LWAP 1231G can't join an WLC 2504 , Unsupported!!

Dear All,
I have WLC 2504 with  7.2.103.0 software version , & 2 different LWAP 1262n & 1231G with "c1200-rcvk9w8-mx.124-21a.JA" Image.
The 1262n is joined to the to the controller and working fine but the 1231G it cann't join the controller , the controller says "Join request received from an unsupported AP" !!
i will attaches the logs for this AP.
please can any one help.

If you want to use 1230, then the "highest" WLC version you can run is the 7.0.235.3.
It says so in the Release Notes under the heading Software Release Support for Access Points, Table 1-1.

Similar Messages

  • AP1252 can´t join on WLC

    WLC software 7.2.103.0
    1. first problem: AP1252 can´t join on WLC. MAC was add on mac filter properly.
    170
    Mon Apr 9 15:37:32 2012
    Mesh Node '2c:3f:38:be:53:ef' failed to join controller, MAC address not in MAC filter list.
    171
    Mon Apr 9 15:37:32 2012
    AAA Authentication Failure for UserName:2c3f38be53e0 User Type: WLAN USER
    172
    Mon Apr 9 15:37:32 2012
    Coverage hole pre alarm for client[1] 40:a6:d9:ef:87:68 on 802.11b/g interface of AP 2c:3f:38:bf:0c:80 (AP2c3f.38bf.0c80). Hist: 46 7 5 4 2 1 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
    173
    Mon Apr 9 15:37:32 2012
    Coverage hole pre alarm for client[1] 8c:7b:9d:05:a0:67 on 802.11b/g interface of AP 2c:3f:38:bf:0c:80 (AP2c3f.38bf.0c80). Hist: 50 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
    174
    Mon Apr 9 15:37:30 2012
    Interference Profile Failed for Base Radio MAC: 2c:3f:38:bf:1e:40 and slotNo: 0
    175
    Mon Apr 9 15:37:28 2012
    Mesh child node 'd4:d7:48:6d:48:2f' has changed its parent to mesh node '2c:3f:38:bf:ef:60' from mesh node 'd4:d7:48:6c:7d:80'.
    176
    Mon Apr 9 15:37:28 2012
    Mesh Node '2c:3f:38:bf:1d:2f' failed to join controller, MAC address not in MAC filter list.
    177
    Mon Apr 9 15:37:28 2012
    AAA Authentication Failure for UserName:2c3f38bf1d20 User Type: WLAN USER
    178
    Mon Apr 9 15:37:28 2012
    Mesh child node '2c:3f:38:bf:1d:2f' has changed its parent to mesh node 'd4:d7:48:6c:70:e0' from mesh node '2c:3f:38:be:55:00'.
    179
    Mon Apr 9 15:37:28 2012
    Interference Profile Updated to Pass for Base Radio MAC: 2c:3f:38:bf:4b:20 and slotNo: 0
    180
    Mon Apr 9 15:37:27 2012
    Interference Profile Failed for Base Radio MAC: d4:d7:48:6c:81:60 and slotNo: 0
    Several APs can´t join on WLC and all are added on MAC filter, but they are showing this messages.
    2 . Second problem.:  Operational Status = UNKNOWN
    Some Access Point are in UNKNOWN status. I tried but I can´t do the reboot.
    I can access Web config the APs using WLC, but when I applied the reset, it wasn´t working properly.

    Murlio:
    Is the AP model 1522 or 1252? I think you mean outdoor AP 1522 (which needs a mac filter). right?
    please double check the mac filter you added. Try to delete then add it again if necessary.
    it is obvious that it is a mac filter problem. be sure that you add the correct mac address and it is written correctly with the correct format and the mac filter created for "any WLAN" and the interface Name is "management".
    Hope this will solve the issue.
    Amjad

  • Cisco LAP 2602 can not join Virtual WLC

    dear all, 
    i just install Virtual WLC and i remove WLC 2504 , i install & configured it , but LAP can not join. it was work fine with WLC 2504.
    i used the same network topology with the old WLC.
    i receive this error logs.
    *spamApTask4: Feb 04 06:01:30.082: <<<<  Start of CAPWAP Packet  >>>>
    *spamApTask4: Feb 04 06:01:30.082: CAPWAP Control mesg Recd from 10.192.200.93, Port 26711
    *spamApTask4: Feb 04 06:01:30.082:              HLEN 4,   Radio ID 0,    WBID 1
    *spamApTask4: Feb 04 06:01:30.082:              Msg Type   :   CAPWAP_DISCOVERY_REQUEST
    *spamApTask4: Feb 04 06:01:30.082:              Msg Length : 155
    *spamApTask4: Feb 04 06:01:30.082:              Msg SeqNum : 0
    *spamApTask4: Feb 04 06:01:30.082:   
    *spamApTask4: Feb 04 06:01:30.082:       Type : CAPWAP_MSGELE_DISCOVERY_TYPE, Length 1
    *spamApTask4: Feb 04 06:01:30.082:              Discovery Type : CAPWAP_DISCOVERY_TYPE_UNKNOWN
    *spamApTask4: Feb 04 06:01:30.082:   
    *spamApTask4: Feb 04 06:01:30.082:       Type : CAPWAP_MSGELE_WTP_BOARD_DATA, Length 62
    *spamApTask4: Feb 04 06:01:30.083:              Vendor Identifier      : 0x00409600
    *spamApTask4: Feb 04 06:01:30.083:              WTP_SERIAL_NUMBER : AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_WTP_DESCRIPTOR, Length 40
    *spamApTask4: Feb 04 06:01:30.083:              Maximum Radios Supported  : 2
    *spamApTask4: Feb 04 06:01:30.083:              Radios in Use             : 2
    *spamApTask4: Feb 04 06:01:30.083:              Encryption Capabilities   : 0x00 0x01
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_WTP_FRAME_TUNNEL, Length 1
    *spamApTask4: Feb 04 06:01:30.083:              WTP Frame Tunnel Mode : NATIVE_FRAME_TUNNEL_MODE
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_WTP_MAC_TYPE, Length 1
    *spamApTask4: Feb 04 06:01:30.083:              WTP Mac Type  : SPLIT_MAC
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 10
    *spamApTask4: Feb 04 06:01:30.083:              Vendor Identifier  : 0x00409600
    *spamApTask4: Feb 04 06:01:30.083: 
            IE            :   UNKNOWN IE 207
    *spamApTask4: Feb 04 06:01:30.083:      IE Length     :   4
    *spamApTask4: Feb 04 06:01:30.083:      Decode routine not available, Printing Hex Dump
    *spamApTask4: Feb 04 06:01:30.083: 00000000: 03 00 00 01                                       ....
    *spamApTask4: Feb 04 06:01:30.083:   
    *spamApTask4: Feb 04 06:01:30.083:       Type : CAPWAP_MSGELE_VENDOR_SPECIFIC_PAYLOAD, Length 12
    *spamApTask4: Feb 04 06:01:30.083:              Vendor Identifier  : 0x00409600
    *spamApTask4: Feb 04 06:01:30.083: 
            IE            :   RAD_NAME_PAYLOAD
    *spamApTask4: Feb 04 06:01:30.083:      IE Length     :   6
    *spamApTask4: Feb 04 06:01:30.083:      Rad  Name     :   
    *spamApTask4: Feb 04 06:01:30.083: CEO_AP
    *spamApTask4: Feb 04 06:01:30.083: <<<<  End of CAPWAP Packet  >>>>
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Request from 10.192.200.93:26711
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 ApModel: AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0
    *spamApTask4: Feb 04 06:01:30.083: apModel: AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083: apType = 26 apModel: AIR-CAP2602E-I-K9
    *spamApTask4: Feb 04 06:01:30.083: apType: Ox1a bundleApImageVer: 8.0.110.0
    *spamApTask4: Feb 04 06:01:30.083: version:8 release:0 maint:110 build:0
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Response sent to 10.192.200.93 port 26711
    *spamApTask4: Feb 04 06:01:30.083: dc:a5:f4:8c:ff:30 Discovery Response sent to 10.192.200.93:26711
    Please any help.

