<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2504 Fallback has suddenly stopped working - Help needed in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4442079#M231771</link>
    <description>&lt;P&gt;Sorry - although I possibly didn't run it for long enough&lt;BR /&gt;&lt;BR /&gt;I suppose I should just go ahead and install 8.5.131.0 - if I do, do I still need to do stuff like turning off NTP and turning the clock back ?&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;debug pm pki enable&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;*spamApTask1: Jan 06 12:39:51.212: 00:a2:89:e8:13:10 Discovery Response sent to 10.10.5.102:6864&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.202: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.412: OpenSSL Get Issuer Handles: locking ca cert table&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: x509 subject_name /C=US/ST=California/L=San Jose/O=Cisco Systems/CN=AP3G2-00f66301ace1/emailAddress=support@cisco.com&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: issuer_name /O=Cisco/CN=Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: CN AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: issuerCertCN Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: GetMac: MAC: 00f6.6301.ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: openssl Mac Address in subject is 00:f6:63:01:ac:e1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Cert Name in subject is AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Extracted cert issuer from subject name.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: NMSP:: Algo name matched SHA256&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Cert is issued by Cisco Systems.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: Retrieving x509 cert for CertName cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: called to evaluate &amp;lt;cscoMfgSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: Found matching CA cert cscoMfgSha2CaCert in row 7&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Found CID 26000445 for certname cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: CACertTable: Found matching CID cscoMfgSha2CaCert in row 7 x509 0x2be3d328&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Retrieving x509 cert for CertName cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: called to evaluate &amp;lt;cscoRootSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: Found matching CA cert cscoRootSha2CaCert in row 6&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Found CID 2f6c24df for certname cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: CACertTable: Found matching CID cscoRootSha2CaCert in row 6 x509 0x2be3d3dc&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: X509 Cert Verification return code: 0&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: X509 Cert Verification result text: certificate is not yet valid&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: Error in X509 Cert Verification at 2 depth: certificate is not yet valid&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: X509 OpenSSL Errors...&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: NONE&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: OpenSSL Get Issuer Handles: CISCO CERT, start verify with LSC&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Retrieving x509 cert for CertName othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: sshpmGetCID: called to evaluate &amp;lt;othSslLscCaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: sshpmGetCID: failed to find matching cert name othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Cert &amp;gt;othSslLscCaCert&amp;lt; not found.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: can't load cert othSslLscCaCert(?!)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug disable-all&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jul 2021 21:25:33 GMT</pubDate>
    <dc:creator>Cormac Champion</dc:creator>
    <dc:date>2021-07-30T21:25:33Z</dc:date>
    <item>
      <title>2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4440984#M231747</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;&lt;BR /&gt;I have a pair of 2504's running sucessfully for the past 3 years as a HA N+1 with 4 x 2602 AP's.&amp;nbsp; Both 2504's have dual uplinks to a pair of 3560 switches (so they would be Active / Passive uplinks).&amp;nbsp; One uplink on the primary controller stopped working due to dirty pins on the interface, so I powered off the primary 2504 and the AP's moved across to the secondary 2504 as they should.&lt;BR /&gt;&lt;BR /&gt;However, when I powered the primary 2504 back on again, the AP's left the secondary but never arrived onto the primary, went back to the secondary controller, and again tried to go to the primary and kept repeating this over and over until I shut the LAN uplinks to the primary controller from each of the two 3560's.&amp;nbsp; The controllers are both running 8.2.160.0 and have been for quite a long time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Within the Mobility Group, both members show correctly as up, and if I do the "show redundancy summary", I can see the controllers correctly identified as primary and secondary.&lt;BR /&gt;&lt;BR /&gt;I'm at a total loss as to how this has suddenly happened that the AP's won't settle back to the primary controller.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 10:09:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4440984#M231747</guid>
