS hello packet to the WLC, but this packet never arrives to WLC.
    because hello doesn't arrive, the AP sends a close notify alert to the WLC and tries to send the DTLS hello packet to the WLC private address with same result.
    the AP get into a loop trying to send DTLS hello packets to both private and public address.
    DTLS hello packet never arrive, but close notify alert arrive to WLC.
    theres is FW in the middle doing NAT, but i can understand why close notify alert packets error arrives WLC and Hello DTLS packets don't. this packets uses the same protocol UDP and the same port.
    Regards

  • Ap won't join the WLC

    Hello Guys,
    I have converted ap 1131 from autonomous to lwapp successfully by using upgrade utility tool but the AP does not join the WLC 2106. I can see it as a neighbor on the switch with no IP address. please help me.
    Thank you

    Hello Scott,
    Thank you for the reply
    Please find the attached file for the config, i found out that i have not updated the time on WLC  but i did update the time on WLC and tested for other AP and this one too wont join the WLC. The ap are located remote.
    atsg-wl1#show run | incl hostname
    hostname atsg-wl1
    atsg-wl1#test pb display
    Display of the Parameter Block
    Total Number of Records : 7
    Number of Certs : 6
    Number of Keys : 1
    atsg-wl1#term length 0
    atsg-wl1#show version | include Cisco IOS
    Cisco IOS Software, C1130 Software (C1130-K9W7-M), Version 12.3(7)JA3, RELEASE SOFTWARE (fc1)
    atsg-wl1#show controller | include Radio AIR
    Radio AIR-AP1131G, Base Address 0019.0737.02f0, BBlock version 0.00, Software version 5.80.15
    Radio AIR-AP1131A, Base Address 0019.073b.02d0, BBlock version 0.00, Software version 5.80.15
    atsg-wl1#show controllers d0 | include Current
    Current Frequency: 2447 MHz  Channel 8
    Current CCK Power: 14 dBm
    Current OFDM Power: 14 dBm
    Current Rates:  basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    atsg-wl1#show controllers d1 | include Current
    Current Frequency: 5805 MHz  Channel 161
    Current Power: 17 dBm
    Current Rates:  basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
    atsg-wl1#show run | include station-role
    station-role root
    station-role root
    atsg-wl1#test pb disp
    Display of the Parameter Block
    Total Number of Records : 7
    Number of Certs : 6
    Number of Keys : 1
    atsg-wl1#show int F0 | include address
      Hardware is PowerPCElvis Ethernet, address is 0019.555f.ccfa (bia 0019.555f.ccfa)
    atsg-wl1#show int | include Dot11Radio
    Dot11Radio0 is up, line protocol is up
    Dot11Radio1 is up, line protocol is up
    atsg-wl1#show sntp | exclude SNTP
    10.148.0.1         16        1        never     
    172.16.21.57       16        1        never     
    Broadcast client mode is enabled.
    atsg-wl1#show run
    Building configuration...
    Current configuration : 6025 bytes
    ! Last configuration change at 19:35:46 UTC Thu Jan 31 2013 by didata
    ! NVRAM config last updated at 19:13:48 UTC Fri Feb 1 2013 by didata
    version 12.3
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime localtime
    service password-encryption
    hostname atsg-wl1
    logging buffered informational
    logging console informational
    enable secret 5
    ip subnet-zero
    ip domain name aspentech.com
    ip name-server 10.96.16.230
    ip name-server 10.148.0.249
    ip name-server 10.32.19.1
    aaa new-model
    aaa group server radius rad_eap
    server 10.16.16.123 auth-port 1645 acct-port 1646
    aaa authentication login default group tacacs+ local
    aaa authentication login eap_methods group rad_eap
    aaa authentication login mac_methods local
    aaa authentication enable default group tacacs+ enable
    aaa authorization exec default group tacacs+ local
    aaa authorization commands 15 default group tacacs+ local
    aaa accounting exec default start-stop group tacacs+
    aaa accounting commands 15 default start-stop group tacacs+
    aaa accounting system default start-stop group tacacs+
    aaa session-id common
    no dot11 igmp snooping-helper
    dot11 ssid
       authentication open eap eap_methods
       authentication network-eap eap_methods
       guest-mode
       infrastructure-ssid optional
    dot11 network-map
    power inline negotiation prestandard source
    usernamepassword 7
    username privilege 15 password 7
    usernamep rivilege 15 password 7
    class-map match-all _class_Protocol_301_C351
    match access-group name Voice_Over_IP_301
    class-map match-all _class_8
    match ip dscp cs1
    class-map match-all _class_0
    match ip dscp default
    class-map match-all _class_48
    match ip dscp cs6
    class-map match-all _class_18
    match ip dscp af21
    class-map match-all _class_24
    match ip dscp cs3
    class-map match-all _class_16
    match ip dscp cs2
    class-map match-all _class_34
    match ip dscp af41
    class-map match-all _class_26
    match ip dscp af31
    class-map match-all _class_40
    match ip dscp cs5
    class-map match-all _class_46
    match ip dscp ef
    class-map match-all _class_56
    match ip dscp cs7
    class-map match-all _class_10
    match ip dscp af11
    class-map match-all _class_32
    match ip dscp cs4
    policy-map _policy_Voice_Over_IP_202
    class _class_Protocol_301_C351
      set cos 6
    policy-map _policy_fallback_policy
    class _class_0
      set cos 0
    class _class_8
      set cos 1
    class _class_10
      set cos 1
    class _class_16
      set cos 2
    class _class_18
      set cos 2
    class _class_24
      set cos 3
    class _class_26
      set cos 3
    class _class_32
      set cos 4
    class _class_34
      set cos 4
    class _class_40
      set cos 5
    class _class_46
      set cos 5
    class _class_48
      set cos 6
    class _class_56
      set cos 7
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    shutdown
    encryption mode wep mandatory mic key-hash
    broadcast-key change 900
    ssid
    traffic-class background cw-min 5 cw-max 8 fixed-slot 2
    traffic-class best-effort cw-min 5 cw-max 8 fixed-slot 6
    traffic-class video cw-min 4 cw-max 6 fixed-slot 1
    traffic-class voice cw-min 3 cw-max 7 fixed-slot 1
    speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0
    packet retries 32
    fragment-threshold 2338
    station-role root
    rts threshold 2339
    rts retries 32
    world-mode legacy
    no cdp enable
    infrastructure-client
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface Dot11Radio1
    no ip address
    no ip route-cache
    shutdown
    encryption mode wep mandatory mic key-hash
    broadcast-key change 900
    ssid aspen100abcdefgh
    speed basic-6.0 9.0 basic-12.0 18.0 basic-24.0 36.0 48.0 54.0
    station-role root
    world-mode legacy
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    duplex auto
    speed auto
    bridge-group 1
    no bridge-group 1 source-learning
    bridge-group 1 spanning-disabled
    interface BVI1
    ip address 10.148.0.7 255.255.255.0
    no ip route-cache
    ip default-gateway 10.148.0.1
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip tacacs source-interface BVI1
    ip radius source-interface BVI1
    ip access-list extended Voice_Over_IP_300
    permit 119 any any
    permit ip any any
    ip access-list extended Voice_Over_IP_301
    permit 119 any any
    permit ip any any
    logging facility local0
    snmp-server view iso_view iso included
    snmp-server community admin view iso_view RW
    snmp-server community all4114all view iso_view RW
    snmp-server community ddbos2000 RO
    snmp-server location ATSG
    snmp-server contact James Lee
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps disassociate
    snmp-server enable traps deauthenticate
    snmp-server enable traps authenticate-fail
    snmp-server enable traps config
    snmp-server enable traps syslog
    snmp-server host 192.135.137.12 ddbos2000
    tacacs-server host 10.16.16.123 key 7
    tacacs-server host 10.96.16.245 key 7
    tacacs-server directed-request
    radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
    radius-server deadtime 120
    radius-server vsa send accounting
    radius-server vsa send authentication
    control-plane
    bridge 1 route ip
    line con 0
    transport preferred all
    transport output all
    stopbits 1
    line vty 0 4
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    line vty 5 15
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    end
    atsg-wl1#show run | incl hostname
    hostname atsg-wl1
    atsg-wl1#arch down /over /create-space  tftp://10.148.0.118/images/c1130-rcvk                                                                    $over /create-space  tftp://10.148.0.118/images/c1130-rcvk9                  w8-tar.12                                                                   te-space  tftp://10.148.0.118/images/c1130-rcvk9w8-tar.123                  -11.JX1.t                                                                  ftp://10.148.0.118/images/c1130-rcvk9w8-tar.123-11.JX1.ta                  r
    examining image...
    Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
    extracting info (273 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    [OK - 1873920 bytes]
    Image info:
        Version Suffix: rcvk9w8-
        Image Name: c1130-rcvk9w8-mx
        Version Directory: c1130-rcvk9w8-mx
        Ios Image Size: 1874432
        Total Image Size: 1874432
        Image Feature: WIRELESS LAN|LWAPP|RECOVERY
        Image Family: C1130
        Wireless Switch Management Version: 3.0.51.0
    Extracting files...
    Loading images/c1130-rcvk9w8-tar.123-11.JX1.tar from 10.148.0.118 (via BVI1): !
    extracting info (273 bytes)
    c1130-rcvk9w8-mx/ (directory) 0 (bytes)
    extracting c1130-rcvk9w8-mx/c1130-rcvk9w8-mx (1867816 bytes)!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    extracting c1130-rcvk9w8-mx/info (273 bytes)
    extracting info.ver (273 bytes)!
    [OK - 1873920 bytes]
    Deleting current version...
    Deleting flash:/c1130-k9w7-mx.123-7.JA3...done.
    New software image installed in flash:/c1130-rcvk9w8-mx
    Configuring system to use new image...done.
    atsg-wl1#show archive status
    SUCCESS: Upgrade complete.
    atsg-wl1#write erase
    Erasing the nvram filesystem will remove all configuration files! Continue? [confirm]
    [OK]
    Erase of nvram: complete
    atsg-wl1#dir flash:
    Directory of flash:/
        2  -rwx        2072  Jan 31 2013 19:36:18 +00:00  private-multiple-fs
      149  drwx         128  Jan 31 2013 19:36:11 +00:00  c1130-rcvk9w8-mx
        4  -rwx         342  Jan 31 2013 19:36:14 +00:00  env_vars
    15998976 bytes total (14126080 bytes free)
    atsg-wl1#dir nvram:
    Directory of nvram:/
       30  -rw-           0                      startup-config
       31  ----           0                      private-config
        1  -rw-           0                      ifIndex-table
        2  ----          12                      persistent-data
    32768 bytes total (30668 bytes free)
    atsg-wl1#sh crypto ca trustpoints
    atsg-wl1#sh crypto ca certificates
    atsg-wl1#terminal length 0
    atsg-wl1#show run | begin BVI1
    interface BVI1
    ip address 10.148.0.7 255.255.255.0
    no ip route-cache
    ip default-gateway 10.148.0.1
    ip http server
    ip http authentication aaa
    no ip http secure-server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag
    ip tacacs source-interface BVI1
    ip radius source-interface BVI1
    ip access-list extended Voice_Over_IP_300
    permit 119 any any
    permit ip any any
    ip access-list extended Voice_Over_IP_301
    permit 119 any any
    permit ip any any
    logging facility local0
    snmp-server view iso_view iso included
    snmp-server community admin view iso_view RW
    snmp-server community all4114all view iso_view RW
    snmp-server community ddbos2000 RO
    snmp-server location ATSG
    snmp-server contact James Lee
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps disassociate
    snmp-server enable traps deauthenticate
    snmp-server enable traps authenticate-fail
    snmp-server enable traps config
    snmp-server enable traps syslog
    snmp-server host 192.135.137.12 ddbos2000
    tacacs-server host 10.16.16.123 key 7
    tacacs-server host 10.96.16.245 key 7
    tacacs-server directed-request
    radius-server host 10.16.16.123 auth-port 1645 acct-port 1646 timeout 5 retransmit 3 key 7
    radius-server deadtime 120
    radius-server vsa send accounting
    radius-server vsa send authentication
    control-plane
    bridge 1 route ip
    line con 0
    transport preferred all
    transport output all
    stopbits 1
    line vty 0 4
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    line vty 5 15
    exec-timeout 0 0
    transport preferred all
    transport input all
    transport output all
    end