    dear
    yes  the wlc  2504  is 8.0.110 but because its damaged i replaced it with  new vWLC v 8.0.110.
    also i can not put the LAP in flexconnect until its joint.

  • Converted 1140 AP can't join the WLC 5508

    Hello! Please, help me to sort my problem out.
    We have bought autonomous APs   AIR-AP1141N-E-K9 and converted them to the lightweight mode, but they cannot join the WLC 5508. The errors are below. There were NO problems with the LAPs that were bought before, together with the WLC.
    AP's IP: 172.22.90.27   IOS version  12.4
    WLC's IP: 172.22.90.20   IOS version 6.0.188.0
    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    This Discussion has been converted into document:- https://supportforums.cisco.com/docs/DOC-23054
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    logs from the AP:
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:06.044: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.045: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Oct 13 21:37:06.046: bsnInitRcbSlot: slot 1 has NO radio
    *Oct 13 21:37:06.056: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to a
    dministratively down
    *Oct 13 21:37:06.066: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to r
    eset
    *Oct 13 21:37:06.098: %LINK-3-UPDOWN: Interface Dot11Radio0, changed state to up
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)
    *Oct 13 21:37:15.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-LWAPP-CONTROLL
    ER
    *Oct 13 21:37:24.060: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROL
    LER
    *Oct 13 21:37:34.060: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.822: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully
    peer_ip: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:34.823: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:34.825: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.823: %CAPWAP-5-SENDJOIN: sending Join Request to 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Contr
    ol Message from 172.22.90.20
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
    *Oct 13 21:38:39.823: %CAPWAP-3-ERRORLOG: Failed to handle capwap control messag
    e from controller
    *Oct 13 21:38:39.824: %CAPWAP-3-ERRORLOG: Failed to process unencrypted capwap p
    acket from 172.22.90.20
    *Oct 13 21:39:33.999: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:39:34.000: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Oct 13 21:38:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_i
    p: 172.22.90.20 peer_port: 5246
    *Oct 13 21:38:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Oct 13 21:38:34.001: %DTLS-5-PEER_DISCONNECT: Peer 172.22.90.20 has closed conn
    ection.
    *Oct 13 21:38:34.001: %DTLS-5-SEND_ALERT: Send WARNING : Close notify Alert to 1
    72.22.90.20:5246
    *Oct 13 21:38:34.001: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination
    *Oct 13 21:38:34.125: %CAPWAP-3-ERRORLOG: Dropping dtls packet since session is
    not established.
    logs from the WLC:
    debug capwap events enable
    *Dec 21 15:02:06.244: 68:bc:0c:63:3d:a0 DTLS keys for Control Plane deleted successfully for AP 172.22.90.27
      *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 DTLS connection closed event receivedserver (172:22:90:20/5246) client (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Entry exists for AP (172:22:90:27/21077)
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 apfSpamProcessStateChangeInSpamContext: Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    *Dec 21 15:02:06.246: 68:bc:0c:63:3d:a0 Deregister LWAPP event for AP 68:bc:0c:63:3d:a0 slot 1
    Ble
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 capwap_ac_platform.c:1223 - Operation State 0 ===> 4
    *Dec 21 15:04:03.194: 68:bc:0c:63:3d:a0 Register LWAPP event for AP 68:bc:0c:63:3d:a0 slot 0
      *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join Version: = 100711424
    *Dec 21 15:05:36.253: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Maximum Msg element len = 93
    debug capwap errors enable
    *Dec 21 16:16:51.879: 68:bc:0c:63:3d:a0 DTLS connection was closed
    *Dec 21 16:17:09.940: 68:bc:0c:63:3d:a0 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 12, joined Aps =5
    debug capwap detail enable
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 packet received of length 281 from 172.22.90.27:21078
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Msg Type = 3 Capwap state = 5
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: Result Code message element len = 8
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 1. 47 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 2. 232 3
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 3. 6 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 4. 12 0
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Descriptor message element len = 48
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 acName = Wi-Fi_Controller
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: AC Name message element len = 68
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: WTP Radio Information message element len = 77
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Join resp: CAPWAP Control IPV4 Address len = 87
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Sending encrypted packet to AP 172:22:90:27 (21078)
    *Dec 21 16:21:49.961: 68:bc:0c:63:3d:a0 Releasing WTP
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 CAPWAP Control Msg Received from 172.22.90.27:21077
    *Dec 21 16:24:12.212: 68:bc:0c:63:3d:a0 DTLS connection 0x167c8b20 closed by controller
    *Dec 21 16:24:12.212: DTL Deleting AP 9 - 0.0.0.0
    *Dec 21 16:24:12.214: CAPWAP DTLS connection closed msg
    *Dec 21 16:24:12.216: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.216: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.218: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.220: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.222: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.224: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.226: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(0)
    *Dec 21 16:24:12.228: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'mfpSendEventReport+168' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.228: Received SPAM_MFP_RADIO_DOWN message
    *Dec 21 16:24:12.230: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'l2roamInit+560' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.232: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamCallbackInSpamContext+1224' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.234: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'apfSpamSendBlackListTable+376' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.236: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'rrmIappSendChdPacket+2320' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Sending LWAPP Event DeReg to 'asTrackInitTask+19360' for AP 68:bc:0c:63:3d:a0(1)
    *Dec 21 16:24:12.238: 68:bc:0c:63:3d:a0 Deleting and removing AP 68:bc:0c:63:3d:a0 from fast path
    P.S. The time is set to the WLC with the NTP
    P.P.S. Don't lookup at the time the logs were made - they were made not during the same day/time

