<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 1852E Mobility Express AP can not join ifself in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4739130#M249493</link>
    <description>&lt;P&gt;&lt;SPAN&gt;[*12/14/2022 06:22:03.7504] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX &lt;STRONG&gt;failed for apr1v0 error No such device&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think you have a faulty AP - RMA required.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The other clue to that is "Discovery request: Total msgEleLen = 0" and "Unknown AP type"&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Dec 2022 00:32:27 GMT</pubDate>
    <dc:creator>Rich R</dc:creator>
    <dc:date>2022-12-15T00:32:27Z</dc:date>
    <item>
      <title>1852E Mobility Express AP can not join ifself</title>
      <link>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4738339#M249453</link>
      <description>&lt;P&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] Socket Invalid Element wcp/wcp_db Handler has_rlan Data 0 Length 10&lt;BR /&gt;&amp;#27;[95C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] Failed to load flex AP config from file. Default config will be used.&lt;BR /&gt;&amp;#27;[97C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] /usr/sbin/capwapd: opening /click/cli_h/apr_bypass/active failed!: No such file or directory&lt;BR /&gt;&amp;#27;[120C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] !!!!! {/usr/sbin/capwapd} failed writing /click/cli_h/apr_bypass/active len 1 data: "1"&lt;BR /&gt;&amp;#27;[115C&lt;BR /&gt;[*12/14/2022 06:23:05.5811] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_outdoor Data 0 Length 25&lt;BR /&gt;&amp;#27;[116C&lt;BR /&gt;[*12/14/2022 06:23:05.6711] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_I_domain Data 0 Length 25&lt;BR /&gt;&amp;#27;[117C&lt;BR /&gt;[*12/14/2022 06:23:05.8610] /usr/bin/cisco_core.sh: Corefile /storage/cores//AP501C.B024.06D0__core-wcpd.8.5.161.0.2022-12-14-05-36-13.tgz deleted.&lt;BR /&gt;&amp;#27;[147C&lt;/P&gt;
&lt;P&gt;U-Boot 2012.07 (btldr release 41) (Jan 05 2021 - 13:03:00)&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU General Public License, version 2" provided with&lt;BR /&gt;ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU General Public License, version 2", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;DRAM: 1 GiB&lt;BR /&gt;NAND (ONFI): Detected SPANSION S34MS02G1 [256 MiB]&lt;BR /&gt;SF: Detected Macronix MX25U3235F [4 MiB]&lt;BR /&gt;MFG data loaded&lt;BR /&gt;Scanning shenv data blocks&lt;BR /&gt;Total valid parts=4&lt;BR /&gt;Active shenv part[0:0], write_counter=29&lt;BR /&gt;PCI0 Link Intialized&lt;BR /&gt;Net: &lt;BR /&gt;PHY ID = 0x4dd074, eth0 found AR8033 PHY&lt;BR /&gt;PHY ID = 0x4dd074, eth1 found AR8033 PHY&lt;BR /&gt;Valid I2C chip addresses: 51 52&lt;BR /&gt;AP 1832/1852 detected...&lt;BR /&gt;Power Type: 802.3af POE or Others detected...&lt;BR /&gt;Signature returns 0&lt;BR /&gt;BL signing verification success, continue to run... &lt;BR /&gt;Auto boot mode, use bootipq directly&lt;BR /&gt;Hit ESC key to stop autoboot: 5 &amp;#8;&amp;#8;&amp;#8; 4 &amp;#8;&amp;#8;&amp;#8; 3 &amp;#8;&amp;#8;&amp;#8; 2 &amp;#8;&amp;#8;&amp;#8; 1 &amp;#8;&amp;#8;&amp;#8; 0 &lt;BR /&gt;Specified BOOT: part1&lt;/P&gt;
&lt;P&gt;Booting from part1&lt;/P&gt;
&lt;P&gt;Read 1024 bytes from volume part1 to 45000000&lt;BR /&gt;Read 44552564 bytes from volume part1 to 45000000&lt;BR /&gt;Signature returns 0&lt;BR /&gt;Image signing verification success, continue to run... &lt;BR /&gt;Using machid 0x1260 from environment&lt;/P&gt;
&lt;P&gt;Starting image ...&lt;/P&gt;