  • Mail outgoing servers say they are disconnected - after an update was installed

    When I updated to Mavericks I had this problem with Gmail and a Yahoo account.  I can receive e-mail, but not send. It tells me the outgoing servers are disconnected.  Now the problem is back after an update.  I tried the 995 and 465 ports - does not work.

    Hello slesage,
    Thanks for using Apple Support Communities.
    To troubleshoot issues with Mail on your Mac please follow the steps in the article below.
    OS X Mail: Troubleshooting sending and receiving email messages
    http://support.apple.com/kb/TS3276
    Take care,
    Alex H.

  • A Pool users are unable to Join the meeting

    Hi,
    We have a set of users from a pool which is meant for a different site, they are unable to join the meeting. Once they click on Lync meeting in Lync meeting invite, they get the  error - 
    error: A server error occurred. Please contact your support team.
    Can you guide me what tests can be performed to troubleshoot this?
    Please note: we have 2 sites and the certificate tool checker shows na-join.danahermail.com and eu-join.danahermail.com  certficate to be missing an intermediate certificate. Could that be the cause of the issue or I need to check something else?
    Thanks & Regards,
    Vinay Mishra

    Hi,
    Would you please elaborate your Lync Server environment?
    Please make sure all FE Server services started as normal.
    Please also double check if you configure the correct certificate for FE Servers.
    More details:
    https://technet.microsoft.com/en-us/library/gg398094(v=ocs.14).aspx
    Make sure that you add the meet URL such as meet.contoso.com in internal DNS and in the SAN of the FE Server certificate.
    Best Regards,
    Eason Huang
    Eason Huang
    TechNet Community Support

