Cisco2602 are unable or very hard to join 5508 wlc

This is not happened to one AP,  all AP has the same issue,  it takes long time to join and sometimes it can't join this wlc.   Here is the debug info from wlc:
*spamApTask2: Jun 25 08:15:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:26.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:26.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:36.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:36.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask3: Jun 25 08:15:39.444: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.8.53:61854
*spamApTask2: Jun 25 08:15:46.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:46.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:56.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:15:56.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:06.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:06.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:16.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 WTP already released
*spamApTask2: Jun 25 08:16:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 1. 0 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 2. 232 3
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 3. 0 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 4. 100 0
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
*spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 WTP already released

Thanks Salodh.  The issue is not fixed follow the link you provide.
Some debug error message from AP:
*Jul  2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
*Jul  2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 2.
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Attempting to join next controller
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Go Join the next controller
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
*Jul  2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
*Jul  2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
*Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.
*Jul  2 04:13:52.039: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
*Jul  2 04:13:52.059: Starting Ethernet promiscuous mode
*Jul  2 04:13:52.063: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.
*Jul  2 04:13:52.063: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.
*Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
*Jul  2 04:14:02.067: %CAPWAP-3-ERRORLOG: Selected MWAR 'pvg01-rpi-wlc1'(index 0).
*Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Selected MWAR 'pvg01-rpi-wlc1' (index 0).
*Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Ap mgr count=1
*Jul  2 04:14:02.067: %CAPWAP-3-ERRORLOG: Go join a capwap controller
*Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG:  Adding Ipv4 AP manager 10.109.118.16 to least load
*Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 10.109.118.16, load = 5..
*Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.
*Jul  2 04:15:02.000: %CAPWAP-3-EVENTLOG: Setting time to 04:15:02 UTC Jul 2 2014
*Jul  2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: version=117861888
*Jul  2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: hasMaximum Message Payload
*Jul  2 04:15:07.479: %CAPWAP-5-SENDJOIN: sending Join Request to 10.109.118.16
*Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: Join Response from 10.109.118.16
*Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: Starting Post Join timer
*Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Image Data.
*Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Configure.
*Jul  2 04:15:07.507: %CAPWAP-3-EVENTLOG: reboot reason flag 17
*Jul  2 04:15:07.551: Starting Ethernet promiscuous mode
*Jul  2 04:15:07.551: %CAPWAP-3-EVENTLOG: ap sw version 15.2(4)JB4$
*Jul  2 04:15:07.627: Flex Non AP-Specific config version mismatch. Clearing it! Current Version 7.6.110.0, stored file version 7.4.121.0
*Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
*Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Queue Empty.
*Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Configuration Status Response from 10.109.118.16
*Jul  2 04:15:07.783: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul  2 04:15:08.795: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul  2 04:15:08.803: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul  2 04:15:09.747: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
*Jul  2 04:15:09.947: %CAPWAP-3-EVENTLOG: Sending packet to AC
*Jul  2 04:15:10.143: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
*Jul  2 04:15:10.147: %CAPWAP-3-EVENTLOG: testWmmAC configuration is 0
*Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
*Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
*Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP moved to RUN state stopping post join timer
*Jul  2 04:15:10.855: %CAPWAP-3-EVENTLOG: CAPWAP parameters plumbing to forwarding plane succeeded
*Jul  2 04:15:10.855: %CAPWAP-3-EVENTLOG: Send channel power and PhyTxPowerLevel message sent to10:109:118:16

Similar Messages

  • Autonomous 1252 converted to CAPWAP will not join 5508 WLC

    WLC 5508 firmware is v6.0.188.0
    I've tried updating the autonomous 1252 via both the upgrade tool 3.4 and 'archive download-sw' from the CLI
    I've tried multiple recovery images
    c1250-rcvk9w8-tar.124-21a.JA2.tar
    c1250-rcvk9w8-tar.124-10b.JDA.tar
    After AP reboots with recovery image it joins WLC and downloads new CAPWAP image then reboots again
    AP will not rejoin WLC with updated CAPWAP firmware
    Any help with this is greatly appreciated!
    Thanks in advance and happy holidays,
    Scott
    Error Msg from 1252 console
    *Dec 18 15:52:50.691: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.100.2 peer_port: 5246
    *Dec 18 15:52:50.695: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.100.2
    *Dec 18 15:52:50.695: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message from 192.168.100.2
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap packet from 192.168.100.2
    Additional info
    WLC Debugs Enabled:
    MAC address ................................ c4:7d:4f:39:31:e2
    Debug Flags Enabled:
      aaa detail enabled.
      capwap error enabled.
      capwap critical enabled.
      capwap events enabled.
      capwap state enabled.
      dtls event enabled.
      lwapp events enabled.
      lwapp errors enabled.
      pm pki enabled.
    WLC Debug Output:
    *Dec 18 10:51:51.575: dtls_conn_hash_search: Connection not found in hash table - Table empty.
    *Dec 18 10:51:51.575: sshpmGetCID: called to evaluate <cscoDefaultIdCert>
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: called to get cert for CID 154c7072
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCID: called to evaluate <cscoDefaultIdCert>
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *Dec 18 10:51:51.575: sshpmGetSshPrivateKeyFromCID: called to get key for CID 154c7072
    *Dec 18 10:51:51.575: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<
    *Dec 18 10:51:51.576: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<
    *Dec 18 10:51:51.576: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<
    *Dec 18 10:51:51.576: sshpmGetSshPrivateKeyFromCID: match in row 2
    *Dec 18 10:51:51.692: acDtlsCallback: Certificate installed for PKI based authentication.
    *Dec 18 10:51:51.693: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=0
    *Dec 18 10:51:51.693: local_openssl_dtls_record_inspect:   msg=ClientHello len=44 seq=0 frag_off=0 frag_len=44
    *Dec 18 10:51:51.693: openssl_dtls_process_packet: Handshake in progress...
    *Dec 18 10:51:51.693: local_openssl_dtls_send: Sending 60 bytes
    *Dec 18 10:51:51.694: dtls_conn_hash_search: Searching hash for Local 192.168.100.2:5246  Peer 192.168.100.54:62227
    *Dec 18 10:51:51.694: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=1
    *Dec 18 10:51:51.694: local_openssl_dtls_record_inspect:   msg=ClientHello len=76 seq=1 frag_off=0 frag_len=76
    *Dec 18 10:51:51.695: openssl_dtls_process_packet: Handshake in progress...
    *Dec 18 10:51:51.695: local_openssl_dtls_send: Sending 544 bytes
    *Dec 18 10:51:51.695: local_openssl_dtls_send: Sending 544 bytes
    *Dec 18 10:51:51.696: local_openssl_dtls_send: Sending 314 bytes
    *Dec 18 10:51:51.712: dtls_conn_hash_search: Searching hash for Local 192.168.100.2:5246  Peer 192.168.100.54:62227
    *Dec 18 10:51:51.712: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=2
    *Dec 18 10:51:51.712: local_openssl_dtls_record_inspect:   msg=Certificate len=1146 seq=2 frag_off=0 frag_len=519
    *Dec 18 10:51:51.712: openssl_dtls_process_packet: Handshake in progress...
    *Dec 18 10:51:51.712: dtls_conn_hash_search: Searching hash for Local 192.168.100.2:5246  Peer 192.168.100.54:62227
    *Dec 18 10:51:51.712: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=3
    *Dec 18 10:51:51.712: local_openssl_dtls_record_inspect:   msg=Certificate len=1146 seq=2 frag_off=519 frag_len=519
    *Dec 18 10:51:51.713: openssl_dtls_process_packet: Handshake in progress...
    *Dec 18 10:51:51.713: dtls_conn_hash_search: Searching hash for Local 192.168.100.2:5246  Peer 192.168.100.54:62227
    *Dec 18 10:51:51.713: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=4
    *Dec 18 10:51:51.713: local_openssl_dtls_record_inspect:   msg=Certificate len=1146 seq=2 frag_off=1038 frag_len=108
    *Dec 18 10:51:51.714: sshpmGetIssuerHandles: locking ca cert table
    *Dec 18 10:51:51.714: sshpmGetIssuerHandles: calling x509_alloc() for user cert
    *Dec 18 10:51:51.714: sshpmGetIssuerHandles: calling x509_decode()
    *Dec 18 10:51:51.719: sshpmGetIssuerHandles: <subject> C=US, ST=California, L=San Jose, O=Cisco Systems, CN=C1250-c47d4f3931e2, [email protected]
    *Dec 18 10:51:51.719: sshpmGetIssuerHandles: <issuer>  O=Cisco Systems, CN=Cisco Manufacturing CA
    *Dec 18 10:51:51.719: sshpmGetIssuerHandles: Mac Address in subject is c4:7d:4f:39:31:e2
    *Dec 18 10:51:51.719: sshpmGetIssuerHandles: Cert Name in subject is C1250-c47d4f3931e2
    *Dec 18 10:51:51.719: sshpmGetIssuerHandles: Cert is issued by Cisco Systems.
    *Dec 18 10:51:51.719: sshpmGetCID: called to evaluate <cscoDefaultMfgCaCert>
    *Dec 18 10:51:51.719: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *Dec 18 10:51:51.719: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *Dec 18 10:51:51.719: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *Dec 18 10:51:51.719: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *Dec 18 10:51:51.719: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *Dec 18 10:51:51.719: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: called to get cert for CID 2ab15c0a
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<
    *Dec 18 10:51:51.719: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.719: ssphmUserCertVerify: calling x509_decode()
    *Dec 18 10:51:51.730: ssphmUserCertVerify: user cert verfied using >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.730: sshpmGetIssuerHandles: ValidityString (current): 2009/12/18/15:51:51
    *Dec 18 10:51:51.730: sshpmGetIssuerHandles: ValidityString (NotBefore): 2009/11/03/00:47:36
    *Dec 18 10:51:51.730: sshpmGetIssuerHandles: ValidityString (NotAfter): 2019/11/03/00:57:36
    *Dec 18 10:51:51.730: sshpmGetIssuerHandles: getting cisco ID cert handle...
    *Dec 18 10:51:51.730: sshpmGetCID: called to evaluate <cscoDefaultIdCert>
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<
    *Dec 18 10:51:51.730: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<
    *Dec 18 10:51:51.731: sshpmFreePublicKeyHandle: called with 0x1f1f3b8c
    *Dec 18 10:51:51.731: sshpmFreePublicKeyHandle: freeing public key
    *Dec 18 10:51:51.731: openssl_shim_cert_verify_callback: Certificate verification - passed!
    *Dec 18 10:51:51.732: openssl_dtls_process_packet: Handshake in progress...
    *Dec 18 10:51:52.155: dtls_conn_hash_search: Searching hash for Local 192.168.100.2:5246  Peer 192.168.100.54:62227
    *Dec 18 10:51:52.155: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=5
    *Dec 18 10:51:52.155: local_openssl_dtls_record_inspect:   msg=ClientKeyExchange len=258 seq=3 frag_off=0 frag_len=258
    *Dec 18 10:51:52.269: openssl_dtls_process_packet: Handshake in progress...
    *Dec 18 10:51:52.269: dtls_conn_hash_search: Searching hash for Local 192.168.100.2:5246  Peer 192.168.100.54:62227
    *Dec 18 10:51:52.269: local_openssl_dtls_record_inspect: record=Handshake epoch=0 seq=6
    *Dec 18 10:51:52.269: local_openssl_dtls_record_inspect:   msg=CertificateVerify len=258 seq=4 frag_off=0 frag_len=258
    *Dec 18 10:51:52.269: local_openssl_dtls_record_inspect: record=ChangeCipherSpec epoch=0 seq=7
    *Dec 18 10:51:52.269: local_openssl_dtls_record_inspect: record=Handshake epoch=1 seq=0
    *Dec 18 10:51:52.269: local_openssl_dtls_record_inspect:   msg=Unknown or Encrypted
    *Dec 18 10:51:52.273: openssl_dtls_process_packet: Connection established!
    *Dec 18 10:51:52.273: acDtlsCallback: DTLS Connection 0x167c5c00 established
    *Dec 18 10:51:52.273: openssl_dtls_mtu_update: Setting DTLS MTU for link to peer 192.168.100.54:62227
    *Dec 18 10:51:52.273: local_openssl_dtls_send: Sending 91 bytes
    *Dec 18 10:53:06.183: sshpmLscTask: LSC Task received a message 4
    Aironet 1252 Console Debug:
    *Dec 16 11:07:12.055: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 18 15:51:40.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.100.2 peer_port: 5246
    *Dec 18 15:51:40.999: %CAPWAP-5-CHANGED: CAPWAP changed state to 
    *Dec 18 15:51:41.695: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.100.2 peer_port: 5246
    *Dec 18 15:51:41.699: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.100.2
    *Dec 18 15:51:41.699: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Dec 18 15:51:41.699: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message from 192.168.100.2
    *Dec 18 15:51:41.699: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Dec 18 15:51:41.699: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    *Dec 18 15:51:41.699: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap packet from 192.168.100.2
    *Dec 18 15:51:46.695: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.100.2
    *Dec 18 15:51:46.695: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message from 192.168.100.2
    *Dec 18 15:51:46.695: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Dec 18 15:51:46.695: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    *Dec 18 15:51:46.695: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap packet from 192.168.100.2
    *Dec 18 15:52:39.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 192.168.100.2:5246
    *Dec 18 15:52:40.039: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Dec 18 15:52:40.039: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Dec 18 15:52:40.051: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
    *Dec 18 15:52:40.051: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
    *Dec 18 15:52:40.059: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Dec 18 15:52:40.063: %LINK-3-UPDOWN: Interface Dot11Radio1, changed state to up
    *Dec 18 15:52:40.079: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    *Dec 18 15:52:40.079: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
    *Dec 18 15:52:50.059: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Dec 18 15:52:50.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.100.2 peer_port: 5246
    *Dec 18 15:52:50.000: %CAPWAP-5-CHANGED: CAPWAP changed state to 
    *Dec 18 15:52:50.691: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.100.2 peer_port: 5246
    *Dec 18 15:52:50.695: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.100.2
    *Dec 18 15:52:50.695: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message from 192.168.100.2
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    *Dec 18 15:52:50.695: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap packet from 192.168.100.2
    *Dec 18 15:52:55.691: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.100.2
    *Dec 18 15:52:55.691: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message from 192.168.100.2
    *Dec 18 15:52:55.691: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Dec 18 15:52:55.691: %CAPWAP-3-ERRORLOG: Failed to handle capwap control message from controller
    *Dec 18 15:52:55.691: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap packet from 192.168.1