      <dc:creator>Cormac Champion</dc:creator>
      <dc:date>2021-07-29T10:09:31Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441021#M231750</link>
      <description>&lt;P&gt;Do you have AP fallback enabled on both controllers?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 11:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441021#M231750</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2021-07-29T11:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441317#M231756</link>
      <description>&lt;P&gt;Yes, enabled on both, with HK SKU set on the secondary unit only.&amp;nbsp; The primary and secondary controllers are listed against under High Availability on each of the AP's&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 19:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441317#M231756</guid>
      <dc:creator>Cormac Champion</dc:creator>
      <dc:date>2021-07-29T19:11:11Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441331#M231757</link>
      <description>&lt;P&gt;Can you check the certificate validity in ur WLC and AP's.&lt;/P&gt;&lt;P&gt;In WLC -&amp;nbsp;&lt;SPAN&gt;sh certificate all&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In AP -&amp;nbsp;&lt;SPAN&gt;sh crypto pki certificates&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If it is expired please find the below FN. Follow the workaround as per the below FN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/field-notices/639/fn63942.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If not please provide the below outputs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;debug capwap events enable&lt;/P&gt;&lt;P&gt;debug pm pki enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 19:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441331#M231757</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2021-07-29T19:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441644#M231760</link>
      <description>&lt;P&gt;Thanks for that&lt;BR /&gt;&lt;BR /&gt;I'm a bit confused because, am I readi g correctly, that both certs are still valid ?&amp;nbsp; I see the following&lt;BR /&gt;&lt;BR /&gt;Controller 1&lt;/P&gt;&lt;P&gt;Certificate Name: Cisco SHA1 device cert&lt;/P&gt;&lt;P&gt;Subject Name :&lt;BR /&gt;C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AIR-CT2504-K9-ccd8c1411a20, emailAddress=support@cisco.com&lt;BR /&gt;Issuer Name :&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;O=Cisco Systems, CN=Cisco Manufacturing CA&lt;BR /&gt;Serial Number :&lt;BR /&gt;47B2852E000000282DE1&lt;BR /&gt;Validity :&lt;BR /&gt;Start : Oct 24 01:51:39 2014 GMT&lt;BR /&gt;End : Oct 24 02:01:39 2024 GMT&lt;BR /&gt;Signature Algorithm :&lt;BR /&gt;sha1WithRSAEncryption&lt;BR /&gt;Hash key :&lt;BR /&gt;SHA1 Fingerprint : f1:3b:72:fc:8e:9d:2b:75:51:be:ae:85:e1:4e:7a:d6:fe:ca:7b:5e&lt;BR /&gt;MD5 Fingerprint : d1:13:aa:f0:c8:da:d9:85:a1:0c:19:38:f6:d2:43:ea&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Controller 2&lt;/P&gt;&lt;P&gt;Certificate Name: Cisco SHA1 device cert&lt;/P&gt;&lt;P&gt;Subject Name :&lt;BR /&gt;C=US, ST=California, L=San Jose, O=Cisco Systems, CN=AIR-CT2504-K9-00562be283c0, emailAddress=support@cisco.com&lt;BR /&gt;Issuer Name :&lt;/P&gt;&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;O=Cisco Systems, CN=Cisco Manufacturing CA&lt;BR /&gt;Serial Number :&lt;BR /&gt;53934C5C0000000A6D13&lt;BR /&gt;Validity :&lt;BR /&gt;Start : Jul 29 01:48:53 2016 GMT&lt;BR /&gt;End : Jul 29 01:58:53 2026 GMT&lt;BR /&gt;Signature Algorithm :&lt;BR /&gt;sha1WithRSAEncryption&lt;BR /&gt;Hash key :&lt;BR /&gt;SHA1 Fingerprint : 59:c0:83:27:24:87:28:8c:01:2e:84:99:b1:dd:2e:94:36:e8:d7:23&lt;BR /&gt;MD5 Fingerprint : 54:e0:64:1b:6d:d1:52:d1:c7:73:4a:86:88:de:01:8c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I am indeed getting Cert Expiry Messages&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;debug capwap events enable&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;*spamApTask6: Jan 06 12:35:21.981: 00:f6:63:01:ac:e1 DTLS connection not found, creating new connection for 10:10:5:102 (6863) 10:10:5:253 (5246)&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:21.982: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:21.982: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask6: Jan 06 12:35:21.982: GetIDCert: Using SHA2 Id cert on WLC&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:21.982: Get Cert from CID: For CID 1ef531f1 certType 1&lt;BR /&gt;*spamApTask6: Jan 06 12:35:21.982: Get Cert from CID: Found match of ID Cert in row 3&lt;BR /&gt;*spamApTask6: Jan 06 12:35:21.982: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:21.982: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask6: Jan 06 12:35:21.982: GetDERIDKey: Using SHA2 Id cert Private Keys on WLC&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:21.982: GetPrivateKey: called to get key for CID 1ef531f1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:21.982: Private Key found row 3 KeyBufLen 2048 Keylen 1191 PrivateKeyPtr 0x2cea8478&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.191: OpenSSL Get Issuer Handles: locking ca cert table&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: x509 subject_name /C=US/ST=California/L=San Jose/O=Cisco Systems/CN=AP3G2-00f66301ace1/emailAddress=support@cisco.com&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: issuer_name /O=Cisco/CN=Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: CN AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: issuerCertCN Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: GetMac: MAC: 00f6.6301.ace1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: openssl Mac Address in subject is 00:f6:63:01:ac:e1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: Cert Name in subject is AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: Extracted cert issuer from subject name.