  • Trouble getting Cisco 2600 Series AP to stay joined to WLC 5508

    Hi,
    I have recently been tasked with upgrading our old Autonomous APs to LWAPs.  We have a 5508 WLC at our Virtual Co-Lo and I am using Flexconnect to accomadate local switching and dhcp at our sites.  I have upgraded over 50 APs and joined them to the controller.  These include only 1130AG and 1240AG models.  However they are working flawlessly and staying connected to the controller.  The issue I'm having is with a new batch of 2600 series APs staying connected to the controller.  I have attempted to do research into what may be causing the disconnects but have yet to find a solution.  I am using DNS to resolve the CAPWAP & LWAPP queries from the APs to the controller accross our WAN.  In reading other posts I thought it may be an issue with packets getting dropped but have had our Vendor who manages Sonicwalls at both ends of the WAN confirm for me there is no packet loss.  Below are logs I gathered using puttty from the AP & WLC.  Any help would be greatly appreciated.
    AP I'm doing the testing on:
    NAME: "AP2600", DESCR: "Cisco Aironet 2600 Series (IEEE 802.11n) Access Point"
    PID: AIR-CAP2602I-A-K9 , VID: V01, SN: FTX1740J8V1
    WLC in question:
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.3.112.0
    Bootloader Version............................... 1.0.1
    Field Recovery Image Version..................... 6.0.182.0
    Firmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27
    Build Type....................................... DATA + WPS
    System Name...................................... wificontroller
    System Location.................................. Corp
    System Contact................................... Net Engineer
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    Redundancy Mode.................................. Disabled
    IP Address....................................... 10.250.32.8
    Last Reset....................................... Software reset
    System Up Time................................... 190 days 3 hrs 34 mins 24 secs
    System Timezone Location......................... (GMT -5:00) Eastern Time (US and Canada)
    Configured Country............................... US  - United States
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    --More-- or (q)uit
    Internal Temperature............................. +38 C
    External Temperature............................. +20 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 14
    Number of Active Clients......................... 71
    Burned-in MAC Address............................ C8:9C:1D:8C:52:E0
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Absent
    Maximum number of APs supported.................. 100
    Here is the output that keeps on occuring as the AP joins the WLC for a brief time and then changes to standalone mode
    WT-4thFlr-AP3#
    *Dec 14 15:42:04.419: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(CAPWAP_WTP_EVENT_REQUEST
    ., 3)
    *Dec 14 15:42:11.443: %EVT-4-WRN: Write of flash:/event.capwap done
    *Dec 14 15:42:11.483: %LWAPP-3-CLIENTERRORLOG: Switching to Standalone mode
    *Dec 14 15:42:11.487: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE
    *Dec 14 15:42:11.487: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.250.32.8:5246
    *Dec 14 15:42:11.571: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Dec 14 15:42:21.575: %CAPWAP-3-ERRORLOG: Selected MWAR 'wificontroller'(index 0).
    *Dec 14 15:42:21.575: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 14 15:42:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:42:14.303: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:42:14.303: %CAPWAP-5-SENDJOIN: sending Join Request to 10.250.32.8
    *Dec 14 15:42:15.127: Starting Ethernet promiscuous mode
    *Dec 14 15:42:15.535: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Dec 14 15:42:15.667: ac_first_hop_mac - IP:10.1.2.250 Hop IP:10.1.2.250 IDB:BVI1
    *Dec 14 15:42:15.667: Setting AC first hop MAC: 0017.c575.a23c
    *Dec 14 15:42:15.855: %CAPWAP-5-JOINEDCONTROLLER: AP has joined controller wificontroller
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.911: %LWAPP-4-CLIENTEVENTLOG: No LS Flex ACL map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.915: %LWAPP-4-CLIENTEVENTLOG: No Central Dhcp map configuration file to load. Connect to controller to get configuration file
    *Dec 14 15:42:15.915: %LWAPP-3-CLIENTERRORLOG: Switching to Connected mode
    *Dec 14 15:42:23.639: %WIDS-6-ENABLED: IDS Signature is loaded and enabled
    *Dec 14 15:42:34.615: %CLEANAIR-6-STATE: Slot 0 disabled
    *Dec 14 15:42:34.615: %CLEANAIR-6-STATE: Slot 1 disabled
    *Dec 14 15:45:43.783: %CAPWAP-3-ERRORLOG: Retransmission count for packet exceeded max(CAPWAP_WTP_EVENT_REQUEST
    ., 11)
    *Dec 14 15:45:43.787: %LWAPP-3-CLIENTERRORLOG: Switching to Standalone mode
    *Dec 14 15:45:43.787: %CAPWAP-3-ERRORLOG: GOING BACK TO DISCOVER MODE
    *Dec 14 15:45:43.787: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.250.32.8:5246
    *Dec 14 15:45:43.867: %WIDS-6-DISABLED: IDS Signature is removed and disabled.
    *Dec 14 15:45:53.867: %CAPWAP-3-ERRORLOG: Selected MWAR 'wificontroller'(index 0).
    *Dec 14 15:45:53.867: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 14 15:45:44.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:45:46.315: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 10.250.32.8 peer_port: 5246
    *Dec 14 15:45:46.315: %CAPWAP-5-SENDJOIN: sending Join Request to 10.250.32.8
    *Dec 14 15:45:46.487: Starting Ethernet promiscuous mode
    *Dec 14 15:45:49.903: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Dec 14 15:45:50.031: ac_first_hop_mac - IP:10.1.2.250 Hop IP:10.1.2.250 IDB:BVI1
    *Dec 14 15:45:50.031: Setting AC first hop MAC: 0017.c575.a23c
    Here are the results of debug capwap client event on the AP:
    WT-4thFlr-AP3#debug capwap client event
    CAPWAP Client EVENT display debugging is on
    WT-4thFlr-AP3#
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:54:58.335: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:54:58.343: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:55:08.000: %CAPWAP-3-EVENTLOG: Setting time to 15:55:08 UTC Dec 14 2013
    *Dec 14 15:55:25.579: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:25.587: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:55:25.827: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:25.835: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:55:55.835: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:55:55.843: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:55:56.000: %CAPWAP-3-EVENTLOG: Setting time to 15:55:56 UTC Dec 14 2013
    *Dec 14 15:56:25.735: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:25.743: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:56:25.983: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:25.991: %CAPWAP-3-EVENTLOG: Wtp Event Response from 10.250.32.8
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Echo Interval Expired.
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Dec 14 15:56:55.991: %CAPWAP-3-EVENTLOG: Echo Request sent to 10.250.32.8
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Dec 14 15:56:55.999: %CAPWAP-3-EVENTLOG: Echo Response from 10.250.32.8
    *Dec 14 15:56:56.000: %CAPWAP-3-EVENTLOG: Setting time to 15:56:56 UTC Dec 14 2013
    Here are the results of debug capwap client packet detail:
    WT-4thFlr-AP3#
    *Dec 14 15:59:01.823: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.823: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:01.823:         Msg Type   : CAPWAP_ECHO_REQUEST
    *Dec 14 15:59:01.823:         Msg Length : 0
    *Dec 14 15:59:01.823:         Msg SeqNum : 44
    *Dec 14 15:59:01.823: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.831: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:01.831: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:01.831:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:01.831:         Msg Type   : CAPWAP_ECHO_RESPONSE
    *Dec 14 15:59:01.831:         Msg Length : 15
    *Dec 14 15:59:01.831:         Msg SeqNum : 44
    *Dec 14 15:59:01.831: 
    *Dec 14 15:59:01.831:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 11
    *Dec 14 15:59:01.831:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:01.831:
    *Dec 14 15:59:01.831:
        IE            :   UNKNOWN IE 151
    *Dec 14 15:59:01.831:     IE Length     :   5
    *Dec 14 15:59:01.831:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:01.831:
    52 AC 80 46 00
    *Dec 14 15:59:01.831: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:20.931:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:20.931:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:20.931:         Msg Length : 93
    *Dec 14 15:59:20.931:         Msg SeqNum : 38
    *Dec 14 15:59:20.931: 
    *Dec 14 15:59:20.931:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 89
    *Dec 14 15:59:20.931:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:20.931:
    *Dec 14 15:59:20.931:
        IE            :   RRM_NEIGHBOR_CTRL_PAYLOAD
    *Dec 14 15:59:20.931:     IE Length     :   83
    *Dec 14 15:59:20.931:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:20.931:
    00 0A FA 20 08 01 F4 00 07 0A FA 20 08 03 00 01
    01 00 3C 00 B4 2E 06 2E E7 B4 94 51 B2 C7 79 25
    22 FD BE 04 F6 00 00 00 00 00 00 00 00 4F 50 52
    53 2D 57 69 46 69 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 01 06 0B
    01 01 01
    *Dec 14 15:59:20.931: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:20.931: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:20.931:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:20.931:         Msg Length : 8
    *Dec 14 15:59:20.931:         Msg SeqNum : 38
    *Dec 14 15:59:20.931: 
    *Dec 14 15:59:20.931:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:20.931:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:20.931: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.139: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.139: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:21.139:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:21.139:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:21.139:         Msg Length : 111
    *Dec 14 15:59:21.139:         Msg SeqNum : 39
    *Dec 14 15:59:21.139: 
    *Dec 14 15:59:21.139:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 107
    *Dec 14 15:59:21.139:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:21.139:
    *Dec 14 15:59:21.139:
        IE            :   RRM_NEIGHBOR_CTRL_PAYLOAD
    *Dec 14 15:59:21.139:     IE Length     :   101
    *Dec 14 15:59:21.139:     Decode routine not available, Printing Hex Dump
    *Dec 14 15:59:21.143:
    01 0A FA 20 08 01 F4 00 07 0A FA 20 08 0C 00 01
    01 00 3C 00 B4 2E 06 2E E7 B4 94 51 B2 C7 79 25
    22 FD BE 04 F6 00 00 00 00 00 00 00 00 4F 50 52
    53 2D 57 69 46 69 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 24 28 2C
    30 34 38 3C 40 95 99 9D A1 01 01 01 01 01 01 01
    01 01 01 01 01
    *Dec 14 15:59:21.143: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.143: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:21.143: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:21.143:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:21.143:         Msg Length : 8
    *Dec 14 15:59:21.143:         Msg SeqNum : 39
    *Dec 14 15:59:21.143: 
    *Dec 14 15:59:21.143:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:21.143:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:21.143: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.547: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.547: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:25.547:         Msg Type   : CAPWAP_WTP_EVENT_REQUEST
    *Dec 14 15:59:25.547:         Msg Length : 14
    *Dec 14 15:59:25.547:         Msg SeqNum : 45
    *Dec 14 15:59:25.547: 
    *Dec 14 15:59:25.547:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *Dec 14 15:59:25.547:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:25.547:
    *Dec 14 15:59:25.547:
        IE            :   RRM_LOAD_DATA_PAYLOAD
    *Dec 14 15:59:25.547:     IE Length     :   4
    *Dec 14 15:59:25.547:          slot 0 rxLoad 0 txLoad 0 ccaLoad 33
    *Dec 14 15:59:25.547: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.555: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.555: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:25.555:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:25.555:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:25.555:         Msg Length : 0
    *Dec 14 15:59:25.555:         Msg SeqNum : 45
    *Dec 14 15:59:25.555: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.795: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.795: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:25.795:         Msg Type   : CAPWAP_WTP_EVENT_REQUEST
    *Dec 14 15:59:25.795:         Msg Length : 14
    *Dec 14 15:59:25.795:         Msg SeqNum : 46
    *Dec 14 15:59:25.795: 
    *Dec 14 15:59:25.795:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *Dec 14 15:59:25.795:         Vendor Identifier  : 0x00409600
    *Dec 14 15:59:25.795:
    *Dec 14 15:59:25.795:
        IE            :   RRM_LOAD_DATA_PAYLOAD
    *Dec 14 15:59:25.795:     IE Length     :   4
    *Dec 14 15:59:25.795:          slot 1 rxLoad 0 txLoad 0 ccaLoad 0
    *Dec 14 15:59:25.795: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.803: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:25.803: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:25.803:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:25.803:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:25.803:         Msg Length : 0
    *Dec 14 15:59:25.803:         Msg SeqNum : 46
    *Dec 14 15:59:25.803: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:30.375:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:30.375:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_REQUEST
    *Dec 14 15:59:30.375:         Msg Length : 17
    *Dec 14 15:59:30.375:         Msg SeqNum : 40
    *Dec 14 15:59:30.375: 
    *Dec 14 15:59:30.375:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 13
    *Dec 14 15:59:30.375:         Vendor Identifier  : 0x00409600
            SlotId                  :   0
            Mobile Mac Addr         :   BC:52:B7:E3:17:CB
    *Dec 14 15:59:30.375: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.375: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 15:59:30.375:         Msg Type   : CAPWAP_CONFIGURATION_UPDATE_RESPONSE
    *Dec 14 15:59:30.379:         Msg Length : 8
    *Dec 14 15:59:30.379:         Msg SeqNum : 40
    *Dec 14 15:59:30.379: 
    *Dec 14 15:59:30.379:      Type : CAPWAP_MSGELE_RESULT_CODE, Length 4
    *Dec 14 15:59:30.379:         Result Code : CAPWAP_SUCCESS
    *Dec 14 15:59:30.379: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.387: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 15:59:30.387: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 15:59:30.387:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 15:59:30.387:         Msg Type   : CAPWAP_WTP_EVENT_RESPONSE
    *Dec 14 15:59:30.387:         Msg Length : 0
    *Dec 14 15:59:30.387:         Msg SeqNum : 47
    *Dec 14 15:59:30.387: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.387: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.387: CAPWAP Control mesg Sent to 10.250.32.8, Port 5246
    *Dec 14 16:00:00.387:         Msg Type   : CAPWAP_ECHO_REQUEST
    *Dec 14 16:00:00.387:         Msg Length : 0
    *Dec 14 16:00:00.387:         Msg SeqNum : 48
    *Dec 14 16:00:00.387: <<<<  End of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.395: <<<<   Start of CAPWAP Packet  >>>>
    *Dec 14 16:00:00.395: CAPWAP Control mesg Recd from 10.250.32.8, Port 5246
    *Dec 14 16:00:00.395:         HLEN 2,   Radio ID 0,    WBID 1
    *Dec 14 16:00:00.395:         Msg Type   : CAPWAP_ECHO_RESPONSE
    *Dec 14 16:00:00.395:         Msg Length : 15
    *Dec 14 16:00:00.395:         Msg SeqNum : 48
    *Dec 14 16:00:00.395: 
    *Dec 14 16:00:00.395:      Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 11
    *Dec 14 16:00:00.395:         Vendor Identifier  : 0x00409600
    *Dec 14 16:00:00.395:
    *Dec 14 16:00:00.395:
        IE            :   UNKNOWN IE 151
    *Dec 14 16:00:00.395:     IE Length     :   5
    *Dec 14 16:00:00.395:     Decode routine not available, Printing Hex Dump
    *Dec 14 16:00:00.395:
    52 AC 80 81 00
    *Dec 14 16:00:00.395: <<<<  End of CAPWAP Packet  >>>>