    I have solved this as soon as published my problem!!!
    the answer is published here:
    https://supportforums.cisco.com/thread/2004491
    especially in the post of Matthew Fowler
    Hi,
    Please take a look at CSCte01087.
    I see that your WLC is 10.0.13.5 and your AP is 10.0.13.28/24 so they are on the same subnet. I also see your AP MAC address does not begin with 00. This is why I believe it is relevant.
    Please try the workaround or open a TAC case if you need a fix.
    -Matt
    Symptom:
    An access point running 6.0.188.0 code may be unable to join a WLC5508.
    Messages similar to the following will be seen on the AP.
       %CAPWAP-3-ERRORLOG: Invalid AC Message Type 4.
       %CAPWAP-3-ERRORLOG: Unencrypted non-discovery CAPWAP Control Message
    Conditions:
    At least one of the following conditions pertains:
    - The high order byte of the AP's MAC address is nonzero, and the AP is in
    the same subnet as the WLC5508's management (or AP manager) interface
    - The WLC's management (or AP manager) interface's default gateway's
    MAC address' high order byte is nonzero.
    Workaround:
    If the MAC address of the WLC's default gateway does not begin with 00,
    and if all of the APs' MAC addresses begin with 00, then: you can put
    the APs into the same subnet as the WLC's management (or AP manager)
    interface.
    In the general case, for the situation where the WLC's default gateway's
    MAC does not begin with 00, you can address this by changing it to begin
    with 00. Some methods for doing this include:
    -- use the "mac-address" command on the gateway, to set a MAC address
    that begins with 00
    -- then enable HSRP on the gateway (standby ip ww.xx.yy.zz) and use this
    IP as the WLC's gateway.
    For the case where the APs' MAC addresses do not begin with 00, then make
    sure that they are *not* in the same subnet as the WLC's management
    (AP manager) interface, but are behind a router.
    Another workaround is to downgrade to 6.0.182.0.  However, after
    downgrading the WLC to 6.0.182.0, any APs that have 6.0.188.0 IOS
    (i.e. 12.4(21a)JA2) still installed on them will be unable to join.
    Therefore, after downgrading the WLC, the APs will need to have a
    pre-12.4(21a)JA2 rcvk9w8 or k9w8 image installed on them.
    different vlan!!!! yes! thank you Matthew Fowler sooooo much!!!!

  • AP(2720e) not joining a WLC (2504)

    I recently purchased two 2702e AP's to expand the wireless coverage of our network but when I plug them in, they will not join the AP for some reason.
    This is what I am getting on the controller;
    (Cisco Controller) >show ap join stats detailed f44e0544e944
    Discovery phase statistics
    - Discovery requests received.............................. 51
    - Successful discovery responses sent...................... 26
    - Unsuccessful discovery request processing................ 0
    - Reason for last unsuccessful discovery attempt........... Not applicable
    - Time at last successful discovery attempt................ Dec 08 10:24:37.695
    - Time at last unsuccessful discovery attempt.............. Not applicable
    Join phase statistics
    - Join requests received................................... 0
    - Successful join responses sent........................... 0
    - Unsuccessful join request processing..................... 0
    - Reason for last unsuccessful join attempt................ Not applicable
    - Time at last successful join attempt..................... Not applicable
    - Time at last unsuccessful join attempt................... Not applicable
    Configuration phase statistics
    - Configuration requests received.......................... 0
    - Successful configuration responses sent.................. 0
    - Unsuccessful configuration request processing............ 0
    - Reason for last unsuccessful configuration attempt....... Not applicable
    --More-- or (q)uit
    - Time at last successful configuration attempt............ Not applicable
    - Time at last unsuccessful configuration attempt.......... Not applicable
    Last AP message decryption failure details
    - Reason for last message decryption failure............... Not applicable
    Last AP disconnect details
    - Reason for last AP connection failure.................... Not applicable
    - Last AP disconnect reason................................ Not applicable
    Last join error summary
    - Type of error that occurred last......................... None
    - Reason for error that occurred last...................... Not applicable
    - Time at which the last join error occurred............... Not applicable
    AP disconnect details
    - Reason for last AP connection failure.................... Not applicable
    I have tried it with just the default settings and by setting the IP on the AP to no avail.
    Any suggestion would be much appreciated.
    Eric

    Hi Eric,
    What software code is running on your 2504 ? I hope it is 7.6.130.0
    If it is 8.0.100.0, then there was a crtical bug given below, you need to check whether you hitting this
    https://tools.cisco.com/bugsearch/bug/CSCur43050
    Conditions:
    Seen only with APs that were manufactured in August, September or October, 2014 - all Aironet APs were affected EXCEPT the 700 series. Seen with WLCs running 8.0.100.0 or an 8.0.100.x special.
    If the WLC was manufactured in September 2014, or later (i.e. has a SHA2 MIC), then the first symptom is seen, i.e. the AP joins the 8.0.100 WLC, downloads the image, but then fails to rejoin.
    If the WLC was manufactured before September 2014 (i.e. does not have a SHA2 MIC), then the second symptom is seen, i.e. the AP can join the 8.0.100 WLC OK, but then will fail download during a subsequent upgrade.
    Also seen with new APs trying to join a controller running IOS-XE 3.6.0 (15.3(3)JN k9w8 image.) (Track CSCur50946 for the IOS-XE fix)
    Workaround:
    Downgrade to AireOS 7.6.130.0, or to IOS-XE 3.3, if the APs are supported in the earlier code
    Pls attach  AP console output while trying to boot & register to see the exact reason for failure.
    HTH
    Rasika
    **** Pls rate all useful responses ****

  • How many APs Can I join a WLC 4402 and WiSM?

    I have a WLC with 20 APs joined into the same management VLAN and
    I'll deploy other campus with 240 APs and 2 WiSMs Blade.
    Is there any recomendation about how many APs Can I put on the same management VLAN?
    thanks a lot

    Cisco recommends 60 - 100 access points per vlan. Attached is the best pratices document
    https://cisco.hosted.jivesoftware.com/docs/DOC-4204

  • About max local MAC filtering can be register in WLC 2504 and 5508

    Hi all
    My customer is considering to use WLC with MAC filtering feature (use local database not external Radius). So they are concerning about maximum local MAC filtering entries that can be register on WLC2504 and WLC5508 to buy (the number of APs is about 20, but the MAC is more than 200)
    I tried to search, but I could not find any specs mention it. If anyone knows, please help to answer
    Rgds

    I looked at this before. I want to say its maxed at 2048 regardless of the model ..
    http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/91901-mac-filters-wlcs-config.html