    Nathan and Leo are alluding to CSCte01087. Basically the caveat is that DTLS fails on a non-00:xx:xx:xx:xx:xx L2 first hop. e.g. if the APs are on the same VLAN as the management interface, they must have 00 MACs; if they are on a different VLAN, the WLC/AP gateway must have a 00 MAC. If the workaround below does not suit your environment, open a TAC case for an image with the fix.
      Symptom:
    An access point running 6.0.188.0 code may be unable to join a WLC5508.
    Messages similar to the following will be seen on the AP.
       %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
       %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
    Conditions:
    At least one of the following conditions pertains:
    - The high order byte of the AP's MAC address is nonzero, and the AP is in
    the same subnet as the WLC5508's management (or AP manager) interface
    - The WLC's management (or AP manager) interface's default gateway's
    MAC address' high order byte is nonzero.
    Workaround:
    If the MAC address of the WLC's default gateway does not begin with 00,
    and if all of the APs' MAC addresses begin with 00, then: you can put
    the APs into the same subnet as the WLC's management (or AP manager)
    interface.
    In the general case, for the situation where the WLC's default gateway's
    MAC does not begin with 00, you can address this by changing it to begin
    with 00. Some methods for doing this include:
    -- use the "mac-address" command on the gateway, to set a MAC address
    that begins with 00
    -- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
    IP as the WLC's gateway.
    For the case where the APs' MAC addresses do not begin with 00, then make
    sure that they are *not* in the same subnet as the WLC's management
    (AP manager) interface, but are behind a router.
    Another workaround is to downgrade to 6.0.182.0.  However, after
    downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
    (i.e. 12.4(21a)JA2) still installed on them will be unable to join.
    Therefore, after downgrading the WLC, the APs will need to have a
    pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.

  • AP unable to download the image from 5508 WLC

    Hi,
    I have a 5508 WLC connected to 2950 Switch and the LAP 1262 connected to the same default VLAN. My AP's are able to join the controller since they are in the same broadcast domain but They are NOT able to download the image from WLC. When I am looking at the wireless TAB of WLC.. it says... Downloading Image.
    Can anyone pls. suggest what all needs to be done to make UP the APs. Also, Following is the error i am seeing at the AP.
    *Apr 27 11:48:40.640: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.99:5246
    *Apr 27 11:48:40.640: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:48:40.640: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:48:40.694: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 27 11:48:40.700: capwap_image_proc: problem extracting tar file
    *Apr 27 11:48:40.700: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is not established.
    *Apr 27 11:48:51.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:48:51.000: %CAPWAP-5-CHANGED: CAPWAP changed state to 
    *Apr 27 11:48:51.569: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:48:51.569: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
    *Apr 27 11:48:51.569: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    examining image...
    *Apr 27 11:48:56.571: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99perform archive download capwap:/ap3g1 tar file
    *Apr 27 11:48:56.583: %CAPWAP-5-AP_IMG_DWNLD: Required image not found on AP. Downloading image from Controller.
    *Apr 27 11:48:56.589: %CAPWAP-5-CHANGED: CAPWAP changed state to IMAGE
    *Apr 27 11:48:56.589: Loading file /ap3g1...
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    %Error opening flash:/update/info (No such file or directory)
    ERROR: Image is not a valid IOS image archive.
    archive download: takes 48 seconds
    *Apr 27 11:49:44.640: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.99:5246
    *Apr 27 11:49:44.640: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:49:44.640: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:49:44.694: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 27 11:49:44.700: capwap_image_proc: problem extracting tar file
    *Apr 27 11:49:44.700: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is not established.
    *Apr 27 11:49:54.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:49:54.000: %CAPWAP-5-CHANGED: CAPWAP changed state to 
    *Apr 27 11:49:54.569: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:49:54.572: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
    *Apr 27 11:49:54.572: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    examining image...
    *Apr 27 11:49:59.571: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99perform archive download capwap:/ap3g1 tar file
    *Apr 27 11:49:59.583: %CAPWAP-5-AP_IMG_DWNLD: Required image not found on AP. Downloading image from Controller.
    *Apr 27 11:49:59.589: %CAPWAP-5-CHANGED: CAPWAP changed state to IMAGE
    *Apr 27 11:49:59.589: Loading file /ap3g1...
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    %Error opening flash:/update/info (No such file or directory)
    ERROR: Image is not a valid IOS image archive.
    archive download: takes 48 seconds
    *Apr 27 11:50:47.644: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.99:5246
    *Apr 27 11:50:47.644: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:50:47.644: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:50:47.697: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 27 11:50:47.697: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is not established.
    *Apr 27 11:50:47.703: capwap_image_proc: problem extracting tar file
    *Apr 27 11:50:57.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:50:57.000: %CAPWAP-5-CHANGED: CAPWAP changed state to 
    *Apr 27 11:50:57.569: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:50:57.569: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
    *Apr 27 11:50:57.569: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    examining image...
    *Apr 27 11:51:02.571: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99perform archive download capwap:/ap3g1 tar file
    *Apr 27 11:51:02.583: %CAPWAP-5-AP_IMG_DWNLD: Required image not found on AP. Downloading image from Controller.
    *Apr 27 11:51:02.589: %CAPWAP-5-CHANGED: CAPWAP changed state to IMAGE
    *Apr 27 11:51:02.589: Loading file /ap3g1...
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    %Error opening flash:/update/info (No such file or directory)
    ERROR: Image is not a valid IOS image archive.
    archive download: takes 48 seconds
    *Apr 27 11:51:50.640: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.99:5246
    *Apr 27 11:51:50.640: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:51:50.640: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 27 11:51:50.694: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 27 11:51:50.700: capwap_image_proc: problem extracting tar file
    *Apr 27 11:51:50.700: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is not established.
    *Apr 27 11:52:00.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:52:00.000: %CAPWAP-5-CHANGED: CAPWAP changed state to 
    *Apr 27 11:52:00.569: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.99 peer_port: 5246
    *Apr 27 11:52:00.569: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99
    *Apr 27 11:52:00.569: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    examining image...
    *Apr 27 11:52:05.571: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.99perform archive download capwap:/ap3g1 tar file
    *Apr 27 11:52:05.583: %CAPWAP-5-AP_IMG_DWNLD: Required image not found on AP. Downloading image from Controller.
    *Apr 27 11:52:05.589: %CAPWAP-5-CHANGED: CAPWAP changed state to IMAGE
    *Apr 27 11:52:05.589: Loading file /ap3g1...
    logging facility kern