    Under my AP Policies I only have "Accept Manufactured Installed Certificate (MIC)" checked.  I attempted to add the AP based on MAC Address (c0:67:af:6f:25:70) with this certificate type but still have the same issue.  I then ran the following debug on my controller and this is the output I recieve regarding that MAC.  I tried to cut the output short because it get's somewhat redundant but was unsure what exactly to look for in the output.  Should I be selecting a different certificate type?  I am somewhat new to wireless technologies but doing my best to pick things up so if this seems trivial please forgive my ignorance.
    debug pm pki enable
    *sshpmLscTask: Dec 14 20:42:56.450: sshpmLscTask: LSC Task received a message 4
    *spamApTask6: Dec 14 20:42:58.840: sshpmGetIssuerHandles: locking ca cert table
    *spamApTask6: Dec 14 20:42:58.841: sshpmGetIssuerHandles: calling x509_alloc() for user cert
    *spamApTask6: Dec 14 20:42:58.841: sshpmGetIssuerHandles: calling x509_decode()
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AP3G2-c067af6f2570, [email protected]
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles:   O=Cisco Systems, CN=Cisco Manufacturing CA
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Mac Address in subject is c0:67:af:6f:25:70
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Cert Name in subject is AP3G2-c067af6f2570
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: called to evaluate
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: called to get cert for CID 282aef7e
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.845: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.845: ssphmUserCertVerify: calling x509_decode()
    *spamApTask6: Dec 14 20:42:58.856: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (current): 2013/12/15/01:42:58
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (NotBefore): 2013/08/25/13:01:22
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: ValidityString (NotAfter): 2023/08/25/13:11:22
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetIssuerHandles: getting cisco ID cert handle...
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: called to evaluate
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.856: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *spamApTask6: Dec 14 20:42:58.857: sshpmFreePublicKeyHandle: called with 0x2c5f0cb8
    *spamApTask6: Dec 14 20:42:58.857: sshpmFreePublicKeyHandle: freeing public key
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: called to evaluate
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: called to get cert for CID 183fd2b6
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<
    *spamApTask0: Dec 14 20:43:17.451: sshpmGetCID: called to evaluate

  • AP1142N doesn't join his WLC (5508)

    Hello,
    My APs 1142N don't join their WLC. APs and WLC management interface are in the same vlan (WLC can ping all the APs). It is strange because it doesn't seem like they are trying to contact the WLC.
    What's strange is that I have other AP 1142N which joined this WLC without any problem.
    (Cisco Controller) >show sysinfoManufacturer's Name.............................. Cisco Systems Inc.Product Name..................................... Cisco ControllerProduct Version.................................. 7.0.98.214Bootloader Version............................... 1.0.1Field Recovery Image Version..................... N/AFirmware Version................................. FPGA 1.3, Env 1.6, USB console 1.27Build Type....................................... DATA + WPS ...
    ap#show versionCisco IOS Software, C1140 Software (C1140-K9W7-M), Version 12.4(21a)JA1, RELEASE SOFTWARE (fc1)Technical Support: http://www.cisco.com/techsupportCopyright (c) 1986-2009 by Cisco Systems, Inc.Compiled Wed 16-Sep-09 18:09 by prod_rel_teamROM: Bootstrap program is C1140 boot loaderBOOTLDR: C1140 Boot Loader (C1140-BOOT-M) Version 12.4(23c)JA6, RELEASE SOFTWARE (fc1)ap uptime is 43 minutesSystem returned to ROM by power-onSystem image file is "flash:/c1140-k9w7-mx.124-21a.JA1/c1140-k9w7-mx.124-21a.JA1" ...cisco AIR-AP1142N-E-K9     (PowerPC405ex) processor (revision A0) with 98294K/32768K bytes of memory.Processor board ID FCZ1649D2U0PowerPC405ex CPU at 586Mhz, revision number 0x147ELast reset from power-on1 Gigabit Ethernet interface2 802.11 Radio(s)32K bytes of flash-simulated non-volatile configuration memory.Base ethernet MAC Address: E0:2F:6D:A5:AA:F6Part Number                          : 73-12836-06PCA Assembly Number                  : 800-33767-06PCA Revision Number                  : A0PCB Serial Number                    : FOC164732R2Top Assembly Part Number             : 800-33775-05Top Assembly Serial Number           : FCZ1649D2U0Top Revision Number                  : A0Product/Model Number                 : AIR-AP1142N-E-K9
    Regards,

    Ok thank. I didn't notice that it was an autonomous image.
    It seems that I can't use this guide (http://www.cisco.com/en/US/docs/wireless/access_point/conversion/lwapp/upgrade/guide/lwapnote.html#wp157147) to upgrade them to lightweight (can't install software on windows seven).
    Regards

  • LAP's are unable to join Cisco WLC

    Dear all,
    I  have moved my WLC to my datacentre from branch office. after movement i have updated DHCP options with the new ip address but all of my access point are not joining  to WLC.Kindly check the attached cofiguration of WLC as well as LAP logs and It will be a great help if somebody can help me to relsolve this issue.
    Please note that  for datacenter -  Branch connectivity we are using L3  MPLS line and there is no firewall between the office and I am using Ver 7 software on my WLC

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin-top:0cm;
    mso-para-margin-right:0cm;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0cm;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;
    mso-bidi-font-family:"Times New Roman";
    mso-bidi-theme-font:minor-bidi;}
    Hi,
    Your DHCP option 43 is good
    From your file ‘AP error logs.txt’ it’s clear that the DHCP server provides option 43 that point to 10.204.20.4.
    I also see that the controller name is AEDXBWLC01.
    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin-top:0cm;
    mso-para-margin-right:0cm;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0cm;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;
    mso-bidi-font-family:"Times New Roman";
    mso-bidi-theme-font:minor-bidi;}
    The AP cannot guess this name so this means that it can communicate with the controller.
    You do not need to configure DNS
    Your DNS server is not configured with CISCO-LWAPP-CONTROLLER.localdomain. But you do not need to configure DNS since you already have a working option 43.
    If you want to use DNS you should configure both CISCO-CAPWAP-CONTROLLER.localdomain and CISCO-LWAPP-CONTROLLER.localdomain, where localdomain is the access point domain name. Old software use LWAPP and new software uses CAPWAP.
    What might cause the problems?
    I believe that you have a certificate mismatch between the controller and the AP. In order to fix this you can manually add the AP to the AP authorization list.
    In order to allow APs to join, use one of these options:
    Add them to the authorization list of the WLC: use the config auth-list add mic command.
    Add them as clients to the RADIUS server. The Called-Station-ID is the MAC address of the controller. If you separate the APs into groups, you can create policies to define which APs can authenticate against which Called-Station-IDs.
    Debug
    You can debug to see what’s happening when the AP tries to join the controller.
    You can also use this debug to obtain the Ethernet address for the AP:
    (Cisco Controller) >debug lwapp events enable
    Mon May 22 12:00:21 2006: Received LWAPP DISCOVERY REQUEST from AP 00:0b:85:5b:fb:d0 to ff:ff:ff:ff:ff:ff on port '1'
    Mon May 22 12:00:21 2006: Successful transmission of LWAPP Discovery-Response to AP 00:0b:85:5b:fb:d0 on Port 1
    /André

  • LWAPP joining the WLC?

    Dear Forum members.
    I have a home based lab, with a cisco 4402 up to 50 APs, version code 5.x
    a cisco 3500 xl series switch
    and a LWAPP.
    the switch can see the controller back and forth.
    One flat VLAN all across here.
    I get these error messages from the LWAPP.
    *Mar  1 00:00:07.006: %LINK-3-UPDOWN: Interface FastEthernet0, changed state to up
    *Mar  1 00:00:08.006: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0, changed state to up
    *Mar  1 00:00:25.070: %LWAPP-5-CHANGED: LWAPP changed state to DISCOVERY
    *Mar  1 00:00:58.207: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0 assigned DHCP address 192.168.10.100, mask 255.255.255.0, hostname DEMO_1242AG
    *Mar  1 00:01:16.481: %LWAPP-5-CHANGED: LWAPP changed state to JOIN
    *Mar  1 00:01:24.481: LWAPP_CLIENT_ERROR_DEBUG: spamHandleJoinTimer: Did not recieve the Join response
    *Mar  1 00:01:24.481: LWAPP_CLIENT_ERROR_DEBUG: No more AP manager IP addresses remain.
    *Mar  1 00:01:24.504: %SYS-5-RELOAD: Reload requested by LWAPP CLIENT. Reload Reason: DID NOT GET JOIN RESPONSE.
    *Mar  1 00:01:24.504: %LWAPP-5-CHANGED: LWAPP changed state to DOWNXmodem file system is available.
    Based on my research it has to do somehting with authentication of the AP against the AAA.
    I have added the AP mac address on the controller as a trusted AP and still no luck.
    Mind you I am using the WLC as a local DHCP server hence the IP address you see above (192.168.10.100)
    Any ideas what the issue could be?
    Thank you and i would appreciate your help on the matter.