  • Cisco2602 are unable or very hard to join 5508 wlc

    This is not happened to one AP,  all AP has the same issue,  it takes long time to join and sometimes it can't join this wlc.   Here is the debug info from wlc:
    *spamApTask2: Jun 25 08:15:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:16.170: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:26.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.166: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:26.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:26.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:36.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:36.167: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:36.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:36.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask3: Jun 25 08:15:39.444: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.8.53:61854
    *spamApTask2: Jun 25 08:15:46.166: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:46.167: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:46.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:46.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:46.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:56.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:56.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:15:56.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:15:56.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:15:56.170: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:06.167: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:06.167: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:06.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:06.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:16.168: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.168: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 WTP already released
    *spamApTask2: Jun 25 08:16:16.169: 00:10:db:ff:10:00 CAPWAP Control Msg Received from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 packet received of length 190 from 10.108.48.44:62126
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Msg Type = 1 Capwap state = 0
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 20
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 161
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 62 msgEleType = 38
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 95
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 40 msgEleType = 39
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 51
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 41
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 46
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 1 msgEleType = 44
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 41
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 msgEleLength = 10 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.169: 6c:99:89:b0:0f:20 Total msgEleLen = 27
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 msgEleLength = 23 msgEleType = 37
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Vendor specific payload from AP  6C:99:89:B0:0F:20 validated
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Total msgEleLen = 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 1. 0 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 2. 232 3
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 3. 0 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 4. 100 0
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: AC Descriptor message element len = 40
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 acName = pvg01-rpi-wlc1
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp:AC Name message element length = 58
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: WTP Radio Information msg length = 67
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: CAPWAP Control IPV4 Address len = 77
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Mwar type payload len = 88
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 Discovery resp: Time sync payload len = 103
    *spamApTask2: Jun 25 08:16:16.170: 6c:99:89:b0:0f:20 WTP already released

    Thanks Salodh.  The issue is not fixed follow the link you provide.
    Some debug error message from AP:
    *Jul  2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
    *Jul  2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 2.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Attempting to join next controller
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Go Join the next controller
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
    *Jul  2 04:13:22.135: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2176 Max retransmission count reached!
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed
    *Jul  2 04:13:51.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.109.118.16:5246
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.
    *Jul  2 04:13:51.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.
    *Jul  2 04:13:52.039: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Jul  2 04:13:52.059: Starting Ethernet promiscuous mode
    *Jul  2 04:13:52.063: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.
    *Jul  2 04:13:52.063: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Calling wtpGetAcToJoin from timer expiry.
    *Jul  2 04:14:02.067: %CAPWAP-3-ERRORLOG: Selected MWAR 'pvg01-rpi-wlc1'(index 0).
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Selected MWAR 'pvg01-rpi-wlc1' (index 0).
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Ap mgr count=1
    *Jul  2 04:14:02.067: %CAPWAP-3-ERRORLOG: Go join a capwap controller
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG:  Adding Ipv4 AP manager 10.109.118.16 to least load
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 10.109.118.16, load = 5..
    *Jul  2 04:14:02.067: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.
    *Jul  2 04:15:02.000: %CAPWAP-3-EVENTLOG: Setting time to 04:15:02 UTC Jul 2 2014
    *Jul  2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: version=117861888
    *Jul  2 04:15:07.479: %CAPWAP-3-EVENTLOG: Join request: hasMaximum Message Payload
    *Jul  2 04:15:07.479: %CAPWAP-5-SENDJOIN: sending Join Request to 10.109.118.16
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: Join Response from 10.109.118.16
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: Starting Post Join timer
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Image Data.
    *Jul  2 04:15:07.483: %CAPWAP-3-EVENTLOG: CAPWAP State: Configure.
    *Jul  2 04:15:07.507: %CAPWAP-3-EVENTLOG: reboot reason flag 17
    *Jul  2 04:15:07.551: Starting Ethernet promiscuous mode
    *Jul  2 04:15:07.551: %CAPWAP-3-EVENTLOG: ap sw version 15.2(4)JB4$
    *Jul  2 04:15:07.627: Flex Non AP-Specific config version mismatch. Clearing it! Current Version 7.6.110.0, stored file version 7.4.121.0
    *Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Resetting reTransmissionCnt to 0
    *Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Queue Empty.
    *Jul  2 04:15:07.691: %CAPWAP-3-EVENTLOG: Configuration Status Response from 10.109.118.16
    *Jul  2 04:15:07.783: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:08.795: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:08.803: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:09.747: %CAPWAP-3-EVENTLOG: LRAD state down. Skip sending PHY_TX_POWER_LEVEL_PAYLOAD
    *Jul  2 04:15:09.947: %CAPWAP-3-EVENTLOG: Sending packet to AC
    *Jul  2 04:15:10.143: %LWAPP-4-CLIENTEVENTLOG: OfficeExtend Localssid saved in AP flash
    *Jul  2 04:15:10.147: %CAPWAP-3-EVENTLOG: testWmmAC configuration is 0
    *Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
    *Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP State: Run.
    *Jul  2 04:15:10.851: %CAPWAP-3-EVENTLOG: CAPWAP moved to RUN state stopping post join timer
    *Jul  2 04:15:10.855: %CAPWAP-3-EVENTLOG: CAPWAP parameters plumbing to forwarding plane succeeded
    *Jul  2 04:15:10.855: %CAPWAP-3-EVENTLOG: Send channel power and PhyTxPowerLevel message sent to10:109:118:16

