<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681864#M129110</link>
    <description>I'm not allowed to make changes outside of maintenance windows I'm afraid.&lt;BR /&gt;&lt;BR /&gt;Doesn't entering this command just set the CAPWAP controller IP address for the AP?&lt;BR /&gt;&lt;BR /&gt;Just trying to understand what adding this command will show us?&lt;BR /&gt;&lt;BR /&gt;Thanks for your assistance as always though &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
    <pubDate>Mon, 06 Aug 2018 09:21:12 GMT</pubDate>
    <dc:creator>PJR_CDF</dc:creator>
    <dc:date>2018-08-06T09:21:12Z</dc:date>
    <item>
      <title>2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681796#M129106</link>
      <description>&lt;P&gt;Updated 5508 WLC from 8.0.152.0 to 8.3.143.0&lt;/P&gt;
&lt;P&gt;WLC updated fine but our APs running 8.0.152.0 would not join the WLC (couldn’t even join it to download its updated software)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;WLC logs below&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:41:25.730: %DTLS-3-PKI_ERROR: openssl_dtls.c:562 PKI initialization error : Certificate initialization failed&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:39.729: %CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:9507 4c:4e:35:03:4b:fb: Failed to create DTLS connection for AP&amp;nbsp; 10.100.0.17 (13504).&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:39.728: %DTLS-3-PKI_ERROR: openssl_dtls.c:562 PKI initialization error : Certificate initialization failed&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:31.729: %CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:9507 4c:4e:35:03:4b:fb: Failed to create DTLS connection for AP&amp;nbsp; 10.100.0.17 (13504).&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:31.728: %DTLS-3-PKI_ERROR: openssl_dtls.c:562 PKI initialization error : Certificate initialization failed&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:27.729: %CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:9507 4c:4e:35:03:4b:fb: Failed to create DTLS connection for AP&amp;nbsp; 10.100.0.17 (13504).&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:27.728: %DTLS-3-PKI_ERROR: openssl_dtls.c:562 PKI initialization error : Certificate initialization failed&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:25.729: %CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:9507 4c:4e:35:03:4b:fb: Failed to create DTLS connection for AP&amp;nbsp; 10.100.0.17 (13504).&lt;/P&gt;
&lt;P&gt;*spamApTask3: Aug 05 13:40:25.728: %DTLS-3-PKI_ERROR: openssl_dtls.c:562 PKI initialization error : Certificate initialization failed&lt;/P&gt;
&lt;P&gt;--------&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;AP logs below&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Feb&amp;nbsp; 4 13:20:14.795: %SSH-5-ENABLED: SSH 2.0 has been enabled&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:14.795: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:15.427: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to down&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:15.643: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:15.843: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:16.843: %SOAP_FIPS-2-SELF_TEST_HW_SUCCESS: HW crypto FIPS self test passed (2-16)&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:16.843: DPAA Initialization Complete&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:16.843: %SYS-3-HARIKARI: Process DPAA INIT top-level routine exited&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:17.847: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:18.863: %LINK-6-UPDOWN: Interface BVI1, changed state to up&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:19.863: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:20.315: Currently running a Release Image&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;validate_sha2_block: Failed to get certificate chain&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*Feb&amp;nbsp; 4 13:20:20.731: Using SHA-1 signed certificate for image signing validation.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:27.075: APAVC: Succeeded to activate all the STILE protocols.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:27.075: APAVC: Registering with CFT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:27.075: APAVC: CFT registration of delete callback succeeded&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:27.075: APAVC: Reattaching&amp;nbsp; Original Buffer pool for system use&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:27.075: Pool-ReAtach: paks 18174 radio17566&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:34.275: AP image integrity check PASSED&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;*Feb&amp;nbsp; 4 13:20:34.387:&amp;nbsp; validate_sha2_block:No SHA2 Block present on this AP.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb &amp;nbsp;4 13:20:34.403: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:34.403: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:44.411: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 0 CLI Request Triggered&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:55.691: %CDP_PD-4-POWER_OK: Full power - NEGOTIATED inline power source&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:56.791: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:57.791: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up&lt;/P&gt;