    dmantill this is what I gathered, the majority of the action is on the AP and not on the controller.
    ==========================
    DEMO_1242AG#debug dhc
    DEMO_1242AG#debug dhcp detai
    DEMO_1242AG#debug dhcp detail
    DHCP client activity debugging is on (detailed)
    DEMO_1242AG#
    Apr  4 12:10:57.289: DHCP: Try 12 to acquire address for FastEthernet0
    Apr  4 12:10:57.289: DHCP: allocate request
    Apr  4 12:10:57.289: DHCP: new entry. add to queue
    Apr  4 12:10:57.289: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:10:57.289: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:10:57.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:10:57.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:10:57.290:    DHCP transaction id: 112F
    Apr  4 12:10:57.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:10:57.290:    Next timer fires after: 00:00:04
    Apr  4 12:10:57.290:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:10:57.290:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:10:57.290:    Hostname: DEMO_1242AG
    Apr  4 12:10:57.290: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:10:57.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:10:57.291: DHCP: SDiscover 296 bytes
    Apr  4 12:10:57.291:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:00.291: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:11:00.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:00.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:00.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:00.291:    DHCP transaction id: 112F
    Apr  4 12:11:00.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:00.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:00.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:00.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:00.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:00.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:00.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:00.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:00.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:04.291: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:11:04.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:04.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:04.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:04.291:    DHCP transaction id: 112F
    Apr  4 12:11:04.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:04.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:04.291:    Retry count: 3   Client-ID: 0019.3076  de.cc7c
    Apr  4 12:11:04.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:04.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:04.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:04.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:04.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:04.292:             B'cast on FastEthernet0 interface from 0.0.0.0b
    ug ip udp
    UDP packet debugging is on
    DEMO_1242AG#
    Apr  4 12:11:08.291: DHCP: QScan: Timed out Selecting statedebug lwap
    DEMO_1242AG#debug lwapp cli
    DEMO_1242AG#debug lwapp client ev
    DEMO_1242AG#debug lwapp client event
    LWAPP Client EVENT display debugging is on
    DEMO_1242AG#%Unknown DHCP problem.. No allocation possible
    Apr  4 12:11:17.292: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:11:22.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:32.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:42.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:48.291: DHCP: QScan: Purging entry
    Apr  4 12:11:48.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:11:48.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:48.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:48.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:11:48.291:    DHCP transaction id: 112F
    Apr  4 12:11:48.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:48.291:    No timer running
    Apr  4 12:11:48.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:48.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:48.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:52.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:02.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:17.292: DHCP: Try 13 to acquire address for FastEthernet0
    Apr  4 12:12:17.292: DHCP: allocate request
    Apr  4 12:12:17.292: DHCP: new entry. add to queue
    Apr  4 12:12:17.292: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:12:17.292: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:17.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:17.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:17.293:    DHCP transaction id: 1130
    Apr  4 12:12:17.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:17.293:    Next timer fires after: 00:00:04
    Apr  4 12:12:17.293:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:17.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:17.293:    Hostname: DEMO_1242AG
    Apr  4 12:12:17.293: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:17.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:17.294: DHCP: SDiscover 296 bytes
    Apr  4 12:12:17.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:21.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:12:21.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:21.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:21.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:21.290:    DHCP transaction id: 1130
    Apr  4 12:12:21.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:21.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:21.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:21.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:21.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:21.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:21.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:21.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:21.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:25.290: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:12:25.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:25.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:25.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:25.290:    DHCP transaction id: 1130
    Apr  4 12:12:25.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:25.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:25.291:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:25.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:25.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:25.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:25.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:25.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:25.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:29.290: DHCP: QScan: Timed out Selecting state
    Apr  4 12:12:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:12:37.294: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:12:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:08.291: DHCP: QScan: Purging entry
    Apr  4 12:13:08.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:13:08.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:08.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:08.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:13:08.291:    DHCP transaction id: 1130
    Apr  4 12:13:08.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:08.291:    No timer running
    Apr  4 12:13:08.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:08.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:08.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:37.294: DHCP: Try 14 to acquire address for FastEthernet0
    Apr  4 12:13:37.294: DHCP: allocate request
    Apr  4 12:13:37.294: DHCP: new entry. add to queue
    Apr  4 12:13:37.294: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:13:37.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:37.295: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:37.295:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:37.295:    DHCP transaction id: 1131
    Apr  4 12:13:37.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:37.295:    Next timer fires after: 00:00:04
    Apr  4 12:13:37.295:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:37.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:37.295:    Hostname: DEMO_1242AG
    Apr  4 12:13:37.295: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:37.296: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:37.296: DHCP: SDiscover 296 bytes
    Apr  4 12:13:37.296:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:41.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:13:41.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:41.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:41.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:41.290:    DHCP transaction id: 1131
    Apr  4 12:13:41.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:41.291:    Next timer fires after: 00:00:04
    Apr  4 12:13:41.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:41.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:41.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:41.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:41.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:41.291: DHCP: SDiscover 296 bytes
    Apr  4 12:13:41.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:45.293: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:13:45.293: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:45.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:45.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:45.293:    DHCP transaction id: 1131
    Apr  4 12:13:45.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:45.293:    Next timer fires after: 00:00:04
    Apr  4 12:13:45.293:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:45.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:45.293:    Hostname: DEMO_1242AG
    Apr  4 12:13:45.294: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:45.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:45.294: DHCP: SDiscover 296 bytes
    Apr  4 12:13:45.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:49.295: DHCP: QScan: Timed out Selecting state
    Apr  4 12:13:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:13:57.296: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:14:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:28.294: DHCP: QScan: Purging entry
    Apr  4 12:14:28.294: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:14:28.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:28.294: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:28.294:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:14:28.295:    DHCP transaction id: 1131
    Apr  4 12:14:28.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:28.295:    No timer running
    Apr  4 12:14:28.295:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:28.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:28.295:    Hostname: DEMO_1242AG
    Apr  4 12:14:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:57.295: DHCP: Try 15 to acquire address for FastEthernet0
    Apr  4 12:14:57.296: DHCP: allocate request
    Apr  4 12:14:57.296: DHCP: new entry. add to queue
    Apr  4 12:14:57.296: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:14:57.296: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:57.296: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:57.296:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:14:57.296:    DHCP transaction id: 1132
    Apr  4 12:14:57.296:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:57.296:    Next timer fires after: 00:00:04
    Apr  4 12:14:57.296:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:57.297:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:57.297:    Hostname: DEMO_1242AG
    Apr  4 12:14:57.297: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:14:57.297: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:14:57.297: DHCP: SDiscover 296 bytes
    Apr  4 12:14:57.297:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:00.299: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:15:00.299: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:00.299: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:00.300:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:00.300:    DHCP transaction id: 1132
    Apr  4 12:15:00.300:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:00.300:    Next timer fires after: 00:00:04
    Apr  4 12:15:00.300:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:00.300:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:00.300:    Hostname: DEMO_1242AG
    Apr  4 12:15:00.300: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:00.301: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:00.301: DHCP: SDiscover 296 bytes
    Apr  4 12:15:00.301:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:04.301: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:15:04.301: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:04.302: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:04.302:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:04.302:    DHCP transaction id: 1132
    Apr  4 12:15:04.302:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:04.302:    Next timer fires after: 00:00:04
    Apr  4 12:15:04.302:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:04.302:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:04.302:    Hostname: DEMO_1242AG
    Apr  4 12:15:04.302: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:04.303: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:04.303: DHCP: SDiscover 296 bytes
    Apr  4 12:15:04.303:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:08.303: DHCP: QScan: Timed out Selecting state
    Apr  4 12:15:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:15:17.303: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:15:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:48.303: DHCP: QScan: Purging entry
    Apr  4 12:15:48.303: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:15:48.303: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:48.303: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:48.303:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:15:48.303:    DHCP transaction id: 1132
    Apr  4 12:15:48.303:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:48.303:    No timer running
    Apr  4 12:15:48.303:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:48.303:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:48.303:    Hostname: DEMO_1242AG
    Apr  4 12:15:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:17.303: DHCP: Try 16 to acquire address for FastEthernet0
    Apr  4 12:16:17.304: DHCP: allocate request
    Apr  4 12:16:17.304: DHCP: new entry. add to queue
    Apr  4 12:16:17.304: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:16:17.304: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:17.304: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:17.304:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:17.304:    DHCP transaction id: 1133