    hi amjad,i am working on the same controller and i upload the image to another AP and cponvert it to LAP. bot this is not registering on controller and behaves like first as first ap is registered and working fine. 2nd ap console output is given below
    %Error opening flash:/update/info (No such file or directory)
    ERROR: Image is not a valid IOS image archive.
    archive download: takes 48 seconds
    *Apr 29 10:16:29.644: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192
    .168.1.59:5246
    *Apr 29 10:16:29.644: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 29 10:16:29.647: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 29 10:16:29.707: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 29 10:16:29.713: capwap_image_proc: problem extracting tar file
    *Apr 29 10:16:29.713: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    *Apr 29 10:16:40.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 192.168.1.59 peer_port: 5246
    *Apr 29 10:16:40.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Apr 29 10:16:40.569: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 192.168.1.59 peer_port: 5246
    *Apr 29 10:16:40.569: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.59
    *Apr 29 10:16:40.569: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    examining image...
    *Apr 29 10:16:45.571: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.59pe
    rform archive download capwap:/ap3g1 tar file
    *Apr 29 10:16:45.583: %CAPWAP-5-AP_IMG_DWNLD: Required image not found on AP. Do
    wnloading image from Controller.
    *Apr 29 10:16:45.589: %CAPWAP-5-CHANGED: CAPWAP changed state to IMAGE
    *Apr 29 10:16:45.589: Loading file /ap3g1...
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    %Error opening flash:/update/info (No such file or directory)
    ERROR: Image is not a valid IOS image archive.
    archive download: takes 48 seconds
    *Apr 29 10:17:33.647: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192
    .168.1.59:5246
    *Apr 29 10:17:33.647: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 29 10:17:33.650: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 29 10:17:33.710: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 29 10:17:33.716: capwap_image_proc: problem extracting tar file
    *Apr 29 10:17:33.716: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    *Apr 29 10:17:43.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 192.168.1.59 peer_port: 5246
    *Apr 29 10:17:43.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Apr 29 10:17:43.569: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 192.168.1.59 peer_port: 5246
    *Apr 29 10:17:43.569: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.59
    *Apr 29 10:17:43.569: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    examining image...
    *Apr 29 10:17:48.571: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.59pe
    rform archive download capwap:/ap3g1 tar file
    *Apr 29 10:17:48.583: %CAPWAP-5-AP_IMG_DWNLD: Required image not found on AP. Do
    wnloading image from Controller.
    *Apr 29 10:17:48.589: %CAPWAP-5-CHANGED: CAPWAP changed state to IMAGE
    *Apr 29 10:17:48.589: Loading file /ap3g1...
    logging facility kern
            ^
    % Invalid input detected at '^' marker.
    %Error opening flash:/update/info (No such file or directory)
    ERROR: Image is not a valid IOS image archive.
    archive download: takes 48 seconds
    *Apr 29 10:18:36.647: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192
    .168.1.59:5246
    *Apr 29 10:18:36.650: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 29 10:18:36.650: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Apr 29 10:18:36.710: %CAPWAP-3-ERRORLOG: capwap ifs:  read error or timeout
    *Apr 29 10:18:36.716: capwap_image_proc: problem extracting tar file
    *Apr 29 10:18:36.716: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    *Apr 29 10:18:46.000: %CAPWAP-5-DTLSRE
    pls help