  • AP1121 can'T join WLC 2504

    Hi there,
    It's me again... same devices which making trouble.
    I have an allready configured WLC 2504 running in the network. Every LAP i add to the network joins imidiatly to the Controller.
    But not the AP1121G AP.
    It fails the Handshake everytime and the Controller shows me an failmessage at the statistics in the GUI.
    GUI Message:
    RADIUS authorization is pending for the AP
    CLI Debug:
    *spamApTask0: May 23 17:29:18.258: 00:11:20:6e:2b:14 Allocated index from main list, Index: 16
    *spamApTask0: May 23 17:29:18.259: 00:11:20:6e:2b:14 DTLS keys for Control Plane are plumbed successfully for AP 192.168.1.100. Index 17
    *spamApTask0: May 23 17:29:18.259: 00:11:20:6e:2b:14 DTLS Session established server (192.168.1.10:5246), client (192.168.1.100:1716)
    *spamApTask0: May 23 17:29:18.260: 00:11:20:6e:2b:14 Starting wait join timer for AP: 192.168.1.100:1716
    *spamApTask0: May 23 17:29:18.263: 00:11:20:6e:2b:14 Join Request from 192.168.1.100:1716
    *spamApTask0: May 23 17:29:18.264: 00:11:20:6e:2b:14 Deleting AP entry 192.168.1.100:1716 from temporary database.
    *spamApTask0: May 23 17:29:18.264: 00:11:20:6e:2b:14 AP with same name AP0011.206e.2b14 exist. Using default name AP0011.206e.2b14 for this AP.
    *spamApTask0: May 23 17:29:18.265: 00:11:20:6e:2b:14 In AAA state 'Idle' for AP 00:11:20:6e:2b:14
    *spamApTask0: May 23 17:29:18.266: 00:11:20:6e:2b:14 State machine handler: Failed to process  msg type = 3 state = 0 from 192.168.1.100:1716
    *spamApTask0: May 23 17:29:18.267: 00:11:20:6e:2b:14 Failed to parse CAPWAP packet from 192.168.1.100:1716
    *spamApTask0: May 23 17:29:18.267:
    *spamApTask0: May 23 17:29:18.267: 00:11:20:6e:2b:14 Finding DTLS connection to delete for AP (192.168.1.100/1716)
    *spamApTask0: May 23 17:29:18.268: 00:11:20:6e:2b:14 Disconnecting DTLS Capwap-Ctrl session 0x1458bd60 for AP (192.168.1.100/1716)
    *spamApTask0: May 23 17:29:18.268: 00:11:20:6e:2b:14 CAPWAP State: Dtls tear down
    *spamApTask0: May 23 17:29:18.268: 00:11:20:6e:2b:14 DTLS keys for Control Plane deleted successfully for AP 192.168.1.100
    *spamApTask0: May 23 17:29:18.270: 00:11:20:6e:2b:14 DTLS connection closed event receivedserver (172:16:58:250/5246) client (192.168.1.100/1716)
    *spamApTask0: May 23 17:29:18.270: 00:11:20:6e:2b:14 Entry exists for AP (192.168.1.100/1716)
    *spamApTask0: May 23 17:29:18.272: 00:11:20:6e:2b:14 No AP entry exist in temporary database for 192.168.1.100:1716
    *spamApTask0: May 23 17:29:18.272: 00:11:20:6e:2b:14 Discarding non-ClientHello Handshake OR DTLS encrypted packet from  192.168.1.100:1716)since DTLS session is not established
    *spamApTask0: May 23 17:29:18.277: 00:11:20:6e:2b:14 Received LWAPP JOIN REQUEST from AP 00:11:20:6e:2b:14 to 84:78:ac:b3:73:c0 on port '1'
    *spamApTask0: May 23 17:29:18.278: 00:11:20:6e:2b:14 incomingRadJoinPriority = 1

    Problem solved
    Hey guys, i solved the problem. It wasn't the firmwareversion. I downgraded the WLC and the problem still exists.
    Problem reason: The AP1121G series doesn't  has a MIC - Manufactured Installed Certificate - which is compatible/ accpeted by the WLC 2504 and it's parameters for the RADIUS server. Maybe it has no MIC, i don't know.
    So you need the SSC - Self Signed Certificate - for the join authentication.
    Solution:
    1. Logon to GUI or CLI of the WLC.
    2. Enable "Accpet Self Signed Certificate"
              GUI: Security > AP policy
              CLI: (Cisco Controller) >config auth-list ap-policy ssc enable
    3. Look for the SSC Hash of the AP:
              CLI: (Cisco Controller) >debug CAPWAP events enable
              There you'll find an event which is called e.g.:
         Mon May 22 06:34:14 2006: sshpmGetIssuerHandles: SSC Key Hash is 9e4ddd8dfcdd8458ba7b273fc37284b31a384eb9
    4.Add the ap manually to the controller
              GUI Security> AP policy > Add               There you have to set the right parameters, ap MAC, Cert. type: "SSC"           and the Key.
              CLI:    
              (Cisco Controller) >config auth-list add ssc 00:0e:84:32:04:f09e4ddd8dfcdd8458ba7b273fc37284b31a384eb9
    5. Maybe you should reboot the ap.
    And it's done

  • Why LAP1131AG and LAP11412 cannot to join WLC 2504?

    I have WLC 2504, Cisco LAP1131AG and then Cisco LAP1142N. Why LAP1131AG and LAP11412 cannot to join WLC 2504?
    this is error code at the Cisco LAP1131AG
    *Sep 12 19:30:27.730: %CAPWAP-3-ERRORLOG: Go join a capwap controller 
    *Sep 12 19:30:27.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.100.10 peer_port: 5246
    *Sep 12 19:30:57.001: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2051 Max retransmission count reached!
    *Sep 12 19:31:27.000: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.100.10:5246
    *Sep 12 19:31:32.083: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to administratively down
    *Sep 12 19:31:32.083: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to administratively down
    *Sep 12 19:31:32.085: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Sep 12 19:31:32.117: %CAPWAP-3-ERRORLOG: Not sending discovery request AP does not have an Ip !! 
    *Sep 12 19:31:32.118: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
    *Sep 12 19:31:33.083: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
    *Sep 12 19:31:33.112: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
    *Sep 12 19:31:33.117: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Sep 12 19:31:34.104: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
    *Sep 12 19:31:34.111: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Sep 12 19:31:34.142: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
    *Sep 12 19:31:34.147: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
    *Sep 12 19:31:34.152: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
    *Sep 12 19:31:35.141: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
    *Sep 12 19:31:35.146: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
    *Sep 12 19:31:35.170: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
    *Sep 12 19:31:36.171: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
    this is version LAP1131AG
    AP0018.18fc.fd58#sh version 
    Cisco IOS Software, C1130 Software (C1130-K9W8-M), Version 12.4(25e)JAO6, RELEASE SOFTWARE (fc1)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2014 by Cisco Systems, Inc.
    Compiled Fri 22-Aug-14 10:07 by prod_rel_team
    ROM: Bootstrap program is C1130 boot loader
    BOOTLDR: C1130 Boot Loader (C1130-BOOT-M) Version 12.3(7)JA1, RELEASE SOFTWARE (fc1)
    AP0018.18fc.fd58 uptime is 9 minutes
    System returned to ROM by power-on
    System image file is "flash:/c1130-k9w8-mx.124-25e.JAO6/c1130-k9w8-mx.124-25e.JAO6"
    and then this is version WLC2504
    (Cisco Controller) >show sysinfo 
    Manufacturer's Name.............................. Cisco Systems Inc.
    Product Name..................................... Cisco Controller
    Product Version.................................. 7.6.130.0
    Bootloader Version............................... 1.0.20
    Field Recovery Image Version..................... 7.6.101.1
    Firmware Version................................. PIC 16.0
    Build Type....................................... DATA + WPS
    System Name...................................... Cisco_47:19:c4
    System Location.................................. 
    System Contact................................... 
    System ObjectID.................................. 1.3.6.1.4.1.9.1.1279
    IP Address....................................... 192.168.100.10
    Last Reset....................................... Software reset
    System Up Time................................... 0 days 0 hrs 36 mins 45 secs
    System Timezone Location......................... 
    System Stats Realtime Interval................... 5
    System Stats Normal Interval..................... 180
    --More-- or (q)uit
    Configured Country............................... ID  - Indonesia
    Operating Environment............................ Commercial (0 to 40 C)
    Internal Temp Alarm Limits....................... 0 to 65 C
    Internal Temperature............................. +34 C
    External Temperature............................. +40 C
    Fan Status....................................... 4100 rpm
    State of 802.11b Network......................... Enabled
    State of 802.11a Network......................... Enabled
    Number of WLANs.................................. 1
    Number of Active Clients......................... 0
    Burned-in MAC Address............................ 24:E9:B3:47:19:C0
    Maximum number of APs supported.................. 5
    IP Address management WLC : 192.168.100.10/24
    IP Address LAP1142N :192.168.100.102/24
    IP Address LAP1131AG : 192.168.100.101/24
    Can anyone help my problem?