    Apr  4 12:16:17.304:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:17.304:    Next timer fires after: 00:00:04
    Apr  4 12:16:17.304:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:17.305:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:17.305:    Hostname: DEMO_1242AG
    Apr  4 12:16:17.305: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:17.305: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:17.305: DHCP: SDiscover 296 bytes
    Apr  4 12:16:17.305:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:20.307: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:16:20.307: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:20.307: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:20.308:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:20.308:    DHCP transaction id: 1133
    Apr  4 12:16:20.308:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:20.308:    Next timer fires after: 00:00:04
    Apr  4 12:16:20.308:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:20.308:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:20.308:    Hostname: DEMO_1242AG
    Apr  4 12:16:20.308: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:20.309: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:20.309: DHCP: SDiscover 296 bytes
    Apr  4 12:16:20.309:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:24.309: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:16:24.309: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:24.310: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:24.310:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:24.310:    DHCP transaction id: 1133
    Apr  4 12:16:24.310:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:24.310:    Next timer fires after: 00:00:04
    Apr  4 12:16:24.310:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:24.310:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:24.310:    Hostname: DEMO_1242AG
    Apr  4 12:16:24.310: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:24.311: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:24.311: DHCP: SDiscover 296 bytes
    Apr  4 12:16:24.311:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:28.311: DHCP: QScan: Timed out Selecting state
    Apr  4 12:16:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:16:37.311: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:16:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:08.311: DHCP: QScan: Purging entry
    Apr  4 12:17:08.311: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:17:08.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:08.311: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:08.311:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:17:08.312:    DHCP transaction id: 1133
    Apr  4 12:17:08.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:08.312:    No timer running
    Apr  4 12:17:08.312:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:08.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:08.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:37.311: DHCP: Try 17 to acquire address for FastEthernet0
    Apr  4 12:17:37.311: DHCP: allocate request
    Apr  4 12:17:37.311: DHCP: new entry. add to queue
    Apr  4 12:17:37.311: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:17:37.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:37.312: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:37.312:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:37.312:    DHCP transaction id: 1134
    Apr  4 12:17:37.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:37.312:    Next timer fires after: 00:00:04
    Apr  4 12:17:37.312:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:37.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:37.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:37.312: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:37.313: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:37.313: DHCP: SDiscover 296 bytes
    Apr  4 12:17:37.313:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:40.315: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:17:40.315: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:40.315: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:40.315:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:40.315:    DHCP transaction id: 1134
    Apr  4 12:17:40.315:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:40.315:    Next timer fires after: 00:00:04
    Apr  4 12:17:40.315:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:40.315:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:40.316:    Hostname: DEMO_1242AG
    Apr  4 12:17:40.316: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:40.316: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:40.316: DHCP: SDiscover 296 bytes
    Apr  4 12:17:40.316:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:44.317: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:17:44.317: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:44.317: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:44.317:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:44.317:    DHCP transaction id: 1134
    Apr  4 12:17:44.317:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:44.317:    Next timer fires after: 00:00:04
    Apr  4 12:17:44.317:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:44.318:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:44.318:    Hostname: DEMO_1242AG
    Apr  4 12:17:44.318: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:44.318: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:44.318: DHCP: SDiscover 296 bytes
    Apr  4 12:17:44.318:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:48.319: DHCP: QScan: Timed out Selecting state
    Apr  4 12:17:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:17:57.319: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:18:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:18:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#debug dhc
    DEMO_1242AG#debug dhcp detai
    DEMO_1242AG#debug dhcp detail
    DHCP client activity debugging is on (detailed)
    DEMO_1242AG#
    Apr  4 12:10:57.289: DHCP: Try 12 to acquire address for FastEthernet0
    Apr  4 12:10:57.289: DHCP: allocate request
    Apr  4 12:10:57.289: DHCP: new entry. add to queue
    Apr  4 12:10:57.289: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:10:57.289: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:10:57.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:10:57.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:10:57.290:    DHCP transaction id: 112F
    Apr  4 12:10:57.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:10:57.290:    Next timer fires after: 00:00:04
    Apr  4 12:10:57.290:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:10:57.290:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:10:57.290:    Hostname: DEMO_1242AG
    Apr  4 12:10:57.290: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:10:57.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:10:57.291: DHCP: SDiscover 296 bytes
    Apr  4 12:10:57.291:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:00.291: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:11:00.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:00.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:00.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:00.291:    DHCP transaction id: 112F
    Apr  4 12:11:00.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:00.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:00.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:00.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:00.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:00.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:00.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:00.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:00.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:11:04.291: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:11:04.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:04.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:04.291:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:11:04.291:    DHCP transaction id: 112F
    Apr  4 12:11:04.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:04.291:    Next timer fires after: 00:00:04
    Apr  4 12:11:04.291:    Retry count: 3   Client-ID: 0019.3076  de.cc7c
    Apr  4 12:11:04.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:04.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:04.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:11:04.292: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:11:04.292: DHCP: SDiscover 296 bytes
    Apr  4 12:11:04.292:             B'cast on FastEthernet0 interface from 0.0.0.0b
    ug ip udp
    UDP packet debugging is on
    DEMO_1242AG#
    Apr  4 12:11:08.291: DHCP: QScan: Timed out Selecting statedebug lwap
    DEMO_1242AG#debug lwapp cli
    DEMO_1242AG#debug lwapp client ev
    DEMO_1242AG#debug lwapp client event
    LWAPP Client EVENT display debugging is on
    DEMO_1242AG#%Unknown DHCP problem.. No allocation possible
    Apr  4 12:11:17.292: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:11:22.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:32.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:42.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:11:48.291: DHCP: QScan: Purging entry
    Apr  4 12:11:48.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:11:48.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:11:48.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:11:48.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:11:48.291:    DHCP transaction id: 112F
    Apr  4 12:11:48.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:11:48.291:    No timer running
    Apr  4 12:11:48.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:11:48.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:11:48.291:    Hostname: DEMO_1242AG
    Apr  4 12:11:52.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:02.680: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    DEMO_1242AG#
    Apr  4 12:12:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:17.292: DHCP: Try 13 to acquire address for FastEthernet0
    Apr  4 12:12:17.292: DHCP: allocate request
    Apr  4 12:12:17.292: DHCP: new entry. add to queue
    Apr  4 12:12:17.292: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:12:17.292: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:17.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:17.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:17.293:    DHCP transaction id: 1130
    Apr  4 12:12:17.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:17.293:    Next timer fires after: 00:00:04
    Apr  4 12:12:17.293:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:17.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:17.293:    Hostname: DEMO_1242AG
    Apr  4 12:12:17.293: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:17.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:17.294: DHCP: SDiscover 296 bytes
    Apr  4 12:12:17.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:21.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:12:21.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:21.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:21.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:21.290:    DHCP transaction id: 1130
    Apr  4 12:12:21.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:21.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:21.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:21.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:21.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:21.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:21.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:21.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:21.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:25.290: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:12:25.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:12:25.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:12:25.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:12:25.290:    DHCP transaction id: 1130
    Apr  4 12:12:25.290:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:12:25.291:    Next timer fires after: 00:00:04
    Apr  4 12:12:25.291:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:12:25.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:12:25.291:    Hostname: DEMO_1242AG
    Apr  4 12:12:25.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:12:25.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:12:25.291: DHCP: SDiscover 296 bytes
    Apr  4 12:12:25.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:12:29.290: DHCP: QScan: Timed out Selecting state
    Apr  4 12:12:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:12:37.294: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:12:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:12:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:08.291: DHCP: QScan: Purging entry
    Apr  4 12:13:08.291: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:13:08.291: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:08.291: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:08.291:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:13:08.291:    DHCP transaction id: 1130
    Apr  4 12:13:08.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:08.291:    No timer running
    Apr  4 12:13:08.291:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:08.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:08.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:37.294: DHCP: Try 14 to acquire address for FastEthernet0
    Apr  4 12:13:37.294: DHCP: allocate request
    Apr  4 12:13:37.294: DHCP: new entry. add to queue
    Apr  4 12:13:37.294: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:13:37.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:37.295: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:37.295:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:37.295:    DHCP transaction id: 1131
    Apr  4 12:13:37.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:37.295:    Next timer fires after: 00:00:04
    Apr  4 12:13:37.295:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:37.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:37.295:    Hostname: DEMO_1242AG
    Apr  4 12:13:37.295: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:37.296: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:37.296: DHCP: SDiscover 296 bytes
    Apr  4 12:13:37.296:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:41.290: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:13:41.290: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:41.290: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:41.290:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:41.290:    DHCP transaction id: 1131