&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: NMSP:: Algo name matched SHA256&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.192: OpenSSL Get Issuer Handles: Cert is issued by Cisco Systems.&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: Retrieving x509 cert for CertName cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: sshpmGetCID: called to evaluate &amp;lt;cscoMfgSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: sshpmGetCID: Found matching CA cert cscoMfgSha2CaCert in row 7&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: Found CID 26000445 for certname cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: CACertTable: Found matching CID cscoMfgSha2CaCert in row 7 x509 0x2be3d328&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: Retrieving x509 cert for CertName cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: sshpmGetCID: called to evaluate &amp;lt;cscoRootSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: sshpmGetCID: Found matching CA cert cscoRootSha2CaCert in row 6&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: Found CID 2f6c24df for certname cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: CACertTable: Found matching CID cscoRootSha2CaCert in row 6 x509 0x2be3d3dc&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: Verify User Certificate: X509 Cert Verification return code: 0&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: Verify User Certificate: X509 Cert Verification result text: certificate is not yet valid&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: Verify User Certificate: Error in X509 Cert Verification at 2 depth: certificate is not yet valid&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: X509 OpenSSL Errors...&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: NONE&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.193: OpenSSL Get Issuer Handles: CISCO CERT, start verify with LSC&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: Retrieving x509 cert for CertName othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: sshpmGetCID: called to evaluate &amp;lt;othSslLscCaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: sshpmGetCID: failed to find matching cert name othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: Cert &amp;gt;othSslLscCaCert&amp;lt; not found.&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: Verify User Certificate: can't load cert othSslLscCaCert(?!)&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.193: OpenSSL Get Issuer Handles: CSCO user cert not verified by Cisco Roots ...&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.194: acDtlsPlumbControlPlaneKeys: lrad:10.10.5.102(6863) mwar:10.10.5.253(5246)&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:35:22.195: 00:f6:63:01:ac:e1 DTLS connection closed event receivedserver (10.10.5.253/5246) client (10.10.5.102/6863)&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.195: 00:f6:63:01:ac:e1 No entry exists for AP (10.10.5.102/6863)&lt;BR /&gt;*spamApTask6: Jan 06 12:35:22.195: 00:f6:63:01:ac:e1 No AP entry exist in temporary database for 10.10.5.102:6863&lt;BR /&gt;*spamApTask3: Jan 06 12:35:44.241: b8:38:61:ba:82:c3 DTLS Handshake Timeout server (10.10.5.253:5246), client (10.10.5.104:43054)&lt;BR /&gt;*spamApTask3: Jan 06 12:35:44.241: acDtlsPlumbControlPlaneKeys: lrad:10.10.5.104(43054) mwar:10.10.5.253(5246)&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:35:44.241: b8:38:61:ba:82:c3 DTLS connection closed event receivedserver (10.10.5.253/5246) client (10.10.5.104/43054)&lt;BR /&gt;*spamApTask3: Jan 06 12:35:44.241: b8:38:61:ba:82:c3 No entry exists for AP (10.10.5.104/43054)&lt;BR /&gt;*spamApTask3: Jan 06 12:35:44.241: b8:38:61:ba:82:c3 No AP entry exist in temporary database for 10.10.5.104:43054&lt;BR /&gt;*spamApTask0: Jan 06 12:35:48.441: c0:67:af:f0:fa:54 DTLS Handshake Timeout server (10.10.5.253:5246), client (10.10.5.101:4007)&lt;BR /&gt;*spamApTask0: Jan 06 12:35:48.441: acDtlsPlumbControlPlaneKeys: lrad:10.10.5.101(4007) mwar:10.10.5.253(5246)&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:35:48.441: c0:67:af:f0:fa:54 DTLS connection closed event receivedserver (10.10.5.253/5246) client (10.10.5.101/4007)&lt;BR /&gt;*spamApTask0: Jan 06 12:35:48.441: c0:67:af:f0:fa:54 No entry exists for AP (10.10.5.101/4007)&lt;BR /&gt;*spamApTask0: Jan 06 12:35:48.441: c0:67:af:f0:fa:54 No AP entry exist in temporary database for 10.10.5.101:4007&lt;BR /&gt;*spamApTask3: Jan 06 12:36:09.411: b8:38:61:ba:82:c3 DTLS connection not found, creating new connection for 10:10:5:104 (43054) 10:10:5:253 (5246)&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:36:09.411: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:36:09.411: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask3: Jan 06 12:36:09.411: GetIDCert: Using SHA2 Id cert on WLC&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:36:09.411: Get Cert from CID: For CID 1ef531f1 certType 1&lt;BR /&gt;*spamApTask3: Jan 06 12:36:09.411: Get Cert from CID: Found match of ID Cert in row 3&lt;BR /&gt;*spamApTask3: Jan 06 12:36:09.411: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:36:09.411: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask3: Jan 06 12:36:09.411: GetDERIDKey: Using SHA2 Id cert Private Keys on WLC&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:36:09.411: GetPrivateKey: called to get key for CID 1ef531f1&lt;/P&gt;&lt;P&gt;*spamApTask3: Jan 06 12:36:09.411: Private Key found row 3 KeyBufLen 2048 Keylen 1191 PrivateKeyPtr 0x2cea8478&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.468: c0:67:af:f0:fa:54 DTLS connection not found, creating new connection for 10:10:5:101 (4007) 10:10:5:253 (5246)&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.469: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.469: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask0: Jan 06 12:36:13.469: GetIDCert: Using SHA2 Id cert on WLC&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.469: Get Cert from CID: For CID 1ef531f1 certType 1&lt;BR /&gt;*spamApTask0: Jan 06 12:36:13.469: Get Cert from CID: Found match of ID Cert in row 3&lt;BR /&gt;*spamApTask0: Jan 06 12:36:13.469: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.469: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask0: Jan 06 12:36:13.469: GetDERIDKey: Using SHA2 Id cert Private Keys on WLC&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.469: GetPrivateKey: called to get key for CID 1ef531f1&lt;/P&gt;&lt;P&gt;*spamApTask0: Jan 06 12:36:13.469: Private Key found row 3 KeyBufLen 2048 Keylen 1191 PrivateKeyPtr 0x2cea8478&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: 00:f6:63:01:ac:e1 DTLS connection not found, creating new connection for 10:10:5:102 (6863) 10:10:5:253 (5246)&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask6: Jan 06 12:36:26.975: GetIDCert: Using SHA2 Id cert on WLC&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: Get Cert from CID: For CID 1ef531f1 certType 1&lt;BR /&gt;*spamApTask6: Jan 06 12:36:26.975: Get Cert from CID: Found match of ID Cert in row 3&lt;BR /&gt;*spamApTask6: Jan 06 12:36:26.975: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: sshpmGetCID: Found matching ID cert cscoSha2IdCert in row 3&lt;BR /&gt;*spamApTask6: Jan 06 12:36:26.975: GetDERIDKey: Using SHA2 Id cert Private Keys on WLC&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: GetPrivateKey: called to get key for CID 1ef531f1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:26.975: Private Key found row 3 KeyBufLen 2048 Keylen 1191 PrivateKeyPtr 0x2cea8478&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.185: OpenSSL Get Issuer Handles: locking ca cert table&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: x509 subject_name /C=US/ST=California/L=San Jose/O=Cisco Systems/CN=AP3G2-00f66301ace1/emailAddress=support@cisco.com&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: issuer_name /O=Cisco/CN=Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: CN AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: issuerCertCN Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: GetMac: MAC: 00f6.6301.ace1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: openssl Mac Address in subject is 00:f6:63:01:ac:e1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: Cert Name in subject is AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: Extracted cert issuer from subject name.&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: NMSP:: Algo name matched SHA256&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: OpenSSL Get Issuer Handles: Cert is issued by Cisco Systems.&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: Retrieving x509 cert for CertName cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: sshpmGetCID: called to evaluate &amp;lt;cscoMfgSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: sshpmGetCID: Found matching CA cert cscoMfgSha2CaCert in row 7&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: Found CID 26000445 for certname cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: CACertTable: Found matching CID cscoMfgSha2CaCert in row 7 x509 0x2be3d328&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: Retrieving x509 cert for CertName cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: sshpmGetCID: called to evaluate &amp;lt;cscoRootSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: sshpmGetCID: Found matching CA cert cscoRootSha2CaCert in row 6&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: Found CID 2f6c24df for certname cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: CACertTable: Found matching CID cscoRootSha2CaCert in row 6 x509 0x2be3d3dc&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: Verify User Certificate: X509 Cert Verification return code: 0&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: Verify User Certificate: X509 Cert Verification result text: certificate is not yet valid&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: Verify User Certificate: Error in X509 Cert Verification at 2 depth: certificate is not yet valid&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.186: X509 OpenSSL Errors...&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.186: NONE&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.187: OpenSSL Get Issuer Handles: CISCO CERT, start verify with LSC&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: Retrieving x509 cert for CertName othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: sshpmGetCID: called to evaluate &amp;lt;othSslLscCaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: sshpmGetCID: failed to find matching cert name othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: Cert &amp;gt;othSslLscCaCert&amp;lt; not found.