    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected]
    cisco AIR-LAP1142N-A-K9 (PowerPC405ex) processor (revision A0) with 90102K/40960K bytes of memory.
    Processor board ID FGL1439S15W
    PowerPC405ex CPU at 586MHz, revision number 0x147E
    Last reset from reload
    LWAPP image version 7.6.130.0
    1 Gigabit Ethernet interface
    2 802.11 Radios
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: C8:4C:75:79:EB:E9
    Part Number                          : 73-12836-03
    PCA Assembly Number                  : 800-33767-03
    PCA Revision Number                  : A0
    PCB Serial Number                    : FOC14234D8Z
    Top Assembly Part Number             : 800-33775-02
    Top Assembly Serial Number           : FGL1439S15W
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-LAP1142N-A-K9  
    cisco AIR-LAP1131AG-A-K9 (PowerPCElvis) processor (revision A0) with 27638K/5120K bytes of memory.
    Processor board ID FTX1026T46E
    PowerPCElvis CPU at 262Mhz, revision number 0x0950
    Last reset from power-on
    LWAPP image version 7.6.130.0
    1 FastEthernet interface
    2 802.11 Radio(s)
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: 00:18:18:FC:FD:58
    Part Number                          : 73-8962-09
    PCA Assembly Number                  : 800-24818-08
    PCA Revision Number                  : A0
    PCB Serial Number                    : FOC102513DE
    Top Assembly Part Number             : 800-25544-06
    Top Assembly Serial Number           : FTX1026T46E
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-LAP1131AG-A-K9  
    Configuration register is 0xF

  • WLC 2504 - Ap join fails with "Unknown AP type. Using Controller Version!!!"

    Hi,
    I haven't encountered this problem before. On my WLC 2504 I've tried now software versions 8.0.100.0, 7.6.130.0 and 7.4.121.0 (as per recommendation from other supportforum-posts), but still get this debug error when I'm trying to join ap models 1142 and 2602:
    (Cisco Controller) >debug capwap errors enable 
    (Cisco Controller) >*spamApTask5: Jan 02 02:11:46.549: Unknown AP type. Using Controller Version!!!
    *spamApTask0: Jan 02 02:11:46.550: 88:43:e1:78:10:08 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 5,joined Aps =0
    *spamApTask5: Jan 02 02:11:56.670: f8:66:f2:14:4e:c1 Deleting AP 10.68.254.101 which has not been plumbed
    *spamApTask5: Jan 02 02:11:56.673: f8:66:f2:14:4e:c1 DTLS connection was closed
    (Cisco Controller) >
    Does anyone know what is failing here? Surely the ap's should be "known" in these software versions? 
    Best
    Bent Eskil

    Hi I have the same issue, today i rebooted the controller after that no Access Point is joining the controller.  While debug i can see same logs as given above. I have configured option 43 and 60 as well on cisco switch. Pool commands are:
    ip dhcp pool Room-1
     host 192.168.30.113 255.255.255.0
     client-identifier 0188.1dfc.f7cb.30
     default-router 192.168.30.3
     domain-name mina.local
     option 43 hex f108.aca8.1e68
     dns-server 192.168.30.1 4.2.2.2
     option 60 ascii "Cisco AP c3702
    I have checked the time and country code all fine but still Access point are not joining. Can you help me out to figure out the issue.
    Thanks

  • I can't join LAP to WLC 5508 in difference subnet

    i can't join LAP to WLC in difference subnet now i create 2 interface [management / ap-manager]
    management : 192.168.1.1 / 24
    ap-manager : 192.168.1.2 / 24 vlan 10
    ap-manager2 : 192.168.2.2 / 24 vlan 11
    ap-manager3 : 192.168.3.2 / 24 vlan 12
    connect with core switch 3 interface [access port vlan same wlc]
    or how create wlc interface for join with LAP please advise me or send capture screen for me to create all interface
    Thank you for best support.

    I created a video actually how to configure option 43 on my site.
    http://www.my80211.com/cisco-wlc-labs/2009/7/4/cisco-dhcp-option-43-configuration-nugget.html
    So when you fire up an AP it goes through a few steps to find the controller.
    1) It does a broadcast and if your APs are on the same VLAN as your apmangers/managment then she will connect
    2) If it isnt on the sanme vlan it will attempt to reslove CISCO-LWAPP-CONTROLLER or CISCO-CAPWAP-CONTROLLER. This is where you would need to create an A-record in your DNS server and reslove it to your MANAGEMENT controller IP address
    3) Also Option43. When your AP gets an IP address, you can add option 43 to the scope. Option 43 again tells the AP where to find the controller.
    Now you can do a manual prime to these as well. Extend your managment vlan to a switch and have the APs join. Once they take the download and config they will know the controllers ip address. And then you can deploy them on different vlans and they will join ...
    Does this make sense?

  • WLC 2504 can't change WAP name or switch off CDP via WLC gui

    Hi All,
    Please can you assist? I have 1 x Cisco WLC 2504 & 2 x Cisco WAP AIR-CAP1602I-E-K9 running 7.4.100.60.
    All three devices are installed and working correcty within a corporate environment. However, there are a few tweaks that I would like to do, to tidy up the configuration and switch certain elements on or off. For example, my core networking hardware is Huawei and I would like to switch off 'CDP' on the WAP's as the associated error messages are filling up my logging buffer on my switch. So, I https to my WLC, locate the WAP in question, goto 'interfaces' and untick the box for 'CDP state' hit apply, then I get the following error message "controller name is mandatory when controller ip address is configured" and then the tick reappears!
    At present I have two WAP's. Both have static IP addresses and both are reachable on the network. The one WAP did allow me to change the name to something meaningful, but the other WAP would not let me and still has the default MAC address as its name. I have the same issue, when I try to change the name on the WAP it says "controller name is mandatory when controller ip address is configured"
    I have also tried to CLI directly in to the WAP to make these alterations, but as soon as i launch 'putty' it quits out. I guess this is locked down once the WAP's associate with the WLC.
    And around I go.... Someone must have been in this situation, what am i missing? Thanks in advance!