    Apr  4 12:13:41.291:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:41.291:    Next timer fires after: 00:00:04
    Apr  4 12:13:41.291:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:41.291:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:41.291:    Hostname: DEMO_1242AG
    Apr  4 12:13:41.291: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:41.291: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:41.291: DHCP: SDiscover 296 bytes
    Apr  4 12:13:41.292:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:13:45.293: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:13:45.293: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:13:45.293: Temp  sub net mask: 0.0.0.0
    Apr  4 12:13:45.293:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:13:45.293:    DHCP transaction id: 1131
    Apr  4 12:13:45.293:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:13:45.293:    Next timer fires after: 00:00:04
    Apr  4 12:13:45.293:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:13:45.293:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:13:45.293:    Hostname: DEMO_1242AG
    Apr  4 12:13:45.294: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:13:45.294: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:13:45.294: DHCP: SDiscover 296 bytes
    Apr  4 12:13:45.294:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:13:49.295: DHCP: QScan: Timed out Selecting state
    Apr  4 12:13:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:13:57.296: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:14:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:28.294: DHCP: QScan: Purging entry
    Apr  4 12:14:28.294: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:14:28.294: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:28.294: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:28.294:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:14:28.295:    DHCP transaction id: 1131
    Apr  4 12:14:28.295:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:28.295:    No timer running
    Apr  4 12:14:28.295:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:28.295:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:28.295:    Hostname: DEMO_1242AG
    Apr  4 12:14:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:14:57.295: DHCP: Try 15 to acquire address for FastEthernet0
    Apr  4 12:14:57.296: DHCP: allocate request
    Apr  4 12:14:57.296: DHCP: new entry. add to queue
    Apr  4 12:14:57.296: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:14:57.296: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:14:57.296: Temp  sub net mask: 0.0.0.0
    Apr  4 12:14:57.296:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:14:57.296:    DHCP transaction id: 1132
    Apr  4 12:14:57.296:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:14:57.296:    Next timer fires after: 00:00:04
    Apr  4 12:14:57.296:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:14:57.297:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:14:57.297:    Hostname: DEMO_1242AG
    Apr  4 12:14:57.297: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:14:57.297: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:14:57.297: DHCP: SDiscover 296 bytes
    Apr  4 12:14:57.297:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:00.299: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:15:00.299: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:00.299: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:00.300:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:00.300:    DHCP transaction id: 1132
    Apr  4 12:15:00.300:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:00.300:    Next timer fires after: 00:00:04
    Apr  4 12:15:00.300:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:00.300:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:00.300:    Hostname: DEMO_1242AG
    Apr  4 12:15:00.300: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:00.301: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:00.301: DHCP: SDiscover 296 bytes
    Apr  4 12:15:00.301:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:04.301: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:15:04.301: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:04.302: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:04.302:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:15:04.302:    DHCP transaction id: 1132
    Apr  4 12:15:04.302:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:04.302:    Next timer fires after: 00:00:04
    Apr  4 12:15:04.302:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:04.302:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:04.302:    Hostname: DEMO_1242AG
    Apr  4 12:15:04.302: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:15:04.303: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:15:04.303: DHCP: SDiscover 296 bytes
    Apr  4 12:15:04.303:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:15:08.303: DHCP: QScan: Timed out Selecting state
    Apr  4 12:15:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:15:17.303: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:15:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:15:48.303: DHCP: QScan: Purging entry
    Apr  4 12:15:48.303: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:15:48.303: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:15:48.303: Temp  sub net mask: 0.0.0.0
    Apr  4 12:15:48.303:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:15:48.303:    DHCP transaction id: 1132
    Apr  4 12:15:48.303:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:15:48.303:    No timer running
    Apr  4 12:15:48.303:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:15:48.303:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:15:48.303:    Hostname: DEMO_1242AG
    Apr  4 12:15:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:17.303: DHCP: Try 16 to acquire address for FastEthernet0
    Apr  4 12:16:17.304: DHCP: allocate request
    Apr  4 12:16:17.304: DHCP: new entry. add to queue
    Apr  4 12:16:17.304: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:16:17.304: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:17.304: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:17.304:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:17.304:    DHCP transaction id: 1133
    Apr  4 12:16:17.304:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:17.304:    Next timer fires after: 00:00:04
    Apr  4 12:16:17.304:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:17.305:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:17.305:    Hostname: DEMO_1242AG
    Apr  4 12:16:17.305: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:17.305: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:17.305: DHCP: SDiscover 296 bytes
    Apr  4 12:16:17.305:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:20.307: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:16:20.307: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:20.307: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:20.308:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:20.308:    DHCP transaction id: 1133
    Apr  4 12:16:20.308:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:20.308:    Next timer fires after: 00:00:04
    Apr  4 12:16:20.308:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:20.308:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:20.308:    Hostname: DEMO_1242AG
    Apr  4 12:16:20.308: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:20.309: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:20.309: DHCP: SDiscover 296 bytes
    Apr  4 12:16:20.309:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:24.309: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:16:24.309: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:16:24.310: Temp  sub net mask: 0.0.0.0
    Apr  4 12:16:24.310:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:16:24.310:    DHCP transaction id: 1133
    Apr  4 12:16:24.310:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:16:24.310:    Next timer fires after: 00:00:04
    Apr  4 12:16:24.310:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:16:24.310:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:16:24.310:    Hostname: DEMO_1242AG
    Apr  4 12:16:24.310: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:16:24.311: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:16:24.311: DHCP: SDiscover 296 bytes
    Apr  4 12:16:24.311:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:16:28.311: DHCP: QScan: Timed out Selecting state
    Apr  4 12:16:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:16:37.311: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:16:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:16:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:08.311: DHCP: QScan: Purging entry
    Apr  4 12:17:08.311: DHCP: deleting entry 7B3098 0.0.0.0 from list
    Apr  4 12:17:08.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:08.311: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:08.311:    DHCP Lease server: 0.0.0.0, state: 8 Purging
    Apr  4 12:17:08.312:    DHCP transaction id: 1133
    Apr  4 12:17:08.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:08.312:    No timer running
    Apr  4 12:17:08.312:    Retry count: 0   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:08.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:08.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:22.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:32.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:37.311: DHCP: Try 17 to acquire address for FastEthernet0
    Apr  4 12:17:37.311: DHCP: allocate request
    Apr  4 12:17:37.311: DHCP: new entry. add to queue
    Apr  4 12:17:37.311: DHCP: SDiscover attempt # 1 for entry:
    Apr  4 12:17:37.311: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:37.312: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:37.312:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:37.312:    DHCP transaction id: 1134
    Apr  4 12:17:37.312:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:37.312:    Next timer fires after: 00:00:04
    Apr  4 12:17:37.312:    Retry count: 1   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:37.312:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:37.312:    Hostname: DEMO_1242AG
    Apr  4 12:17:37.312: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:37.313: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:37.313: DHCP: SDiscover 296 bytes
    Apr  4 12:17:37.313:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:40.315: DHCP: SDiscover attempt # 2 for entry:
    Apr  4 12:17:40.315: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:40.315: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:40.315:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:40.315:    DHCP transaction id: 1134
    Apr  4 12:17:40.315:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:40.315:    Next timer fires after: 00:00:04
    Apr  4 12:17:40.315:    Retry count: 2   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:40.315:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:40.316:    Hostname: DEMO_1242AG
    Apr  4 12:17:40.316: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:40.316: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:40.316: DHCP: SDiscover 296 bytes
    Apr  4 12:17:40.316:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:42.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:17:44.317: DHCP: SDiscover attempt # 3 for entry:
    Apr  4 12:17:44.317: Temp IP addr: 0.0.0.0  for peer on Interface: FastEthernet0
    Apr  4 12:17:44.317: Temp  sub net mask: 0.0.0.0
    Apr  4 12:17:44.317:    DHCP Lease server: 0.0.0.0, state: 1 Selecting
    Apr  4 12:17:44.317:    DHCP transaction id: 1134
    Apr  4 12:17:44.317:    Lease: 0 secs,  Renewal: 0 secs,  Rebind: 0 secs
    Apr  4 12:17:44.317:    Next timer fires after: 00:00:04
    Apr  4 12:17:44.317:    Retry count: 3   Client-ID: 0019.3076.cc7c
    Apr  4 12:17:44.318:    Client-ID hex dump: 00193076CC7C
    Apr  4 12:17:44.318:    Hostname: DEMO_1242AG
    Apr  4 12:17:44.318: DHCP: SDiscover placed class-id option: 436973636F204150206
    331323430
    Apr  4 12:17:44.318: DHCP: SDiscover: sending 296 byte length DHCP packet
    Apr  4 12:17:44.318: DHCP: SDiscover 296 bytes
    Apr  4 12:17:44.318:             B'cast on FastEthernet0 interface from 0.0.0.0
    Apr  4 12:17:48.319: DHCP: QScan: Timed out Selecting state
    Apr  4 12:17:52.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    %Unknown DHCP problem.. No allocation possible
    Apr  4 12:17:57.319: DHCP: Waiting for 60 seconds on interface FastEthernet0
    Apr  4 12:18:02.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    Apr  4 12:18:12.679: LWAPP_CLIENT_EVENT: spamHandleDiscoveryTimer: Could not dis
    cover any MWAR
    THIS IS FROM THER CONTROLLER  BELOW THAT IS.
    =============================================
    (Cisco Controller) >config se?
    serial         service        sessions
    (Cisco Controller) >config sessions timeout 120
    (Cisco Controller) >config se?
    serial         service        sessions
    (Cisco Controller) >config serial timeout 120
    (Cisco Controller) >debug mac addr 00:19:30:76:cc:7c
    (Cisco Controller) >debug client ?
         MAC address
    (Cisco Controller) >debug client 00:19:30:76:cc:7c
    (Cisco Controller) >debug lwapp events enable
    (Cisco Controller) >debug lwapp errors enable
    (Cisco Controller) >debug pm ?
    all            Used to disable all debug in policy manager module
    init           Configures debug of policy manager initialization events
    config         Configures debug of policy manager configuration
    rules          Configures debug of layer 3 policy events
    message        Configures debug of policy manager message queue events
    pki            Configures debug of PKI-related events
    sa-export      Configures debug of SA export (mobility)
    sa-import      Configures debug of SA import (mobility)
    hwcrypto       Configures debug of hardware offload events
    rng            Configures debug of random number generation
    ssh-pmgr       Configures debug of the policy manager policy mgr
    ssh-engine     Configures debug of the policy manager engine
    ssh-int        Configures debug of the policy manager interceptor
    ssh-appgw      Configures debug of application gateways
    ssh-tcp        Configures debug of policy manager tcp handling
    ssh-l2tp       Configures debug of policy manager l2tp handling
    ssh-ppp        Configures debug of policy manager ppp handling
    list           Configures debug of policy manager list mgmt
    ikemsg         Configures debug of IKE messages
    (Cisco Controller) >debug pm pki enable
    (Cisco Controller) >Mon Apr  4 12:14:58 2011: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000
    Mon Apr  4 12:14:58 2011: sshpmExtKeyCallback: called with Event 5, Keypath software://0/, Flags 00000000