&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: Verify User Certificate: can't load cert othSslLscCaCert(?!)&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: OpenSSL Get Issuer Handles: CSCO user cert not verified by Cisco Roots ...&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.187: acDtlsPlumbControlPlaneKeys: lrad:10.10.5.102(6863) mwar:10.10.5.253(5246)&lt;/P&gt;&lt;P&gt;*spamApTask6: Jan 06 12:36:27.188: 00:f6:63:01:ac:e1 DTLS connection closed event receivedserver (10.10.5.253/5246) client (10.10.5.102/6863)&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.188: 00:f6:63:01:ac:e1 No entry exists for AP (10.10.5.102/6863)&lt;BR /&gt;*spamApTask6: Jan 06 12:36:27.188: 00:f6:63:01:ac:e1 No AP entry exist in temporary database for 10.10.5.102:6863&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;debug disable-all&lt;BR /&gt;&lt;BR /&gt;And then&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;debug pm pki enable&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;*spamApTask1: Jan 06 12:39:51.212: 00:a2:89:e8:13:10 Discovery Response sent to 10.10.5.102:6864&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.202: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.412: OpenSSL Get Issuer Handles: locking ca cert table&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: x509 subject_name /C=US/ST=California/L=San Jose/O=Cisco Systems/CN=AP3G2-00f66301ace1/emailAddress=support@cisco.com&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: issuer_name /O=Cisco/CN=Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: CN AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: issuerCertCN Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: GetMac: MAC: 00f6.6301.ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: openssl Mac Address in subject is 00:f6:63:01:ac:e1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Cert Name in subject is AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Extracted cert issuer from subject name.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: NMSP:: Algo name matched SHA256&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Cert is issued by Cisco Systems.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: Retrieving x509 cert for CertName cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: called to evaluate &amp;lt;cscoMfgSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: Found matching CA cert cscoMfgSha2CaCert in row 7&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Found CID 26000445 for certname cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: CACertTable: Found matching CID cscoMfgSha2CaCert in row 7 x509 0x2be3d328&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Retrieving x509 cert for CertName cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: called to evaluate &amp;lt;cscoRootSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: Found matching CA cert cscoRootSha2CaCert in row 6&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Found CID 2f6c24df for certname cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: CACertTable: Found matching CID cscoRootSha2CaCert in row 6 x509 0x2be3d3dc&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: X509 Cert Verification return code: 0&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: X509 Cert Verification result text: certificate is not yet valid&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: Error in X509 Cert Verification at 2 depth: certificate is not yet valid&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: X509 OpenSSL Errors...&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: NONE&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: OpenSSL Get Issuer Handles: CISCO CERT, start verify with LSC&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Retrieving x509 cert for CertName othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: sshpmGetCID: called to evaluate &amp;lt;othSslLscCaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: sshpmGetCID: failed to find matching cert name othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Cert &amp;gt;othSslLscCaCert&amp;lt; not found.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: can't load cert othSslLscCaCert(?!)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug disable-all&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 08:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441644#M231760</guid>
      <dc:creator>Cormac Champion</dc:creator>
      <dc:date>2021-07-30T08:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441721#M231762</link>
      <description>&lt;P&gt;Can you check NTP and time for both AP and WLC. You may advertise option 42 for AP’s if reqd&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 10:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441721#M231762</guid>
      <dc:creator>Arshad Safrulla</dc:creator>
      <dc:date>2021-07-30T10:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441834#M231768</link>