  • Cisco 2702I WAPs won't join 5508 WLC

    I haven't been able to get a few WAPs to join my existing WLC and network.  They don't seem to be pulling any IP address or talking to DHCP, but everything has been already configured and the same as the other buildings that I have deployed these WAPS on.  any thoughts?
    Here is the Show Running-Config and Show ip interface brief commands output.
    =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2015.04.20 13:39:23 =~=~=~=~=~=~=~=~=~=~=~=
    show ip interface briefrunning-config    
    Building configuration...
    Current configuration : 17458 bytes
    ! Last configuration change at 00:00:33 UTC Mon Mar 1 1993
    version 15.2
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname APf07f.0692.ff0c
    logging rate-limit console 9
    enable secret 5 $1$3GAl$UQHPfp.Ab7Ry0HSsQJTRn/
    aaa new-model
    aaa authentication login default local
     --More--        !
    aaa session-id common
    ip cef
    power inline negotiation prestandard source
    crypto pki trustpoint airespace-old-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint airespace-new-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint airespace-device-root-cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint cisco-root-cert
     --More--         revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki trustpoint Cisco_IOS_MIC_cert
     revocation-check none
     rsakeypair Cisco_IOS_MIC_Keys
    crypto pki certificate chain airespace-old-root-cert
     certificate ca 00
      30820406 3082032F A0030201 02020100 300D0609 2A864886 F70D0101 04050030 
      818F310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 0355040A 
      130D6169 72657370 61636520 496E6331 0D300B06 0355040B 13046E6F 6E65310B 
      30090603 55040313 02636131 24302206 092A8648 86F70D01 09011615 73757070 
      6F727440 61697265 73706163 652E636F 6D301E17 0D303330 32313232 33333835 
      355A170D 31323131 31313233 33383535 5A30818F 310B3009 06035504 06130255 
      53311330 11060355 0408130A 43616C69 666F726E 69613111 300F0603 55040713 
      0853616E 204A6F73 65311630 14060355 040A130D 61697265 73706163 6520496E 
      63310D30 0B060355 040B1304 6E6F6E65 310B3009 06035504 03130263 61312430 
      2206092A 864886F7 0D010901 16157375 70706F72 74406169 72657370 6163652E 
      636F6D30 81DF300D 06092A86 4886F70D 01010105 000381CD 003081C9 0281C100 
      DB9D3901 30059DD1 05CB2793 9B9907F8 1FF57FA9 24065BF7 1A5865F8 B9CFCCB3 
     --More--          679354D4 69BAB847 1CA327AE EA006AAC 90479C9D C23B67DE FACC0D28 32C6103F 
      A59C41E2 E8B4250B 4D2903EB 52629A99 D618B747 C4A94151 1AB995BB 14905404 
      5F4A0B9F F387F346 D5F3A249 2AED1B6A 3DD639D8 4924366A 1234DD2D B13CD489 
      7E2EA101 63BCCC82 2F7A6D0B 33AB5705 3C784A6D A3DD1E5B 96CF54C6 CF4D59BC 
      1BFD6CB6 E72FCB29 88DCBE6D 4D76FB83 1FAF5683 E4E20822 00A9EB2E 3BEF0DF9 
      02030100 01A381EF 3081EC30 1D060355 1D0E0416 04149457 DF7D1482 2D31BB28 
      772E8996 1886DA46 84BA3081 BC060355 1D230481 B43081B1 80149457 DF7D1482 
      2D31BB28 772E8996 1886DA46 84BAA181 95A48192 30818F31 0B300906 03550406 
      13025553 31133011 06035504 08130A43 616C6966 6F726E69 61311130 0F060355 
      04071308 53616E20 4A6F7365 31163014 06035504 0A130D61 69726573 70616365 
      20496E63 310D300B 06035504 0B13046E 6F6E6531 0B300906 03550403 13026361 
      31243022 06092A86 4886F70D 01090116 15737570 706F7274 40616972 65737061 
      63652E63 6F6D8201 00300C06 03551D13 04053003 0101FF30 0D06092A 864886F7 
      0D010104 05000381 C100AEB0 349DC0F9 2AAA3A57 75B3A79C 5421A9D0 15389261 
      95C03479 04DA81D4 120F58FA E2299223 BEB54A90 6D70F7F7 2192EFAF A4B0F488 
      604E3094 BBCC77A3 60A88129 0849B87B 5CA1AA17 21922A55 6B68E0D3 1ADC7264 
      C4C4D6B2 33345C86 254E4988 096645CD 40F12761 8BC37E71 DAD91677 25322361 
      71D87A16 F92AF7C1 51CB8892 443BC666 59BEA47B 985E8866 68A1EBD4 88BBF6E7 
      A949FDF8 7711D518 A80E203D A12BEBDC 6963EDA7 B76079A3 22380C96 0CB8D324 
      CADD949D EA39E0EF 033D
      quit
    crypto pki certificate chain airespace-new-root-cert
     certificate ca 00
     --More--          3082045A 30820383 A0030201 02020100 300D0609 2A864886 F70D0101 04050030 
      81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A 
      130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E 
      65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420 
      43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573 
      70616365 2E636F6D 301E170D 30333037 33313133 34313232 5A170D31 33303432 
      39313334 3132325A 3081A631 0B300906 03550406 13025553 31133011 06035504 
      08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 
      31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 
      040B130B 456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 
      61636520 526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 
      6F727440 61697265 73706163 652E636F 6D3081DF 300D0609 2A864886 F70D0101 
      01050003 81CD0030 81C90281 C100CCA0 F92330BD 49E947A4 3FA2ACF3 A4827F66 
      77BB66F4 6B1636BA 84EF0966 9CCAE0EA CA6F1D0F BA90FEFA 58B8502C 10FC78DC 
      C9D126D8 8F2AD059 A8A69BFE 90324BD6 4553CED9 131B99B0 282A73D9 8655EFAF 
      5EA54096 22E54B9F C4258988 78F1A51F F47B16F2 0C0A37A3 52603A5A B0DC4533 
      B0C0B7C8 02DF25F0 585DFF5F 43FDAE1F 48A34BDF F80AC27E 30BE931B D3490ADE 
      C81FF6F9 974F1408 55C8813F D334F1B8 A1892B0A 10D98A44 7DBF213E 64520D20 
      E78E9
    Not in Bound state.322 DA11CA7A 46ACEB41 46AB0203 010001A3 82011430 82011030 1D060355 
      1D0E0416 0414538D 8360478D C20F8066 3232E9E1 7070552B 17EA3081 D3060355 
     --More--          1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181 
      ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43 
      616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015 
      06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B 
      456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520 
      526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440 
      61697265 73706163 652E636F 6D820100 300C0603 551D1304 05300301 01FF300B 
      0603551D 0F040403 02010630 0D06092A 864886F7 0D010104 05000381 C10006E3 
      653D4B19 FAA0C3B9 8EAE23C5 A3305E42 4522A961 BE1B5B88 56ED2E5A E42F7AC0 
      26AA2805 9824080D 1512169B 44E42847 2EBBA573 29F070DB 56011C7B E9F3A240 
      399A3557 A50384EC A0353DCF 49E8EC01 94047469 0BC12079 2764873D 25943DCD 
      66A
    *Mar  1 02:26:43.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.9726F 4A79EB40 1C7C6897 4E925D80 2313C126 1F604763 A9D9AC1F DF0092F6 
      57DF1AB4 9B904E22 CE5515CD 44F68A00 4E2BC861 FBC1540D C1F3A66B 8CDDC1C2 
      7C442027 E6241198 B0E002DE 9E06D64F 0D538987 96C1C0DB 12B0F581 6FED
      quit
    crypto pki certificate chain airespace-device-root-cert
     certificate ca 03
      3082047F 308203A8 A0030201 02020103 300D0609 2A864886 F70D0101 04050030 
      81A6310B 30090603 55040613 02555331 13301106 03550408 130A4361 6C69666F 
      726E6961 3111300F 06035504 07130853 616E204A 6F736531 17301506 0355040A 
      130E4169 72657370 61636520 496E632E 31143012 06035504 0B130B45 6E67696E 
      65657269 6E67311A 30180603 55040313 11416972 65737061 63652052 6F6F7420 
      43413124 30220609 2A864886 F70D0109 01161573 7570706F 72744061 69726573 
     --More--          70616365 2E636F6D 301E170D 30353034 32383232 33373133 5A170D31 35303132 
      36323233 3731335A 3081A831 0B300906 03550406 13025553 31133011 06035504 
      08130A43 616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 
      31173015 06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 
      040B130B 456E6769 6E656572 696E6731 1C301A06 03550403 13134169 72657370 
      61636520 44657669 63652043 41312430 2206092A 864886F7 0D010901 16157375 
      70706F72 74406169 72657370 6163652E 636F6D30 81DF300D 06092A86 4886F70D 
      01010105 000381CD 003081C9 0281C100 A93C0158 E7284E75 FF86A57A 886ACA37 
      430BECF0 7582F56B DB6AC514 554FB06E AA327B3E CE3C9391 03C93BA4 0C0AF932 
      A6CB5DA3 F1C3C528 53BF4E19 2C1BFC48 467EBD93 06B4974A 1273BF35 8AD8540F 
      261E612B A2673B68 D239C87E 1E9E967B 2654D285 45BB7F78 5F4E9D4B 7B8001AA 
      2F455CFF 4552ECDB 5667E3FC E7093E06 8FAE353D 4228B48D 8B415D9B F496342D 
      C1459987 B69BFA4B 51FB67B4 A0C21E7F C6269A39 47EB1D48 5E83B129 8B079E5E 
      1EDAB5A0 BE5E1DE0 109FF0BD 4750E32B 02030100 01A38201 37308201 33300C06 
      03551D13 04053003 0101FF30 2E060960 86480186 F842010D 0421161F 41697265 
      73706163 65204465 76696365 20434120 43657274 69666963 61746530 1D060355 
      1D0E0416 04140A52 3BB12570 523B9CEA 747FB2AD 3D8F95EA 3FCC3081 D3060355 
      1D230481 CB3081C8 8014538D 8360478D C20F8066 3232E9E1 7070552B 17EAA181 
      ACA481A9 3081A631 0B300906 03550406 13025553 31133011 06035504 08130A43 
      616C6966 6F726E69 61311130 0F060355 04071308 53616E20 4A6F7365 31173015 
      06035504 0A130E41 69726573 70616365 20496E63 2E311430 12060355 040B130B 
      456E6769 6E656572 696E6731 1A301806 03550403 13114169 72657370 61636520 
      526F6F74 20434131 24302206 092A8648 86F70D01 09011615 73757070 6F727440 
     --More--          61697265 73706163 652E636F 6D820100 300D0609 2A864886 F70D0101 04050003 
      81C100A0 E8D59D9B DA9EED0C 96045DFE A37084EC 59B5C3D3 71694DB0 70664E0C 
      8060D69E E366E81F 9F3CCF68 8AB0498E CCFA6CA7 2854F2D8 046690C9 8FEC84EF 
      2F7F0F08 C90F719D C0F4C125 CED1B525 6DD93E51 777BD5E8 7F1DC79F CC502DC2 
      0242C05D 1682DEE3 DF7541B8 C55B433C 10DFE2BF D2E802E7 D923329A 23A2076F 
      86BCC048 D569B383 59AC8979 97F02C55 6F8FE318 754F605C 43CDA7C8 1847B085 
      1DADF0D6 CD62C8DE A86E6E12 4A7CDCBF A6FCC7E1 852A1DB1 529D63B3 688305F6 7BD25F
      quit
    crypto pki certificate chain cisco-root-cert
     certificate ca 5FF87B282B54DC8D42A315B568C9ADFF
      30820343 3082022B A0030201 0202105F F87B282B 54DC8D42 A315B568 C9ADFF30 