&lt;P&gt;Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:57.887: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up&lt;/P&gt;
&lt;P&gt;*Feb&amp;nbsp; 4 13:20:58.887: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up&lt;/P&gt;
&lt;P&gt;*Aug&amp;nbsp; 5 13:55:10.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.100.0.9 peer_port: 5246&lt;/P&gt;
&lt;P&gt;*Aug&amp;nbsp; 5 13:55:39.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2214 Max retransmission count reached for Connection 0x6B7919C!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Aug&amp;nbsp; 5 13:56:09.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.100.0.9:5246&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;----------&lt;/P&gt;
&lt;P&gt;I'm guessing the Cert issue relates to the lack of SHA2 block message on our APs?&lt;/P&gt;
&lt;P&gt;---------&lt;/P&gt;
&lt;P&gt;The result of&amp;nbsp;show crypto ca certificates as as below&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 01&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: Signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Root CA M2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Root CA M2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 13:00:18 UTC Nov 12 2012&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 13:00:18 UTC Nov 12 2037&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: Trustpool cisco-m2-root-cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 02&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: Signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Root CA M2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Manufacturing CA SHA2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco&lt;/P&gt;
&lt;P&gt;&amp;nbsp; CRL Distribution Points:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="http://www.cisco.com/security/pki/crl/crcam2.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/crcam2.crl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 13:50:58 UTC Nov 12 2012&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 13:00:17 UTC Nov 12 2037&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: Trustpool Cisco_IOS_M2_MIC_cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 00&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@airespace.com" target="_blank"&gt;e=support@airespace.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=ca&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=none&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=airespace Inc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@airespace.com" target="_blank"&gt;e=support@airespace.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=ca&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=none&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=airespace Inc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 23:38:55 UTC Feb 12 2003&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;end&amp;nbsp;&amp;nbsp; date: 23:38:55 UTC Nov 11 2012&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: airespace-old-root-cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 00&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: Signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@airespace.com" target="_blank"&gt;e=support@airespace.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Airespace Root CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Engineering&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Airespace Inc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@airespace.com" target="_blank"&gt;e=support@airespace.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Airespace Root CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Engineering&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Airespace Inc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 13:41:22 UTC Jul 31 2003&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 13:41:22 UTC Apr 29 2013&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: airespace-new-root-cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 03&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@airespace.com" target="_blank"&gt;e=support@airespace.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Airespace Root CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Engineering&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Airespace Inc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@airespace.com" target="_blank"&gt;e=support@airespace.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Airespace Device CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ou=Engineering&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Airespace Inc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 22:37:13 UTC Apr 28 2005&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 22:37:13 UTC Jan 26 2015&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: airespace-device-root-cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 5FF87B282B54DC8D42A315B568C9ADFF&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: Signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Root CA 2048&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco Systems&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Root CA 2048&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco Systems&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 20:17:12 UTC May 14 2004&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 20:25:42 UTC May 14 2029&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: Trustpool cisco-root-cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 7EAD12810000002375BE&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: General Purpose&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Manufacturing CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco Systems&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name: AP3G2-4c4e35034bfb&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="mailto:e=support@cisco.com" target="_blank"&gt;e=support@cisco.