      <description>&lt;P&gt;You didn't provide the requested "sh crypto pki certificates" output from the APs?&lt;/P&gt;&lt;P&gt;That will clearly show the certs on the APs.&lt;/P&gt;&lt;P&gt;Either way you're almost definitely going to need to follow the field notice to fix the problem.&lt;/P&gt;&lt;P&gt;Read it carefully twice to make sure you understand it and then follow the steps in the right order.&amp;nbsp; There are a number of posts about this on the forums already and I summarised it a few days ago on one of them.&amp;nbsp; You will need to upgrade from that very old code version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 14:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4441834#M231768</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2021-07-30T14:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4442079#M231771</link>
      <description>&lt;P&gt;Sorry - although I possibly didn't run it for long enough&lt;BR /&gt;&lt;BR /&gt;I suppose I should just go ahead and install 8.5.131.0 - if I do, do I still need to do stuff like turning off NTP and turning the clock back ?&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;debug pm pki enable&lt;/P&gt;&lt;P&gt;(Cisco Controller) &amp;gt;*spamApTask1: Jan 06 12:39:51.212: 00:a2:89:e8:13:10 Discovery Response sent to 10.10.5.102:6864&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.202: sshpmGetCID: called to evaluate &amp;lt;cscoSha2IdCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.412: OpenSSL Get Issuer Handles: locking ca cert table&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: x509 subject_name /C=US/ST=California/L=San Jose/O=Cisco Systems/CN=AP3G2-00f66301ace1/emailAddress=support@cisco.com&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: issuer_name /O=Cisco/CN=Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: CN AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: issuerCertCN Cisco Manufacturing CA SHA2&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: GetMac: MAC: 00f6.6301.ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: openssl Mac Address in subject is 00:f6:63:01:ac:e1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Cert Name in subject is AP3G2-00f66301ace1&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Extracted cert issuer from subject name.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: NMSP:: Algo name matched SHA256&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: OpenSSL Get Issuer Handles: Cert is issued by Cisco Systems.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: Retrieving x509 cert for CertName cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: called to evaluate &amp;lt;cscoMfgSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: Found matching CA cert cscoMfgSha2CaCert in row 7&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Found CID 26000445 for certname cscoMfgSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: CACertTable: Found matching CID cscoMfgSha2CaCert in row 7 x509 0x2be3d328&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Retrieving x509 cert for CertName cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: called to evaluate &amp;lt;cscoRootSha2CaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: sshpmGetCID: Found matching CA cert cscoRootSha2CaCert in row 6&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.413: Found CID 2f6c24df for certname cscoRootSha2CaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.413: CACertTable: Found matching CID cscoRootSha2CaCert in row 6 x509 0x2be3d3dc&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: X509 Cert Verification return code: 0&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: X509 Cert Verification result text: certificate is not yet valid&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: Error in X509 Cert Verification at 2 depth: certificate is not yet valid&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: X509 OpenSSL Errors...&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: NONE&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;*spamApTask1: Jan 06 12:41:06.414: OpenSSL Get Issuer Handles: CISCO CERT, start verify with LSC&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Retrieving x509 cert for CertName othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: sshpmGetCID: called to evaluate &amp;lt;othSslLscCaCert&amp;gt;&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: sshpmGetCID: failed to find matching cert name othSslLscCaCert&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Cert &amp;gt;othSslLscCaCert&amp;lt; not found.&lt;/P&gt;&lt;P&gt;*spamApTask1: Jan 06 12:41:06.414: Verify User Certificate: can't load cert othSslLscCaCert(?!)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug disable-all&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jul 2021 21:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4442079#M231771</guid>
      <dc:creator>Cormac Champion</dc:creator>
      <dc:date>2021-07-30T21:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2504 Fallback has suddenly stopped working - Help needed</title>
      <link>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4442306#M231775</link>
      <description>&lt;P&gt;Thanks all for your kind assistance.&amp;nbsp; I'm back up and running with the latest 8.5 image &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 18:20:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/2504-fallback-has-suddenly-stopped-working-help-needed/m-p/4442306#M231775</guid>
      <dc:creator>Cormac Champion</dc:creator>
      <dc:date>2021-07-31T18:20:30Z</dc:date>
    </item>
  </channel>
</rss>