      0D06092A 864886F7 0D010105 05003035 31163014 06035504 0A130D43 6973636F 
      20537973 74656D73 311B3019 06035504 03131243 6973636F 20526F6F 74204341 
      20323034 38301E17 0D303430 35313432 30313731 325A170D 32393035 31343230 
      32353432 5A303531 16301406 0355040A 130D4369 73636F20 53797374 656D7331 
      1B301906 03550403 13124369 73636F20 526F6F74 20434120 32303438 30820120 
      300D0609 2A864886 F70D0101 01050003 82010D00 30820108 02820101 00B09AB9 
      ABA7AF0A 77A7E271 B6B46662 94788847 C6625584 4032BFC0 AB2EA51C 71D6BC6E 
      7BA8AABA 6ED21588 48459DA2 FC83D0CC B98CE026 68704A78 DF21179E F46105C9 
      15C8CF16 DA356189 9443A884 A8319878 9BB94E6F 2C53126C CD1DAD2B 24BB31C4 
      2BFF8344 6FB63D24 7709EABF 2AA81F6A 56F6200F 11549781 75A725CE 596A8265 
      EFB7EAE7 E28D758B 6EF2DD4F A65E629C CF100A64 D04E6DCE 2BCC5BF5 60A52747 
      8D69F47F CE1B70DE 701B20D6 6ECDA601 A83C12D2 A93FA06B 5EBB8E20 8B7A91E3 
     --More--          B568EEA0 E7C40174 A8530B2B 4A9A0F65 120E824D 8E63FDEF EB9B1ADB 53A61360 
      AFC27DD7 C76C1725 D473FB47 64508180 944CE1BF AE4B1CDF 92ED2E05 DF020103 
      A351304F 300B0603 551D0F04 04030201 86300F06 03551D13 0101FF04 05300301 
      01FF301D 0603551D 0E041604 1427F3C8 151E6E9A 020916AD 2BA08960 5FDA7B2F 
      AA301006 092B0601 04018237 15010403 02010030 0D06092A 864886F7 0D010105 
      05000382 0101009D 9D8484A3 41A97C77 0CB753CA 4E445062 EF547CD3 75171CE8 
      E0C6484B B6FE4C3A 198156B0 56EE1996 62AA5AA3 64C1F64E 5433C677 FEC51CBA 
      E55D25CA F5F0939A 83112EE6 CBF87445 FEE705B8 ABE7DFCB 4BE13784 DAB98B97 
      701EF0E2 8BD7B0D8 0E9DB169 D62A917B A9494F7E E68E95D8 83273CD5 68490ED4 
      9DF62EEB A7BEEB30 A4AC1F44 FC95AB33 06FB7D60 0ADEB48A 63B09CA9 F2A4B953 
      0187D068 A4277FAB FFE9FAC9 40388867 B439C684 6F57C953 DBBA8EEE C043B2F8 
      09836EFF 66CF3EEF 17B35818 2509345E E3CBD614 B6ECF292 6F74E42F 812AD592 
      91E0E097 3C326805 854BD1F7 57E2521D 931A549F 0570C04A 71601E43 0B601EFE 
      A3CE8119 E10B35
      quit
    crypto pki certificate chain Cisco_IOS_MIC_cert
     certificate 2DCD1F0500000015BE7F
      30820470 30820358 A0030201 02020A2D CD1F0500 000015BE 7F300D06 092A8648 
      86F70D01 01050500 30393116 30140603 55040A13 0D436973 636F2053 79737465 
      6D73311F 301D0603 55040313 16436973 636F204D 616E7566 61637475 72696E67 
      20434130 1E170D31 34303832 38313834 3030395A 170D3234 30383238 31383530 
      30395A30 818C310B 30090603 55040613 02555331 13301106 03550408 130A4361 
      6C69666F 726E6961 3111300F 06035504 07130853 616E204A 6F736531 16301406 
     --More--          0355040A 130D4369 73636F20 53797374 656D7331 1B301906 03550403 13124150 
      3347322D 66303766 30363932 66663063 3120301E 06092A86 4886F70D 01090116 
      11737570 706F7274 40636973 636F2E63 6F6D3082 0122300D 06092A86 4886F70D 
      01010105 00038201 0F003082 010A0282 01010095 69DD9DFC D4FC9F91 6781A9EF 
      51713883 49968E78 05AF6140 CB9A08D9 E1066298 C8F3A072 3AC2FBDB 1E9E43E2 
      87E6C5A8 2FC83AE1 9C563022 17AD76D8 9D76DFD0 E5C4E01A 3A177708 FE60E3B9 
      AA362983 6DFBE7A0 7D902420 74C56700 E1DC2DEA 629E9CAE 333E3038 6EC4C07B 
      2CEF08B7 AC69E43D B06B28C7 8D6226F7 0BC77566 BFFC3B3C 26E90F05 2D342B59 
      9045D6D2 445313FE B551E815 E09C5872 69DF456F C15A81BA 1F3E6B35 7AE4C2BC 
      92B4F61B 8E4DEE97 DC569763 32578BBF 909FE970 00445AFA 1CF98D73 D5EC3ED2 
      ED0A909C 6381E83C 830D8262 23540044 FF438C72 BB21AB47 1E610815 E0737911 
      78820812 E0ED4512 04E892BD 3FA9DD0A 42409302 03010001 A3820124 30820120 
      300E0603 551D0F01 01FF0404 030205A0 301D0603 551D0E04 16041417 4C35E9C4 
      88705E88 3A3DF87C A014FD3E A6ABB930 1F060355 1D230418 30168014 D0C52226 
      AB4F4660 ECAE0591 C7DC5AD1 B047F76C 303F0603 551D1F04 38303630 34A032A0 
      30862E68 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 72697479 
      2F706B69 2F63726C 2F636D63 612E6372 6C304C06 082B0601 05050701 01044030 
      3E303C06 082B0601 05050730 02863068 7474703A 2F2F7777 772E6369 73636F2E 
      636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 6D63612E 63657230 
      3F06092B 06010401 82371402 04321E30 00490050 00530045 00430049 006E0074 
      00650072 006D0065 00640069 00610074 0065004F 00660066 006C0069 006E0065 
      300D0609 2A864886 F70D0101 05050003 82010100 59C70FBE 43641BFE 99434812 
      BEDDE616 093F4F5F 2FF1F0A4 983969F6 CF175C8A 0DF1D329 5A11ADB1 B7E81DF3 
     --More--          FFBF0415 40884186 2C2C6B2F 99798BEF ECBFCFA5 76D64C5B 0E3FA230 3AFF71D4 
      ABAB9570 8FA2F2BA 4065622A 1202FDBA 858BD99B 59DCF8AD 729279E2 12CB91BE 
      7CEEF9BC 667016B6 DB426925 CBE489F3 271EEF13 5CCBA25E 9013D989 66DE5837 
      1C5EE17B 144256A5 8473189D 8F954745 7D6543B2 1B12ED90 C38C56A7 AC941524 
      DF999DAB 87510E6B 970CFC97 66FE086A 449B3C99 C22FE3A1 74278F5E 58551DA5 
      E2442DC3 1A7A991F 4AB107CA 6CD6169E B750494C 23CFAEE3 92507539 E734D21A 
      F60D6C15 3F551769 D1BE9102 690122D7 A59E2D94
      quit
     certificate ca 6A6967B3000000000003
      308204D9 308203C1 A0030201 02020A6A 6967B300 00000000 03300D06 092A8648 
      86F70D01 01050500 30353116 30140603 55040A13 0D436973 636F2053 79737465 
      6D73311B 30190603 55040313 12436973 636F2052 6F6F7420 43412032 30343830 
      1E170D30 35303631 30323231 3630315A 170D3239 30353134 32303235 34325A30 
      39311630 14060355 040A130D 43697363 6F205379 7374656D 73311F30 1D060355 
      04031316 43697363 6F204D61 6E756661 63747572 696E6720 43413082 0120300D 
      06092A86 4886F70D 01010105 00038201 0D003082 01080282 010100A0 C5F7DC96 
      943515F1 F4994EBB 9B41E17D DB791691 BBF354F2 414A9432 6262C923 F79AE7BB 
      9B79E807 294E30F5 AE1BC521 5646B0F8 F4E68E81 B816CCA8 9B85D242 81DB7CCB 
      94A91161 121C5CEA 33201C9A 16A77DDB 99066AE2 36AFECF8 0AFF9867 07F430EE 
      A5F8881A AAE8C73C 1CCEEE48 FDCD5C37 F186939E 3D71757D 34EE4B14 A9C0297B 
      0510EF87 9E693130 F548363F D8ABCE15 E2E8589F 3E627104 8726A415 620125AA 
      D5DFC9C9 5BB8C9A1 077BBE68 92939320 A86CBD15 75D3445D 454BECA8 DA60C7D8 
      C8D5C8ED 41E1F55F 578E5332 9349D5D9 0FF836AA 07C43241 C5A7AF1D 19FFF673 
     --More--          99395A73 67621334 0D1F5E95 70526417 06EC535C 5CDB6AEA 35004102 0103A382 
      01E73082 01E33012 0603551D 130101FF 04083006 0101FF02 0100301D 0603551D 
      0E041604 14D0C522 26AB4F46 60ECAE05 91C7DC5A D1B047F7 6C300B06 03551D0F 
      04040302 01863010 06092B06 01040182 37150104 03020100 30190609 2B060104 
      01823714 02040C1E 0A005300 75006200 43004130 1F060355 1D230418 30168014 
      27F3C815 1E6E9A02 0916AD2B A089605F DA7B2FAA 30430603 551D1F04 3C303A30 
      38A036A0 34863268 7474703A 2F2F7777 772E6369 73636F2E 636F6D2F 73656375 
      72697479 2F706B69 2F63726C 2F637263 61323034 382E6372 6C305006 082B0601 
      05050701 01044430 42304006 082B0601 05050730 02863468 7474703A 2F2F7777 
      772E6369 73636F2E 636F6D2F 73656375 72697479 2F706B69 2F636572 74732F63 
      72636132 3034382E 63657230 5C060355 1D200455 30533051 060A2B06 01040109 
      15010200 30433041 06082B06 01050507 02011635 68747470 3A2F2F77 77772E63 
      6973636F 2E636F6D 2F736563 75726974 792F706B 692F706F 6C696369 65732F69 
      6E646578 2E68746D 6C305E06 03551D25 04573055 06082B06 01050507 03010608 
      2B060105 05070302 06082B06 01050507 03050608 2B060105 05070306 06082B06 
      01050507 0307060A 2B060104 0182370A 0301060A 2B060104 01823714 02010609 
      2B060104 01823715 06300D06 092A8648 86F70D01 01050500 03820101 0030F330 
      2D8CF2CA 374A6499 24290AF2 86AA42D5 23E8A2EA 2B6F6923 7A828E1C 4C09CFA4 
      4FAB842F 37E96560 D19AC6D8 F30BF5DE D027005C 6F1D91BD D14E5851 1DC9E3F7 
      38E7D30B D168BE8E 22A54B06 E1E6A4AA 337D1A75 BA26F370 C66100A5 C379265B 
      A719D193 8DAB9B10 11291FA1 82FDFD3C 4B6E65DC 934505E9 AF336B67 23070686 
      22DAEBDC 87CF5921 421AE9CF 707588E0 243D5D7D 4E963880 97D56FF0 9B71D8BA 
      6019A5B0 6186ADDD 6566F6B9 27A2EE2F 619BBAA1 3061FDBE AC3514F9 B82D9706 
     --More--          AFC3EF6D CC3D3CEB 95E981D3 8A5EB6CE FA79A46B D7A25764 C43F4CC9 DBE882EC 
      0166D410 88A256E5 3C57EDE9 02A84891 6307AB61 264B1A13 9FE4DCDA 5F
      quit
    username Cisco secret 5 $1$.UkK$3GDTdydbzaupRq0u6bml9/
    ip ssh version 2
    bridge irb
    interface GigabitEthernet0
     duplex auto
     speed auto
    interface GigabitEthernet0.1
     encapsulation dot1Q 1 native
     bridge-group 1
     bridge-group 1 spanning-disabled
    interface GigabitEthernet1
     shutdown
     duplex auto
     --More--         speed auto
     bridge-group 1
    interface BVI1
     ip address dhcp client-id BVI1
    ip forward-protocol nd
    ip route 0.0.0.0 0.0.0.0 BVI1
    logging trap emergencies
    logging facility kern
    logging snmp-trap notifications
    logging snmp-trap informational
    logging snmp-trap debugging
    bridge 1 protocol ieee
    bridge 1 route ip
    line con 0
    line vty 0 4
     transport input all
    line vty 5 15
     transport input all
     --More--        end
    APf07f.0692.ff0c# show running-configip interface brief
    Interface                  IP-Address      OK? Method Status                Protocol
    BVI1                       unassigned      YES DHCP   up                    up      
    GigabitEthernet0           unassigned      NO  unset  up                    up      
    GigabitEthernet0.1         unassigned      YES unset  up                    up      
    GigabitEthernet1           unassigned      NO  unset  administratively down down    
    APf07f.0692.ff0c#
    Not in Bound state.
    *Mar  1 02:27:33.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:28:23.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:29:13.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.
    Not in Bound state.
    *Mar  1 02:30:03.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC using DHCP IP. Renewing DHCP IP.