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=AP3G2-4c4e35034bfb&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco Systems&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; l=San Jose&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; st=California&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c=US&lt;/P&gt;
&lt;P&gt;&amp;nbsp; CRL Distribution Points:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="http://www.cisco.com/security/pki/crl/cmca.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/cmca.crl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 20:53:56 UTC Feb 4 2013&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 21:03:56 UTC Feb 4 2023&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: Cisco_IOS_MIC_cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CA Certificate&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Status: Available&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Serial Number (hex): 6A6967B3000000000003&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Certificate Usage: Signature&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Issuer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Root CA 2048&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco Systems&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Subject:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=Cisco Manufacturing CA&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; o=Cisco Systems&lt;/P&gt;
&lt;P&gt;&amp;nbsp; CRL Distribution Points:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="http://www.cisco.com/security/pki/crl/crca2048.crl" target="_blank"&gt;http://www.cisco.com/security/pki/crl/crca2048.crl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Validity Date:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start date: 22:16:01 UTC Jun 10 2005&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; date: 20:25:42 UTC May 14 2029&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Associated Trustpoints: Trustpool Cisco_IOS_MIC_cert&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Storage:&lt;/P&gt;
&lt;P&gt;------------&lt;/P&gt;
&lt;P&gt;I have found multiple Cisco Bugs that refer to similar symptoms but our situation doesn’t quite meet all the criteria&lt;/P&gt;
&lt;P&gt;This one looks most similar - &lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63916.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63916.html&lt;/A&gt; but our AP serial number doesn’t show as being affected?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These others show similar symptoms but not exact error matches&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuq19142/?rfs=iqvred" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuq19142/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCur43050/?referring_site=bugqvinvisibleredir" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCur43050/?referring_site=bugqvinvisibleredir&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone able to assist?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 15:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681796#M129106</guid>
      <dc:creator>PJR_CDF</dc:creator>
      <dc:date>2021-07-05T15:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681836#M129107</link>
      <description>Post the complete output to the following commands: &lt;BR /&gt;1.  WLC:  sh sysinfo; &lt;BR /&gt;2.  WLC:  sh time; &lt;BR /&gt;3.  AP:  sh version; and &lt;BR /&gt;4.  AP:  sh ip interface brief</description>
      <pubDate>Mon, 06 Aug 2018 08:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681836#M129107</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2018-08-06T08:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681852#M129108</link>
      <description>&lt;P&gt;&amp;gt;show sysinfo&lt;/P&gt;
&lt;P&gt;Manufacturer's Name.............................. Cisco Systems Inc.&lt;BR /&gt;Product Name..................................... Cisco Controller&lt;BR /&gt;Product Version.................................. 8.0.152.0&lt;BR /&gt;Bootloader Version............................... 1.0.20&lt;BR /&gt;Field Recovery Image Version..................... 7.6.101.1&lt;BR /&gt;Firmware Version................................. FPGA 1.7, Env 1.8, USB console 2.2&lt;BR /&gt;Build Type....................................... DATA + WPS&lt;/P&gt;
&lt;P&gt;System Name...................................... XXXXXXXXXXXX&lt;BR /&gt;System Location..................................&lt;BR /&gt;System Contact...................................&lt;BR /&gt;System ObjectID.................................. 1.3.6.1.4.1.9.1.1069&lt;BR /&gt;Redundancy Mode.................................. Disabled&lt;BR /&gt;IP Address....................................... 10.100.0.9&lt;BR /&gt;IPv6 Address..................................... ::&lt;BR /&gt;Last Reset....................................... Power on reset&lt;BR /&gt;System Up Time................................... 0 days 17 hrs 5 mins 23 secs&lt;BR /&gt;System Timezone Location.........................&lt;BR /&gt;System Stats Realtime Interval................... 5&lt;BR /&gt;System Stats Normal Interval..................... 180&lt;/P&gt;