    Hi Andy,
    By default SSH & Telnet is disabled for WLC controlled APs. So you have to enable it first via WLC GUI in order to access the AP via telnet or SSH.
    Wireless -> Select your AP -> Advanced -> Tick Telnet/SSH boxes.
    If you could not change AP name via WLC GUI (it may be a bug), but as I said earlier try to change it via WLC CLI (not AP CLI itself). SSH  to your WLC & then try the following.Old AP name is the one with its mac address.
    (WLC) >config ap name
    (WLC) >save config      
    Are you sure you want to save? (y/n) y
    Configuration Saved
    HTH
    Rasika
    *** Pls rate all useful responses ****

  • LWAP AP not join a WLC

    Hi all,
    I have a  Cisco 2500 series Wirless Controller and AP : AIR-LAP1310G-E-K9 with can't join a cisco controller, when i looked at the Log file for WLC i found this message : 
    AP Disassociated. Base Radio MAC:1c:df:0f:cf:da:88.
     So when i did this on the controller  ( command) : debug capwap errors enable
      This appear : 
    *spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Received LWAPP DISCOVERY REQUEST to ff:ff:ff:ff:ff:ff on port '1'
    *spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 15,joined Aps =3
    *spamApTask0: Jan 20 14:45:25.849: 1c:df:0f:cf:da:88 Successful transmission of LWAPP Discovery Response to AP 1c:df:0f:cf:da:88 on port 1
    *spamApTask0: Jan 20 14:45:36.851: 1c:df:0f:cf:da:88 Received LWAPP JOIN REQUEST from AP 1c:df:0f:cf:da:88 to 68:86:a7:36:37:00 on port '1'
    *spamApTask0: Jan 20 14:45:36.851: Could not find BoardDataPayload
    *spamApTask0: Jan 20 14:45:36.865: 1c:df:0f:cf:da:88 AP AP_BEJ: txNonce  00:00:00:00:00:00 rxNonce  00:00:00:00:00:00
    *spamApTask0: Jan 20 14:45:36.865: 1c:df:0f:cf:da:88 LWAPP Join Request MTU path from AP 1c:df:0f:cf:da:88 is 1500, remote debug mode is 0
    *spamApTask0: Jan 20 14:45:37.048: 1c:df:0f:cf:da:88 Successful transmission of LWAPP Join Reply to AP 1c:df:0f:cf:da:88
    *spamApTask0: Jan 20 14:45:37.049: 1c:df:0f:cf:da:88 spam_lrad.c:2080 - Operation State 0 ===> 4
    *spamApTask0: Jan 20 14:45:38.231: 1c:df:0f:cf:da:88 Received LWAPP IMAGE_DATA from AP 1c:df:0f:cf:da:88
    *spamApTask0: Jan 20 14:45:38.232: 1c:df:0f:cf:da:88 Refusing image download to AP 1c:df:0f:cf:da:88 - unable to open image file /bsn/ap//c1310
           Error:No such file or directory(2)
    Please help ?

    Hi George Stefanick ,
    the problème is : i want to convert it to autonomous so  to do , it must to plug the AP with the WLC , and in the CLI for WLC : tape this command  : o this 
    config ap tftp-downgrade tftp-server-ip-address filename access-point-name
    Refer to this link :  http://www.cisco.com/c/en/us/td/docs/wireless/controller/3-2/configuration/guide/ccfig32/c32lwap.html.
    but the WLC dont support the AP 1300 series , so please how to convert this AP  to autonomos ? 

  • AP 1552E NOT JOINING WLC 2504

    Hello,
    I am currently having issue relating to my AP not joining the WLC. Have made the WLC the internal DHCP server and the AP has picked an IP Address but the below is what i get from the AP:
    *Feb 14 22:48:56.707: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Feb 14 22:48:56.759: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Feb 14 22:48:56.783:  status of voice_diag_test from WLC is false
    *Feb 14 22:49:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:12.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Feb 14 22:49:12.663: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:12.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:12.663: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Feb 14 22:49:17.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:17.663: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.2
    *Feb 14 22:49:17.663: %DTLS-5-PEER_DISCONNECT: Peer 192.168.1.2 has closed connection.
    *Feb 14 22:49:17.663: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.2:5246
    *Feb 14 22:49:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:12.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Feb 14 22:49:12.663: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:12.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:12.663: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    % CDP is not supported on this interface, or for this encapsulation
    *Feb 14 22:49:17.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:17.663: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.2
    *Feb 14 22:49:17.663: %DTLS-5-PEER_DISCONNECT: Peer 192.168.1.2 has closed connection.
    *Feb 14 22:49:17.663: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.2:5246
    *Feb 14 22:49:17.707: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Feb 14 22:49:17.707: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Feb 14 22:49:17.759: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Feb 14 22:49:17.783:  status of voice_diag_test from WLC is false
    *Feb 14 22:49:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Feb 14 22:49:34.663: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:34.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:34.663: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Feb 14 22:49:39.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:39.663: %DTLS-5-ALERT: Received WARNING : Close notify alert from 192.168.1.2
    *Feb 14 22:49:39.663: %DTLS-5-PEER_DISCONNECT: Peer 192.168.1.2 has closed connection.
    *Feb 14 22:49:39.663: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.1.2:5246
    *Feb 14 22:49:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:34.000: %CAPWAP-5-CHANGED: CAPWAP changed state to
    *Feb 14 22:49:34.663: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 192.168.1.2 peer_port: 5246
    *Feb 14 22:49:34.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2
    *Feb 14 22:49:34.663: %CAPWAP-5-CHANGED: CAPWAP changed state to JOIN
    *Feb 14 22:49:38.591: %MESH-3-TIMER_EXPIRED: Mesh Lwapp join timer expired
    *Feb 14 22:49:38.591: %MESH-3-TIMER_EXPIRED: Mesh Lwapp join failed expired
    *Feb 14 22:49:38.591: %MESH-6-LINK_UPDOWN: Mesh station f029.29c2.effc link Down
    *Feb 14 22:49:39.663: %CAPWAP-5-SENDJOIN: sending Join Request to 192.168.1.2