    Hi,
    First check that a DHCP pool is configured for APs to pull IP address then only AP will be try to discover the WLC.
    Most of the time these problem(AP join) arise when you don't have correct software version on WLC.
    For 2702 AP, you need at-least 7.6.120.0 version on WLC.
    Here is the matrix: http://www.cisco.com/c/en/us/td/docs/wireless/compatibility/matrix/compatibility-matrix.html
    Fore more info, paste the info which Rasika asked.
    Regards

  • Downloading mountain lion damaged my hard disc. I took my Mac Pro to apple book store. They are unable to repair it and suggest I purchase a new hard disc for $160. It was a perfectly functioning Mac Pro that got damaged by downloading mountain lion.

    Downloading mountain lion damaged my hard disc. I took my Mac Pro to apple store. They are unable to repair it and suggest I purchase a new hard disc for $160. It was a perfectly functioning Mac Pro that got damaged by downloading mountain lion.

    Software upgrades do not generally damage hardware; your drive's failure must be co-incidental. On most MBP's, a hard drive is very easily replaced by a user. You might want to check out this site for both hard drives as well as install videos (check which model you have so you can check the correct video):
    http://eshop.macsales.com/installvideos/
    hard drives:
    http://eshop.macsales.com/shop/internal_storage/hard_drives_and_SSD
    I just recently upgraded my MBP with an SSD; I purchased an kit with an external enclosure from OWC and cloned the current drive to the new one, installed the new drive and was done in no time.

  • When using the camera downloader in Adobe Bridge CS6 with Nikon D5200 we are unable to see previews of the photos and it is very slow to download. The issue occurs under a the users rights, but not under admin level. This is a new issue

    When using the camera downloader in Adobe Bridge CS6 with Nikon D5200 we are unable to see previews of the photos and it is very slow to download. The issue occurs under a the users rights, but not under admin level. This is a new issue.

    Hi Jdentremont,
    Lync client gets user photos by first querying the Address Book Web Query (ABWQ) service on the server, which is exposed through the Distribution List Expansion web service. The client receives
    the image file and then copies it to the user's cache to avoid downloading the image each time it needs to be displayed. The attribute values returned from the query are also stored in the cached Address Book Service entry for the user. The Address Book Service
    deletes all cached images every 24 hours, which means that it can take up to 24 hours for new user images to be updated in the cache on the server.
    To troubleshoot your problem, please follow the steps below:
    1.  Navigate to
     “X:\share\1-WebServices-1\ABfiles\000000000\000000000” folder. (ABS file share)
    You should see some photo files in this folder as the following screenshot.
    2. Delete all the files in this folder.
    3. On test PC, delete local cache files.
    %userprofile%\AppData\Local\Microsoft\Office\15.0\Lync\[email protected]
    4. Sign-in Lync with the test account.
    5. Go back to the ABS file share, check if there is any Photo file in the folder.
    Best regards,
    Eric
    Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • A Pool users are unable to Join the meeting

    Hi,
    We have a set of users from a pool which is meant for a different site, they are unable to join the meeting. Once they click on Lync meeting in Lync meeting invite, they get the  error - 
    error: A server error occurred. Please contact your support team.
    Can you guide me what tests can be performed to troubleshoot this?
    Please note: we have 2 sites and the certificate tool checker shows na-join.danahermail.com and eu-join.danahermail.com  certficate to be missing an intermediate certificate. Could that be the cause of the issue or I need to check something else?
    Thanks & Regards,
    Vinay Mishra

    Hi,
    Would you please elaborate your Lync Server environment?
    Please make sure all FE Server services started as normal.
    Please also double check if you configure the correct certificate for FE Servers.
    More details:
    https://technet.microsoft.com/en-us/library/gg398094(v=ocs.14).aspx
    Make sure that you add the meet URL such as meet.contoso.com in internal DNS and in the SAN of the FE Server certificate.
    Best Regards,
    Eason Huang
    Eason Huang
    TechNet Community Support

  • LAP's are unable to join Cisco WLC

    Dear all,
    I  have moved my WLC to my datacentre from branch office. after movement i have updated DHCP options with the new ip address but all of my access point are not joining  to WLC.Kindly check the attached cofiguration of WLC as well as LAP logs and It will be a great help if somebody can help me to relsolve this issue.
    Please note that  for datacenter -  Branch connectivity we are using L3  MPLS line and there is no firewall between the office and I am using Ver 7 software on my WLC

    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin-top:0cm;
    mso-para-margin-right:0cm;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0cm;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;
    mso-bidi-font-family:"Times New Roman";
    mso-bidi-theme-font:minor-bidi;}
    Hi,
    Your DHCP option 43 is good
    From your file ‘AP error logs.txt’ it’s clear that the DHCP server provides option 43 that point to 10.204.20.4.
    I also see that the controller name is AEDXBWLC01.
    /* Style Definitions */
    table.MsoNormalTable
    {mso-style-name:"Table Normal";
    mso-tstyle-rowband-size:0;
    mso-tstyle-colband-size:0;
    mso-style-noshow:yes;
    mso-style-priority:99;
    mso-style-qformat:yes;
    mso-style-parent:"";
    mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
    mso-para-margin-top:0cm;
    mso-para-margin-right:0cm;
    mso-para-margin-bottom:10.0pt;
    mso-para-margin-left:0cm;
    line-height:115%;
    mso-pagination:widow-orphan;
    font-size:11.0pt;
    font-family:"Calibri","sans-serif";
    mso-ascii-font-family:Calibri;
    mso-ascii-theme-font:minor-latin;
    mso-hansi-font-family:Calibri;
    mso-hansi-theme-font:minor-latin;
    mso-bidi-font-family:"Times New Roman";
    mso-bidi-theme-font:minor-bidi;}
    The AP cannot guess this name so this means that it can communicate with the controller.
    You do not need to configure DNS
    Your DNS server is not configured with CISCO-LWAPP-CONTROLLER.localdomain. But you do not need to configure DNS since you already have a working option 43.
    If you want to use DNS you should configure both CISCO-CAPWAP-CONTROLLER.localdomain and CISCO-LWAPP-CONTROLLER.localdomain, where localdomain is the access point domain name. Old software use LWAPP and new software uses CAPWAP.
    What might cause the problems?
    I believe that you have a certificate mismatch between the controller and the AP. In order to fix this you can manually add the AP to the AP authorization list.
    In order to allow APs to join, use one of these options:
    Add them to the authorization list of the WLC: use the config auth-list add mic command.
    Add them as clients to the RADIUS server. The Called-Station-ID is the MAC address of the controller. If you separate the APs into groups, you can create policies to define which APs can authenticate against which Called-Station-IDs.
    Debug
    You can debug to see what’s happening when the AP tries to join the controller.
    You can also use this debug to obtain the Ethernet address for the AP:
    (Cisco Controller) >debug lwapp events enable
    Mon May 22 12:00:21 2006: Received LWAPP DISCOVERY REQUEST from AP 00:0b:85:5b:fb:d0 to ff:ff:ff:ff:ff:ff on port '1'
    Mon May 22 12:00:21 2006: Successful transmission of LWAPP Discovery-Response to AP 00:0b:85:5b:fb:d0 on Port 1
    /André

  • We are sorry, but we are unable to complete your request.•The Office 2007 Product Key provided is already associated with another user on this site. Please log in with the user information originally used with this Office 2007 Product Key.

    Over the years I have had many ISP and email addresses - but now we have  finally gone almost fully virtual...
    I have a live login and MS ID 4 my SkyDrive account but I only use my MS  touch with 8.1, SkyDrive and office 365 for mobility.
    And I still like to backup to my own server!!!
    What would be good is if I can put all the software licenses and product  keys of the software and keep a record of my mac addresses for  hardware  and even static IP's in a file or a secure location within the MS online  store.
    That's where MS wants me to get my computing needs from in future and I  will always be able to retrieve it in future but what about the $$$$$ I have  spent on software, hardware and applications prior to now???
    I know u guys love 2 collect data 4 marketing analysis,
    4 example I have an old PC that is still running a server from last century  - if you knew about it a simple script would allow you to offer upgrades or at  least relevant MS products - UNLIKE the rubbish adds I just turn off or tune out 
    now...
    Why cant I add products previous online email purchases into the 1 MS live  ID account where I can keep it together? If you make that available I don't have  to have separate steam accounts, EA game accounts, ASUS and adobe accounts etc 
    etc.
    What has brought me 2 this is I was looking for my office pro 2007 disks to  rebuild a HOME USE ONLY windows 7 laptop (NO touch screen so 8.1 is no benefit  at all)
    I HAVE 4 Genuine PRODUCT KEYs for Office 2007 BUT EVERY TIME I WENT TO  DOWNLOAD the software - regardless of the key I used - I got the error message:  We are sorry, but we are unable to complete your request.•The Office 2007  Product Key
    provided is already associated with another user on this site.  Please log in with the user information originally used with this Office 2007  Product Key.
    That's crap - This is a clean brand spanker install of Win7 and there was  nothing b4 I put the oem drivers from Toshiba back on.
    I looked at dozens of support pages and forum blogs and tried for hours to  get a copy to download - including incognito and other logins but because my  default PC name is also my MS Windows live ID the same error was repeated.
    I keep away from the non MS sites for these things and with good reason -  there were heaps of similar users with the same issue or very close to it that  had downloaded from a supposed MS copy from eValue or digital river etc and the  next
    thing was total corruption of the OS.
    EVENTUALLY I found a LIVE MS chat on a support site in the US and she gave  me a link to a slightly older version which will need updating and some reg edit  changes but so far, so good.
    The point is - what a crock !
    I should be able to just keep all my software, drivers, updates, service  packs, and versions that I have upgraded in the MS store.
    If Microsoft aren't going to support XP or Office 2003 and eventually 2007,  vista & Windows7 not far behind??? then that's still no excuse for them to  put these restrictions and limits when I OWN my copy of the software!!
    Unlike office 365 and SkyDrive space which is described in the T&C  (that we all read before ticking that radial button to agree of course) as ONLY  under a leased licence.
    IF Microsoft can support AND develop software that supports SQL2000  Servers, why is it so hard to archive and keep the same info for  everyone???