&lt;P&gt;Configured Country............................... GB - United Kingdom&lt;BR /&gt;Operating Environment............................ Commercial (0 to 40 C)&lt;BR /&gt;Internal Temp Alarm Limits....................... 0 to 65 C&lt;BR /&gt;Internal Temperature............................. +35 C&lt;BR /&gt;External Temperature............................. +23 C&lt;BR /&gt;Fan Status....................................... OK&lt;/P&gt;
&lt;P&gt;State of 802.11b Network......................... Enabled&lt;BR /&gt;State of 802.11a Network......................... Enabled&lt;BR /&gt;Number of WLANs.................................. 4&lt;BR /&gt;Number of Active Clients......................... 225&lt;/P&gt;
&lt;P&gt;Burned-in MAC Address............................ 00:06:F6:62:0B:40&lt;BR /&gt;Power Supply 1................................... Present, OK&lt;BR /&gt;Power Supply 2................................... Absent&lt;BR /&gt;Maximum number of APs supported.................. 500&lt;BR /&gt;System Nas-Id....................................&lt;BR /&gt;WLC MIC Certificate Types........................ SHA1&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; &amp;gt;show time&lt;/P&gt;
&lt;P&gt;Time............................................. Mon Aug 6 09:01:37 2018&lt;/P&gt;
&lt;P&gt;Timezone delta................................... 0:0&lt;BR /&gt;Timezone location................................&lt;/P&gt;
&lt;P&gt;NTP Servers&lt;BR /&gt; NTP Polling Interval......................... 3600&lt;/P&gt;
&lt;P&gt;Index NTP Key Index NTP Server NTP Msg Auth Status&lt;BR /&gt; ------- ----------------------------------------------------------------------------------&lt;BR /&gt; 1 0 10.100.0.XX AUTH DISABLED&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;---------&lt;/P&gt;
&lt;P&gt;#sh version&lt;BR /&gt;Cisco IOS Software, C2600 Software (AP3G2-K9W8-M), Version 15.3(3)JA12, RELEASE SOFTWARE (fc2)&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2017 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Fri 20-Oct-17 20:51 by prod_rel_team&lt;/P&gt;
&lt;P&gt;ROM: Bootstrap program is C2600 boot loader&lt;BR /&gt;BOOTLDR: C2600 Boot Loader (AP3G2-BOOT-M) LoaderVersion 12.4(25e)JAY, RELEASE SOFTWARE (fc1)&lt;/P&gt;
&lt;P&gt;GC01-F00-AP06 uptime is 17 hours, 9 minutes&lt;BR /&gt;System returned to ROM by power-on&lt;BR /&gt;System image file is "flash:/ap3g2-k9w8-mx.153-3.JA12/ap3g2-k9w8-xx.153-3.JA12"&lt;BR /&gt;Last reload reason:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;/P&gt;
&lt;P&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you require further assistance please contact us by sending email to&lt;BR /&gt;export@cisco.com.&lt;/P&gt;
&lt;P&gt;cisco AIR-CAP2602I-E-K9 (PowerPC) processor (revision A0) with 188398K/60928K bytes of memory.&lt;BR /&gt;Processor board ID FGL1708Z7XA&lt;BR /&gt;PowerPC CPU at 800Mhz, revision number 0x2151&lt;BR /&gt;Last reset from power-on&lt;BR /&gt;LWAPP image version 8.0.152.0&lt;BR /&gt;1 Gigabit Ethernet interface&lt;BR /&gt;2 802.11 Radios&lt;/P&gt;
&lt;P&gt;32K bytes of flash-simulated non-volatile configuration memory.&lt;BR /&gt;Base ethernet MAC Address: 4C:4E:35:03:4B:FB&lt;BR /&gt;Part Number : 73-14588-02&lt;BR /&gt;PCA Assembly Number : 800-37899-01&lt;BR /&gt;PCA Revision Number : A0&lt;BR /&gt;PCB Serial Number : FOC17055MWR&lt;BR /&gt;Top Assembly Part Number : 800-38356-01&lt;BR /&gt;Top Assembly Serial Number : FGL1708Z7XA&lt;BR /&gt;Top Revision Number : A0&lt;BR /&gt;Product/Model Number : AIR-CAP2602I-E-K9&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configuration register is 0xF&lt;BR /&gt;#sh ip interface brief&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;BVI1 10.100.0.X YES TFTP up up &lt;BR /&gt;Dot11Radio0 unassigned NO unset up up &lt;BR /&gt;Dot11Radio1 unassigned NO unset up up &lt;BR /&gt;GigabitEthernet0 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.1 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.2 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.3 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.4 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.5 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.6 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.7 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.8 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.9 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.10 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.11 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.12 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.13 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.14 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.15 unassigned NO unset up up &lt;BR /&gt;Virtual-WLAN0.16 unassigned NO unset up up&lt;/P&gt;
&lt;P&gt;-------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;WLC commands show details of 8.0.152.0 as we had to roll back I'm afraid&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 09:07:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681852#M129108</guid>