  • After joining the iCloud,how can I download music to store on my iPhone for use when wi-fi not available?

    After joining Icloud,how can I download music to store on my iphone from my library to use when Wi-Fi not available?

    Welcome to the Apple Community.
    What exactly is it you want to do.
    Are you talking about iCloud, iTunes in the cloud or iTunes Match.

  • OIap AW are Invalid after applying the Oracle patch 9.2.0.6

    Hi
    We have applied Oracle patch 9.2.0.6. after applied the patch we are not able to connect with AW might be all AW are invalid.
    i am getting the following error :
    ava.sql.SQLException: ORA-06521: PL/SQL: Error mapping function
    ORA-06512: at "SYS.DBMS_AW", line 18
    ORA-06512: at line 1
    at oracle.olap.awm.businessobject.aw.WorkspaceBO.getWorkspacesAttachedBySchemaUsingDML(WorkspaceBO.java:623)
    at oracle.olap.awm.navigator.node.aw.SchemaNode.getChildren(SchemaNode.java:87)
    at oracle.olap.awm.navigator.node.BaseNodeModel.refreshData(BaseNodeModel.java:74)
    at oracle.olap.awm.navigator.node.BaseNodeModel.dTreeItemExpanding(BaseNodeModel.java:221)
    at oracle.bali.ewt.dTree.DTreeDeferredParent.__fireExpansionChanging(Unknown Source)
    at oracle.bali.ewt.dTree.DTreeDeferredParent.setExpanded(Unknown Source)
    at oracle.olap.awm.navigator.node.BaseNode.expandHelper(BaseNode.java:1527)
    at oracle.olap.awm.navigator.node.BaseNode.access$000(BaseNode.java:85)
    at oracle.olap.awm.navigator.node.BaseNode$ExpansionThread.run(BaseNode.java:1488)
    Any idea or thought would be appreciable.
    Thanks
    Anwar

    Please file a TAR with support to resolve this issue.
    Hope this helps,
    Keith
    Oracle Business Intelligence Product Management
    BI on Oracle: http://www.oracle.com/bi/
    BI on OTN: http://www.oracle.com/technology/products/bi/
    BI Beans http://www.oracle.com/technology/products/bib/index.html
    Discoverer: http://www.oracle.com/technology/products/discoverer/
    BI Software: http://www.oracle.com/technology/software/products/ias/devuse.html
    Documentation: http://www.oracle.com/technology/documentation/appserver1012.html
    BI Samples: http://www.oracle.com/technology/products/bi/samples/
    Blog: http://oraclebi.blogspot.com/

  • Changes in Bundle.js file are disappear after restarting the UCM

    Good Day,
    I add some javascript code in bundle.js file within the following path: domain_home\ucm\cs\weblayout\resources\bundle.js .
    the changes are reflected fine on the UCM, but once the UCM Server restated the changes are gone and the file revert back as is; without my changes.
    the code that i want to add is:
    if ((typeof Range !== 'undefined') && !Range.prototype.createContextualFragment) {
    Range.prototype.createContextualFragment = function(html) {
    var frag = document.createDocumentFragment();
    var div = document.createElement('div');
    frag.appendChild(div);
    div.outerHTML = html;
    return frag;
    i want to add it because i have a javascript error like this: Object doesn't support property or method 'createContextualFragment', this erro occured when the used version of Internet Explorer is V.9. ; no javascript errors appears on Version 8. when i add this piece of javascript to the bundle.js file, it the error is gone and everything goes fine, but as i said earlier after restarting the UCM the added javascript code is gone and disappear from the bundle.js file.
    For that reason i want to ask, is there is a way to keep my code and stay as is even after restarting? Or is the file uploaded on restart from another path?
    Any Suggestions?

    This is actually quite simple to explain:
    - domain_home\ucm\cs\weblayout\resources is a directory that holds runtime version of resources
    - if you want to make your changes persistent, you will need to do it in a source directory. In 11g there are two source directories; one for standard components, and the other for custom ones. You should use the latter
    - in fact, if you create a custom component with Component Wizard, make your changes there and activate the component, you should be done. The only another thing you should pay attention to is the loadOrder parameter of your resource - it should be higher to get applied.
    For more details, see http://docs.oracle.com/cd/E23943_01/doc.1111/e10807/part4_customize_comp.htm#sthref522

  • Repositories are invalid after restarting the MDM Server in MDM 7.1

    Hi SDNers,
    After I restarted the MDS server I am not able to logon to the repository. When I tried to connect to repository I am getting an error like "Repository Connect Failed and The MDM Repository is Invalid"
    I tired to delete but I am not able to delete also. While deleteing it is giving an error like  "MDM Repository is in Read Only Mode".
    So I am not able to Delete the repository also to create a new Repository.
    Any Help or Solution
    Thanks
    Kiran
    Edited by: Kiran on Apr 6, 2011 6:40 AM

    Kiran -
    some of the below ways you can check
    1. Check your mds.ini settings. and do unmount nad then mount the MDM server again. Try to Monitor the Authentication for Particular repositry which you want to connect to your MDM 7.1 server
    2. after checking the note 1325833. try restart database server first then MDM server.
    3. also try to check with Appropriate repository option once.
    HTH
    thx
    Deep

  • AIR-CAP1602i cannot join a WLC 5508 controller

    Hello,
    I'm managing a large number of access points on a Cisco wlc 5508 controller.
    We've recently purchased a bunch of new AIR-CAP1602I-E-K9.
    note that we already have AIR-CAP1602I-E-K9 and other models in production.
    These A.P are not able to join the controller for some reason, I've tried a lot of different things but I am now at a loss.
    I have checked the regulatory domain, upgraded the FUS, manually upgraded the software version of the LAP to match the version on the other A.P.
    I even downgraded/upgraded the WLC code (version 7.4.x and 8.0)
    I use the dhcp option 43 to to send the controller IP.
    Here are the info that can help:
    errors:
    #on A.P
    *Dec 12 09:24:49.659: %CAPWAP-3-ERRORLOG: Invalid event 10 & state 5 combination.
    *Dec 12 09:24:49.659: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 10 state 5.
    *Dec 12 09:24:49.659: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    #on WLC
    Lwapp join request rejected (WLC version 7.6.130.0)
    Failed to add database entry (WLC version 8.0)
    WLC sysinfo
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.6.130.0
    Bootloader Version............................... 1.0.20
    Field Recovery Image Version..................... 7.6.101.1
    Firmware Version................................. FPGA 1.7, Env 1.8, USB console 2.2
    Build Type....................................... DATA + WPS
    System Name...................................... XXX
    System Location..................................
    System Contact...................................
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1069
    Redundancy Mode.................................. Disabled
    IP Address....................................... XXX
    Last Reset....................................... Software reset
    System Up Time................................... 6 days 4 hrs 16 mins 27 secs
    System Timezone Location.........................
    System Stats Realtime Interval................... 5
    System Stats Normal Interval..................... 180
    Configured Country............................... Multiple Countries:CA,FR
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    Internal Temperature............................. +41 C
    External Temperature............................. +22 C
    Fan Status....................................... OK
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 7
    Number of Active Clients......................... 1977
    Burned-in MAC Address............................ A4:93:4C:B0:E4:C0
    Power Supply 1................................... Present, OK
    Power Supply 2................................... Present, OK
    Maximum number of APs supported.................. 250
    AP sh version
    AP58f3.9cb8.3701#sh version
    Cisco IOS Software, C1600 Software (AP1G2-K9W8-M), Version 15.2(4)JB6, RELEASE SOFTWARE (fc1)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2014 by Cisco Systems, Inc.
    Compiled Fri 22-Aug-14 10:56 by prod_rel_team
    ROM: Bootstrap program is C1600 boot loader
    BOOTLDR: C1600 Boot Loader (AP1G2-BOOT-M) LoaderVersion 15.2(2)JAX, RELEASE SOFTWARE (fc1)
    AP58f3.9cb8.3701 uptime is 31 minutes
    System returned to ROM by power-on
    System image file is "flash:/ap1g2-k9w8-mx.152-4.JB6/ap1g2-k9w8-mx.152-4.JB6"
    Last reload reason:
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    cisco AIR-CAP1602I-E-K9 (PowerPC) processor (revision B0) with 229366K/32768K bytes of memory.
    Processor board ID FGL1832X5QU
    PowerPC CPU at 533MHz, revision number 0x2151
    Last reset from power-on
    LWAPP image version 7.6.100.0
    1 Gigabit Ethernet interface
    2 802.11 Radios
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: 58:F3:9C:B8:37:01
    Part Number                          : 73-14671-04
    PCA Assembly Number                  : 000-00000-00
    PCA Revision Number                  :
    PCB Serial Number                    : FOC183171L4
    Top Assembly Part Number             : 800-38552-01
    Top Assembly Serial Number           : FGL1832X5QU
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-CAP1602I-E-K9
    AP sh inventory
    NAME: "AP1600", DESCR: "Cisco Aironet 1600 Series (IEEE 802.11n) Access Point"
    PID: AIR-CAP1602I-E-K9 , VID: V01, SN: FGL1832X5QU
    Thanks for your help !

    Hi Olivier,
    The error messages that you have on the debugs:
    *Dec 12 09:24:49.659: %CAPWAP-3-ERRORLOG: Invalid event 10 & state 5 combination.
    *Dec 12 09:24:49.659: %CAPWAP-3-ERRORLOG: CAPWAP SM handler: Failed to process message type 10 state 5.
    *Dec 12 09:24:49.659: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    It is related to the bug: CSCuh46442
    https://tools.cisco.com/bugsearch/bug/CSCuh46442/?referring_site=ss
    This bug is resolved in version : 8.0.100.0
    http://www.cisco.com/c/en/us/td/docs/wireless/controller/release/notes/crn80.html#pgfId-1163951
    Can you please paste here "show ap auth-list" from the controller CLI?
    I suggest to enable MIC if it is not enabled, and then check if the AP's will join or not.
    Kind Regards
    Mohammad Setan

Maybe you are looking for