    Over the years I have had many ISP and email addresses - but now we have  finally gone almost fully virtual...
    I have a live login and MS ID 4 my SkyDrive account but I only use my MS  touch with 8.1, SkyDrive and office 365 for mobility.
    And I still like to backup to my own server!!!
    What would be good is if I can put all the software licenses and product  keys of the software and keep a record of my mac addresses for  hardware  and even static IP's in a file or a secure location within the MS online  store.
    That's where MS wants me to get my computing needs from in future and I  will always be able to retrieve it in future but what about the $$$$$ I have  spent on software, hardware and applications prior to now???
    I know u guys love 2 collect data 4 marketing analysis,
    4 example I have an old PC that is still running a server from last century  - if you knew about it a simple script would allow you to offer upgrades or at  least relevant MS products - UNLIKE the rubbish adds I just turn off or tune out 
    now...
    Why cant I add products previous online email purchases into the 1 MS live  ID account where I can keep it together? If you make that available I don't have  to have separate steam accounts, EA game accounts, ASUS and adobe accounts etc 
    etc.
    What has brought me 2 this is I was looking for my office pro 2007 disks to  rebuild a HOME USE ONLY windows 7 laptop (NO touch screen so 8.1 is no benefit  at all)
    I HAVE 4 Genuine PRODUCT KEYs for Office 2007 BUT EVERY TIME I WENT TO  DOWNLOAD the software - regardless of the key I used - I got the error message:  We are sorry, but we are unable to complete your request.•The Office 2007  Product Key
    provided is already associated with another user on this site.  Please log in with the user information originally used with this Office 2007  Product Key.
    That's crap - This is a clean brand spanker install of Win7 and there was  nothing b4 I put the oem drivers from Toshiba back on.
    I looked at dozens of support pages and forum blogs and tried for hours to  get a copy to download - including incognito and other logins but because my  default PC name is also my MS Windows live ID the same error was repeated.
    I keep away from the non MS sites for these things and with good reason -  there were heaps of similar users with the same issue or very close to it that  had downloaded from a supposed MS copy from eValue or digital river etc and the  next
    thing was total corruption of the OS.
    EVENTUALLY I found a LIVE MS chat on a support site in the US and she gave  me a link to a slightly older version which will need updating and some reg edit  changes but so far, so good.
    The point is - what a crock !
    I should be able to just keep all my software, drivers, updates, service  packs, and versions that I have upgraded in the MS store.
    If Microsoft aren't going to support XP or Office 2003 and eventually 2007,  vista & Windows7 not far behind??? then that's still no excuse for them to  put these restrictions and limits when I OWN my copy of the software!!
    Unlike office 365 and SkyDrive space which is described in the T&C  (that we all read before ticking that radial button to agree of course) as ONLY  under a leased licence.
    IF Microsoft can support AND develop software that supports SQL2000  Servers, why is it so hard to archive and keep the same info for  everyone???

  • Safari Developer Program License Agreement: We are unable to process your request

    Hi all,
    I'm trying to sign up for the free Safari Developer Program.  Everything proceeds as normal until the step Agree to License[1] after which point I receive the message "We are unable to process your request."  I have tried to logout of the Member Center and cleared all apple.com cookies.  I've tried to start the process again from the beginning too.  I've verified all my contact details.  I get the same result each time.
    1. https://developer.apple.com/ios/enroll/listAgreement.action
    I have had an Apple ID with this email address for several years, but this is my first time trying to join the Developer Program.  Can anyone offer some advice?  Thanks.
    Lucas

    OK, I'm answering my own question. I've filled-in the support ticket. The lady from Apple support just called me and helped me deal with the issue as there was no other option to solve it by myself.
    That's where I have filled in my support case (very bottom of the page):
    https://developer.apple.com/support/safari/enrollment.html

  • I recently got an iPhone 4 out of nowhere it has decided to go to connect to iTunes screen/emergency calls only when I plug into iTunes it states we are unable to continue with your activation at this time please try again later, or contact customer care

    I have recently got an iPhone 4 out of no where it has decided to think that my headphones are in and they are not but does work with headphones in.
    Then later on within the same day it after turning my phone on and putting it on charge it comes to the screen stating to connect to iTunes/emergency calls only/no service so I connect it iTunes and it says we are unavailable to continue with your activation at this time. Please try again later, or contact customer care.
    HELP!

    the same problem but i used it already for 3 years my iphone 4, when i update to ios 6.1.3 version, now is failure like said.
    we are unable to continue with your activation at this time please try again later, or contact customer care
    any help please. i am here in saudi arabia city of jeddah.
    thank you very much in advance
    pabs

  • You are unable to log in...; Network Home directories; 10.4 & 10.5 Servers

    I have a solution!
    Note: this is a new post because all previous posts dealing with this topic have been archived, MANY without an answer.
    Problem:
    Users with Network Home directories can't log in. After entering their correct username and password, the following error message appears:
    "You are unable to login to the user account 'username' at this time. Logging in to the account failed because an error occurred."
    Problem occurs with v10.5 Leopard client attempting to login to a Network Home directory hosted on a v10.4 Tiger server.
    _Significant Troubleshooting Symptom:_
    Client mac Console log (all Messages) contains the following entry at the time the user attempted to login to their Network Home directory:
    authorizationhost[509] ERROR | -[HomeDirMounter
    mountNetworkHomeWithURL:attributes:dir:Path:username:] |
    PremountHomeDirectoryWith Authentication( url=afp://server.example.com/Homes, homedir=
    /Network/Servers/server.example.com/Volumes/ServerHardDisk/Homes/username,
    name=username )
    returned 2
    _Computing/Network Environment:_
    v10.5 Leopard server doing: DNS; Open Directory with Kerberos for Single Sign-On; AFP for half of all users' Network Home directories.
    v10.4 Tiger server doing: AFP for the other half of the Network Home directories. Also, note that Open Directory is not running on this server, BUT IT IS CONFIGURED (using Server Admin) as "Connected to a Directory System" and has joined the Kerberos realm on the v10.5 Leopard server.
    v10.5 Leopard clients.
    Solution:
    v10.5 User Management manual
    http://manuals.info.apple.com/enUS/User_Managementv10.5.pdf
    says share points for Network Home directories have to have Guest Access ENABLED. See step 5 on page 117 and step 12 on page 118. Note that these are two different settings, but seem consistent with each other.
    I had followed/complied/set Guest Access according to steps 5 (page 117) and 12 (page 118) on BOTH the v10.5 Leopard AND the v10.4 Tiger servers. The solution that allows users to log on normally is:
    Uncheck/disable Guest Access (as set in step 12 page 118) for the v10.4 Leopard server only. Leave "Share this item using AFP" checked. Uncheck "Allow AFP guest access."
    The above worked for me. Your milage may vary. If anyone knows how to report this to Apple for fixing in the server software and/or clarification in User Management manual, please do. If anyone knows that this solution "breaks" other stuff, please post back.

    Other posts that dealt with this same issue and other potential solutions:
    http://discussions.apple.com/thread.jspa?messageID=5700241&#5700241
    http://discussions.apple.com/thread.jspa?messageID=5784186&#5784186
    http://discussions.apple.com/thread.jspa?threadID=1215039&start=0&tstart=0
    http://discussions.apple.com/thread.jspa?messageID=9204496&#9204496
    http://discussions.apple.com/thread.jspa?threadID=1522353&start=0&tstart=0
    http://discussions.apple.com/thread.jspa?messageID=10226660&#10226660

  • I want a proper update for my phone (intex cloud fx).i want to copy and paste the text,keyboard is very hard to type.need some main appswhich available inplystr

    i have some some main problems with this phone . the browser is not good . i want opera or uc browser in store . i not able to copy or paste any text msgs ,this is a problem. i have seen that when i try to update my phone , it showing error . i seen something is there that is too gud in this phone . i requisted firefox to increase its problem solving and make good and user friendly os like android . there are many things which i like very much on this phone but , on the same side there are lots of backlogs are there .
    such as :
    1)no whats app (connect a2 app is there but i didnot like it .bec its very slow n giving me too much problem)
    2)keyboard is very hard to type because its width is low ,so i cant able to type gud . atleast chage it in u r next update.
    3)the browser is not good . giving many problem in downloading and looses its data after i close it . its forfotting my data like passwords every time.
    4) file manager is too slow .( taking much time for loading ).

    Hi rajkumarukkuturi,
    Thank you for your feedback, however all of the feedback for the developers can be submitted at input.mozilla.org.
    If you need any support, please consider creating a new thread containing the specific details of your issue.
    Doing so will allow the Mozilla volunteers to give you solutions that are more helpful to you. This may help them to solve your problem faster and more efficiently.
    Please, feel free to post the link to your thread on this thread for volunteers interested in assisting you.
    Thank you.