      <dc:creator>PJR_CDF</dc:creator>
      <dc:date>2018-08-06T09:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681861#M129109</link>
      <description>Enter this command from the AP:  capwap ap primary-base &amp;lt;WLC name&amp;gt; &amp;lt;WLC Management IP address&amp;gt;</description>
      <pubDate>Mon, 06 Aug 2018 09:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681861#M129109</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2018-08-06T09:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681864#M129110</link>
      <description>I'm not allowed to make changes outside of maintenance windows I'm afraid.&lt;BR /&gt;&lt;BR /&gt;Doesn't entering this command just set the CAPWAP controller IP address for the AP?&lt;BR /&gt;&lt;BR /&gt;Just trying to understand what adding this command will show us?&lt;BR /&gt;&lt;BR /&gt;Thanks for your assistance as always though &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Mon, 06 Aug 2018 09:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681864#M129110</guid>
      <dc:creator>PJR_CDF</dc:creator>
      <dc:date>2018-08-06T09:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681885#M129111</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/638930"&gt;@PJR_CDF&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Doesn't entering this command just set the CAPWAP controller IP address for the AP?&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The command manually points the AP to the WLC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your previous output does not show if the AP knows where the WLC from DHCP Option 43.&lt;/P&gt;
&lt;P&gt;If, by entering this command and, the AP joins the WLC then I am very certain I can say that the issue is that DHCP Option 43 is either misconfigured or not configured at all.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 09:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681885#M129111</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2018-08-06T09:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681893#M129112</link>
      <description>&lt;P&gt;option 43 isnt used&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe the AP knows where the WLC is from it's current configuration and is able to locate the WLC and attempt connection which the logs I posted earlier show (unless I am misinterpreting something?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I appreciate my original post showed a load of info but in terms of connectivity the WLC logs show attempted connection from the AP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;WLC Log&lt;/P&gt;
&lt;P&gt;*spamApTask2: Aug 05 15:14:43.021: %CAPWAP-3-DTLS_DB_ERR: capwap_ac_sm.c:9507 4c:4e:35:03:4b:fb: Failed to create DTLS connection for AP 10.100.0.17 (13505).&lt;BR /&gt;*spamApTask2: Aug 05 15:14:43.020: %DTLS-3-PKI_ERROR: openssl_dtls.c:562 PKI initialization error : Certificate initialization failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AP logs showing attempted connection to WLC&lt;/P&gt;
&lt;P&gt;*Aug&amp;nbsp; 5 13:55:10.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.100.0.9 peer_port: 5246&lt;/P&gt;
&lt;P&gt;*Aug&amp;nbsp; 5 13:55:39.999: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2214 Max retransmission count reached for Connection 0x6B7919C!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont think the AP is unable to locate the WLC -&amp;nbsp;It appears to me that the 2 devices are unable to negotiate a secure channel on which to communicate?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your continued help by the way&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 10:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681893#M129112</guid>
      <dc:creator>PJR_CDF</dc:creator>
      <dc:date>2018-08-06T10:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681936#M129113</link>
      <description>Correct, this is what this command does. It will probably also cause the AP to directly switch to that WLC.</description>
      <pubDate>Mon, 06 Aug 2018 10:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3681936#M129113</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2018-08-06T10:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: 2602 AP's wont connect to 5508WLC after update to 8.3.143 - PKI initialization error</title>
      <link>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3690388#M129114</link>
      <description>&lt;P&gt;This root cause for this issue has now been established.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would appear the controller in question had previously been setup to use LSC certs and configured to talk to a (now offline) CA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Previous OS updates of the WLC didnt cause an issue but the jump from 8.0 to 8.3 caused this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It wasnt possible to disable LSC from the GUI (it errored) but once disabled via the CLI, APs were able to connect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks to all those who provided input into this thread.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Aug 2018 13:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2602-ap-s-wont-connect-to-5508wlc-after-update-to-8-3-143-pki/m-p/3690388#M129114</guid>
      <dc:creator>PJR_CDF</dc:creator>
      <dc:date>2018-08-17T13:22:21Z</dc:date>
    </item>
  </channel>
</rss>