    Platform: AIR-CT2504-K9, Version :
    Manufacturer's Name: Cisco Systems Inc.  Product Name: Cisco Controller  Product Version: 7.0.220.0  RTOS Version: Erro  Bootloader Version: 1.0.18  Build Type: DATA + WPS
    Platform: cisco AIR-CAP1552E-E-K9  Version :
    Cisco IOS Software, C1550 Software (C1520-K9W8-M), Version 12.4(23c)JA3, RELEASE SOFTWARE (fc1)
    Proceeding with system init
    Proceeding to unmask interrupts
    Initializing flashfs...
    flashfs[1]: 22 files, 3 directories
    flashfs[1]: 0 orphaned files, 0 orphaned directories
    flashfs[1]: Total bytes: 31610880
    flashfs[1]: Bytes used: 6631936
    flashfs[1]: Bytes available: 24978944
    flashfs[1]: flashfs fsck took 5 seconds.
    flashfs[1]: Initialization complete.
    flashfs[2]: 0 files, 1 directories
    flashfs[2]: 0 orphaned files, 0 orphaned directories
    flashfs[2]: Total bytes: 5806080
    flashfs[2]: Bytes used: 1024
    flashfs[2]: Bytes available: 5805056
    flashfs[2]: flashfs fsck took 1 seconds.
    flashfs[2]: Initialization complete....done Initializing flashfs.
    Warning:  the compile-time code checksum does not appear to be present.
    Radio0  present 8364B 8000 A8020000 0 A8030000 30
    Radio1  present 8364B 8000 B8020000 0 B8030000 13
    Radio2 not present 0 0 0 0 0 11
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    %Error opening flash:/c1520-rcvk9w8-mx/info (No such file or directory)cisco AIR-CAP1552E-E-K9    (PowerPC 8349) processor (revision A0) with 49142K/16384K bytes of memory.
    Processor board ID FCZ1718H01Y
    PowerPC 8349 CPU at 533Mhz, revision number 0x0031
    Last reset from power loss
    LWAPP image version 7.0.220.0
    4 Gigabit Ethernet interfaces
    2 802.11 Radio(s)
    32K bytes of flash-simulated non-volatile configuration memory.
    Base ethernet MAC Address: F0:29:29:C2:EF:E0
    Part Number                          : 73-13538-02
    PCA Assembly Number                  : 800-31224-01
    PCA Revision Number                  : 03
    PCB Serial Number                    : FOC1705241P
    Top Assembly Part Number             : 800-34853-05
    Top Assembly Serial Number           : FCZ1718H01Y
    Top Revision Number                  : A0
    Product/Model Number                 : AIR-CAP1552E-E-K9
    % Please define a domain-name first.
    Translating "CISCO-LWAPP-CONTROLLER"...domain server (255.255.255.255)
    Press RETURN to get started!
    *Mar  1 00:00:07.307: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed
    *Mar  1 00:00:07.723: m8349_ether_enable: MACCFG1 sync timeout
    *Mar  1 00:00:09.819: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0
    *Mar  1 00:00:09.819: %LINK-3-UPDOWN: Interface Ethernet4, changed state to up
    *Mar  1 00:00:09.819: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to up
    *Mar  1 00:00:09.819: %LINK-3-UPDOWN: Interface GigabitEthernet1, changed state to up
    *Mar  1 00:00:09.819: %LINK-3-UPDOWN: Interface GigabitEthernet2, changed state to up
    *Mar  1 00:00:09.819: %LINK-3-UPDOWN: Interface GigabitEthernet3, changed state to up
    *Mar  1 00:00:11.375: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to down
    *Mar  1 00:00:11.375: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1, changed state to down
    *Mar  1 00:00:11.375: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2, changed state to down
    *Mar  1 00:00:11.375: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3, changed state to down
    *Mar  1 00:00:11.963: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1
    *Mar  1 00:00:12.039: %LWAPP-3-CLIENTEVENTLOG: Read and initialized AP event log (contains, 1024 messages)
    *Mar  1 00:00:12.051: AP identified to be in Fenway/Huck Jr/1240/1130 configuration
    *Mar  1 00:00:12.055:  status of voice_diag_test from WLC is false
    *Mar  1 00:00:14.079: %SYS-5-RESTART: System restarted --
    Cisco IOS Software, C1550 Software (C1520-K9W8-M), Version 12.4(23c)JA3, RELEASE SOFTWARE (fc1)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2011 by Cisco Systems, Inc.
    Compiled Tue 18-Oct-11 15:13 by prod_rel_team
    *Mar  1 00:00:14.079: %SNMP-5-COLDSTART: SNMP agent on host APf029.29c2.efe0 is undergoing a cold start
    *Mar  1 00:00:14.143: %MESH-6-BVI_CREATED: Mesh BVI1 interface created
    *Mar  1 00:00:14.163: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
    *Mar  1 00:00:14.163: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
    *Mar  1 00:00:15.163: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
    *Mar  1 00:00:15.163: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
    *Mar  1 00:00:16.143: %LINK-3-UPDOWN: Interface BVI1, changed state to down
    *Mar  1 00:00:17.139: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitE
    Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)thernet0, changed state to down
    *Mar  1 00:00:17.143: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1, changed state to down
    *Mar  1 00:00:17.143: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet2, changed state to down
    *Mar  1 00:00:17.143: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3, changed state to down
    *Mar  1 00:00:18.579: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet4, changed state to up
    *Mar  1 00:00:20.723: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
    *Mar  1 00:00:32.743: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    *Mar  1 00:00:32.795: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Mar  1 00:00:32.959: %SSH-5-ENABLED: SSH 2.0 has been enabled
    *Mar  1 00:00:33.107: Logging LWAPP message to 255.255.255.255.
    *Mar  1 00:00:33.307: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 started - CLI initiated
    *Mar  1 00:00:46.383: %CDP_PD-2-POWER_LOW: All radios disabled - NEGOTIATED WS-C2960-24PC-S (189c.5d95.2d18)
    Username:
    *Mar  1 00:01:27.119: %MESH-6-ADJACENCY_STATE_MACHINE_STARTED: Mesh adjacency state machine started
    Username:
    *Mar  1 00:01:32.163: %MESH-6-CAPWAP_RESTART: Mesh Capwap re-started
    *Mar  1 00:01:34.119: %LINK-3-UPDOWN: Interface BVI1, changed state to up
    *Mar  1 00:01:35.119: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
    *Mar  1 00:01:37.207: %CAPWAP-5-CHANGED: CAPWAP changed state to DISCOVERY
    % CDP is not supported on this interface, or for this encapsulation
    *Mar  1 00:01:40.887: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255
    *Mar  1 00:01:40.907:  status of voice_diag_test from WLC is false
    *Mar  1 00:01:46.387: %CDP_PD-2-POWER_LOW: All radios disabled - NEGOTIATED WS-C2960-24PC-S (189c.5d95.2d18)
    Regards,
    Obinna Samuel

Maybe you are looking for

  • HT1918 How do I delete credit card info if the none option is not given

    I wish to delete my visa vanilla gift card info because it no longer has any value but when I go to the edit billing info page the none option to break the connection is not given and it tells me I am useing a different device and need to conferm the

  • Help getting my headset/mic to work with my Audigy 2 ZS I/O

    Hi, I have an Audigy 2 ZS Platinum Pro with the external I/O dri've. I am trying to plug my headset/mic into my external I/O dri've, however I can't get the microphone to work. I have used the headset/mic with my other computer without any problems,

  • Problem in displaying the description of item

    Hi, I am working on a report of production order and i want to display the description of the Item but the problem the matnr is stored in ITPO1 AND i am displaying the values of ITPO5 which contains the difference value of qty of Item . To display th

  • Error 23 when trying to restore

    Yesterday my phone just stopped working and said "No Sim" immediately after I had made a phone call.  After turning the phone off and on several times it then told me to connect to ITunes.  I have tried connecting to ITunes but it comes up with an Er

  • Mysql Variable issue

    I am passing a what will soon be my search variable into php from flash. The issue is when I need to search for something that needs to find a string value in quotes it fails. Below is the like field variable declared in flash LikeField = "Model_Prof