  • You are unable to log in to the File Vault user account "myaccount "...

    I know there are various posts already out there on remedies for recovering your data stored on a FileVault account when you receive the following message at the login screen; *"You are unable to log in to the File Vault user account "myaccount " at this time"*, but this genuinely worked for me despite AppleCare providing absolutely no assistance whatsoever. In fact, if I had followed their advise I'd be inconsolable right now having wiped my MacBook Pro and contemplating the prospect of rewriting my two essays due in 3 days time!
    I, in a moment of shear stupidity, decided to move the sparsebundle file in my one and only account to trash. Thinking nothing of my foolish actions I shut down for the evening without a care in the world. The next day I started up my computer as usual, and as usual I was prompted at the login screen for my password. I entered the correct password, but was alarmed to see the message above flash before my eyes. Without boring you all with what I did over the weekend waiting for AppleCare to open again on Monday morning. Anyway, this post is specifically for people who have put the sparsebundle of their FileVault-enabled account in the trash (NOT anything else!) without emptying it, of course! The other prerequisite is that you must REMEMBER YOUR FILEVAULT ACCOUNT PASSWORD!
    1. Firstly, you must insert *Disc 1 of the Mac OS X Install* discs.
    2. Restart your computer holding down the letter S (make sure you are holding this down BEFORE the start up noise sounds)
    3. Select the appropriate language and continue to the next screen (DO NOT go past the next screen, the WELCOME screen)
    4. At the grey bar at the top, under Utilities, select *Reset Password*
    5. Select the Administrator/Root account and proceed to change the password of this account to test
    6. Confirm the password by reentering it and click Save
    7. Restart your computer and at the login screen you should now be able to select an account named Other
    8. The username for this account is root and the password is test (the password you entered earlier)
    9. Using Finder, locate the Terminal utility, which can be found in *Applications --> Utilities*
    10. Enter the following, ignoring the bold of course (pay attention to lower cases AND spaces!): *defaults write com.apple.finder AppleShowAllFiles TRUE*
    11. Hit Enter
    12. On the next line, enter: *killall Finder*
    13. Hit Enter again
    14. Type: exit on the next line and close Terminal
    15. This has enabled the hidden files on your computer to be visible
    16. You then need to locate the sparsebundle file in the trash of your usual account folder (it could be 501, so search for that too) whilst logged in to the administrator account
    17. Once you have found it, click *Go to Folder* under Go in the grey bar and type /Users/
    18. Create a *new folder* at this location with a new username
    19. Move the sparsebundle from its present location to the folder you have just created
    20. Click Get Info on the new folder, and at the very bottom click *Apply to enclosed items*
    21. In *System Preferences --> Accounts*, create a new user with EXACTLY the same name as the folder you created (eg. Folder name = burtreynolds, new user = burtreynolds)
    22. A window should appear if you have done the above correctly stating *A folder in Users folder already has same name, would you like to use it?*
    22. Click OK
    23. Click *Show All* at the top of the Accounts window
    24. Restart your system and log in to the new account you have created
    25. The sparsebundle should now be visible
    26. Double-click on the sparsebundle, it will prompt you to enter a password
    27. Enter the password of your former account (if you have genuinely forgotten this password, I honestly can't help any further at this point)
    28. If the password is correct, the sparsebundle will automatically mount and you will have access to all the files
    29. NEVER EVER USE FILEVAULT AGAIN AND BACK UP ALL DATA YOU DON'T WANT TO LOSE!!!
    The above worked for me, and to say I'm mildly annoyed with AppleCare is, well, putting it mildly really!

    I know there are various posts already out there on remedies for recovering your data stored on a FileVault account when you receive the following message at the login screen; *"You are unable to log in to the File Vault user account "myaccount " at this time"*, but this genuinely worked for me despite AppleCare providing absolutely no assistance whatsoever. In fact, if I had followed their advise I'd be inconsolable right now having wiped my MacBook Pro and contemplating the prospect of rewriting my two essays due in 3 days time!
    I, in a moment of shear stupidity, decided to move the sparsebundle file in my one and only account to trash. Thinking nothing of my foolish actions I shut down for the evening without a care in the world. The next day I started up my computer as usual, and as usual I was prompted at the login screen for my password. I entered the correct password, but was alarmed to see the message above flash before my eyes. Without boring you all with what I did over the weekend waiting for AppleCare to open again on Monday morning. Anyway, this post is specifically for people who have put the sparsebundle of their FileVault-enabled account in the trash (NOT anything else!) without emptying it, of course! The other prerequisite is that you must REMEMBER YOUR FILEVAULT ACCOUNT PASSWORD!
    1. Firstly, you must insert *Disc 1 of the Mac OS X Install* discs.
    2. Restart your computer holding down the letter S (make sure you are holding this down BEFORE the start up noise sounds)
    3. Select the appropriate language and continue to the next screen (DO NOT go past the next screen, the WELCOME screen)
    4. At the grey bar at the top, under Utilities, select *Reset Password*
    5. Select the Administrator/Root account and proceed to change the password of this account to test
    6. Confirm the password by reentering it and click Save
    7. Restart your computer and at the login screen you should now be able to select an account named Other
    8. The username for this account is root and the password is test (the password you entered earlier)
    9. Using Finder, locate the Terminal utility, which can be found in *Applications --> Utilities*
    10. Enter the following, ignoring the bold of course (pay attention to lower cases AND spaces!): *defaults write com.apple.finder AppleShowAllFiles TRUE*
    11. Hit Enter
    12. On the next line, enter: *killall Finder*
    13. Hit Enter again
    14. Type: exit on the next line and close Terminal
    15. This has enabled the hidden files on your computer to be visible
    16. You then need to locate the sparsebundle file in the trash of your usual account folder (it could be 501, so search for that too) whilst logged in to the administrator account
    17. Once you have found it, click *Go to Folder* under Go in the grey bar and type /Users/
    18. Create a *new folder* at this location with a new username
    19. Move the sparsebundle from its present location to the folder you have just created
    20. Click Get Info on the new folder, and at the very bottom click *Apply to enclosed items*
    21. In *System Preferences --> Accounts*, create a new user with EXACTLY the same name as the folder you created (eg. Folder name = burtreynolds, new user = burtreynolds)
    22. A window should appear if you have done the above correctly stating *A folder in Users folder already has same name, would you like to use it?*
    22. Click OK
    23. Click *Show All* at the top of the Accounts window
    24. Restart your system and log in to the new account you have created
    25. The sparsebundle should now be visible
    26. Double-click on the sparsebundle, it will prompt you to enter a password
    27. Enter the password of your former account (if you have genuinely forgotten this password, I honestly can't help any further at this point)
    28. If the password is correct, the sparsebundle will automatically mount and you will have access to all the files
    29. NEVER EVER USE FILEVAULT AGAIN AND BACK UP ALL DATA YOU DON'T WANT TO LOSE!!!
    The above worked for me, and to say I'm mildly annoyed with AppleCare is, well, putting it mildly really!

  • DirectNIC's customers outside of the U.S. are unable to connect to their email accounts using their blackberries

    I work for directNIC.com and our customers who are located in foreign countries are unable to send/receive email on their blackberry devices.  The problem started at the beginning of this month and we can not figure out what the problem is.  Our U.S. blackberry customers are not having any problems.  Our non-U.S. customers have reported errors such as needing to revalidate the account and when they tried to they received an invalid domain or invalid username/password message.  Some customers said the email just quit working and they received an unable to connect error message.  I've had one customer provide me with a link to their wireless provider's blackberry email account setup and I am unable to setup their email account there or any email account that uses any of our servers.  All of our customer's email accounts work in their email clients on their computers, their other phones, and through their webmail it is only their blackberries.  We've white listed all of blackberry's IP addresses and we've checked the server logs to see if there were any connection attempts when I tried to setup the email accounts through the customer's online blackberry interface and there wasn't even an attempt to connect to the server.  The error message that I receive is as follows:
    Email address domain not found:
    The email address domain 'insert domain name here' cannot be found. Please verify this
    information is correct. If the error persists contact 'insert domain name here' (your
    email provider)
    The problem isn't with just one wireless provider it's with multiple providers in multiple countries but the U.S. customers aren't reporting any problems.  I am able to setup my personal email account through his blackberry site, an email account from my work through his blackberry site, my yahoo.com email address, and my hotmail.com email address.  The only email accounts that do not work are the email accounts that are on any of our servers.   Some of these servers have different server configuration but all of them have all of blackberry's IP addresses whitelisted.  Our premium hostng email servers have the same software installed on them as my work email server does and my work email account works fine when I try to set it up through blackberry but none of the premium hosting email accounts that I tried to setup through this customers interface will work.  The problem is only with blackberry devices and is only with customers outside of the U.S.  If anyone has any thoughts or ideas please let us know.
    Thanks,
    Priscilla
    directNIC Support
    Removed personal information to comply with Community Guidelines and Terms and Conditions of Use.

    Hi and Welcome to the Forums!
    Sorry for the delay replying...while your post is a bit old now, it still deserves a response.
    First -- these forums are not a formal channel for support from RIM. Rather, they are user-to-user support forums where users help other users. As such, it is unlikely that RIM will see and respond to your inquiry.
    What I suggest is that you have your affected users exercise their formal support channel -- which is available via their carrier. The carriers have the ability to escalate cases into RIM for resolution.
    Best!
    Occam's Razor nearly always applies when troubleshooting technology issues!
    If anyone has been helpful to you, please show your appreciation by clicking the button inside of their post. Please click here and read, along with the threads to which it links, for helpful information to guide you as you proceed. I always recommend that you treat your BlackBerry like any other computing device, including using a regular backup schedule...click here for an article with instructions.
    Join our BBM Channels
    BSCF General Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

Maybe you are looking for