&lt;P&gt;[01/01/1970 00:00:00.0000] CPU: ARMv7 Processor [512f04d0] revision 0 (ARMv7), cr=10c5387d&lt;BR /&gt;[01/01/1970 00:00:00.0000] CPU: PIPT / VIPT nonaliasing data cache, PIPT instruction cache&lt;BR /&gt;[01/01/1970 00:00:00.0000] Machine: Cisco Systems 11ac Wave2 Wifi Access Point&lt;BR /&gt;[01/01/1970 00:00:00.0000] Memory policy: ECC disabled, Data cache writealloc&lt;BR /&gt;[01/01/1970 00:00:00.0000] Kernel command line: ubi.mtd=0 crashkernel=500M-:64M@1280M console=ttyHSL1,9600n8 activepart=part1 activeboot=0 wdgtriggered=0&lt;BR /&gt;[01/01/1970 00:00:00.1500] CPU1: Booted secondary processor&lt;BR /&gt;[01/01/1970 00:00:00.2200] &lt;BR /&gt;[01/01/1970 00:00:00.2200] +++ hydra_ap_gpio_value =3 &lt;BR /&gt;[01/01/1970 00:00:28.2313] ACPU PVS: 0&lt;BR /&gt;[01/01/1970 00:00:30.6606] buginf tty flushing thread started, ttyport=ef528e90&lt;BR /&gt;[*01/01/1970 00:00:36.8586] buginf() enabled.&lt;BR /&gt;&amp;#27;[45C&lt;BR /&gt;[*01/01/1970 00:00:36.8686] Made it into bootsh: Feb 18 2020 05:03:39&lt;BR /&gt;&amp;#27;[69C&lt;BR /&gt;[*01/01/1970 00:00:36.8686] bootsh build T-eaf8c9a5819ff90fa88df9b4045e20adf0d0a259-geaf8c9a5-vipendya&lt;BR /&gt;&amp;#27;[102C&lt;BR /&gt;Welcome to Cisco.&lt;/P&gt;
&lt;P&gt;Usage of this device is governed by Cisco's End User License Agreement,&lt;BR /&gt;available at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html" target="_blank" rel="noopener"&gt;http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Restricted Rights Legend&lt;/P&gt;
&lt;P&gt;Use, duplication, or disclosure by the Government is subject to&lt;BR /&gt;restrictions as set forth in subparagraph (c) of the Commercial&lt;BR /&gt;Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and&lt;BR /&gt;subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer&lt;BR /&gt;Software clause at DFARS sec. 252.227-7013.&lt;/P&gt;
&lt;P&gt;Cisco Systems, Inc.&lt;BR /&gt;170 West Tasman Drive&lt;BR /&gt;San Jose, California 95134-1706&lt;/P&gt;
&lt;P&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;/P&gt;
&lt;P&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank" rel="noopener"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you require further assistance please contact us by sending email to&lt;BR /&gt;export@cisco.com.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU General Public License, version 2" provided with&lt;BR /&gt;ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU General Public License, version 2", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU Library General Public License, version 2" provided&lt;BR /&gt;with ABSOLUTELY NO WARRANTY under the terms of "GNU Library&lt;BR /&gt;General Public License, version 2", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU Lesser General Public License, version 2.1" provided&lt;BR /&gt;with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser&lt;BR /&gt;General Public License, version 2.1", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This product contains some software licensed under the &lt;BR /&gt;"GNU General Public License, version 3" provided with &lt;BR /&gt;ABSOLUTELY NO WARRANTY under the terms of &lt;BR /&gt;"GNU General Public License, Version 3", available here: &lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/gpl.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/gpl.html&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU Affero General Public License, version 3" provided&lt;BR /&gt;with ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU Affero General Public License, version 3", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/agpl-3.0.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/agpl-3.0.html&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;[*01/01/1970 00:00:38.8880] &lt;BR /&gt;init started: BusyBox v1.23.2 (2020-02-18 04:38:33 PST)&lt;BR /&gt;&amp;#27;[55C&lt;BR /&gt;[*01/01/1970 00:00:40.1976] GCM-128 POST passed&lt;BR /&gt;&amp;#27;[47C&lt;BR /&gt;[*01/01/1970 00:00:40.1976] GCM-256 POST passed&lt;BR /&gt;&amp;#27;[47C&lt;BR /&gt;[*01/01/1970 00:00:40.3276] === 5G radio domain is 51, COPY 5G BDF files from non_ETSI_BDF folder ===&lt;BR /&gt;&amp;#27;[105C&lt;BR /&gt;[*01/01/1970 00:00:40.3775] 4&lt;BR /&gt;&amp;#27;[29C&lt;BR /&gt;[*01/01/1970 00:00:40.5775] Active version: 8.5.161.0&lt;BR /&gt;&amp;#27;[53C&lt;BR /&gt;[*01/01/1970 00:00:40.5775] Backup version: 0.0.0.0&lt;BR /&gt;&amp;#27;[51C&lt;BR /&gt;Jan 1 00:00:40 FIPS[1624]: *** shell: FIPS Mode = disabled ***&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;User Access Verification&lt;BR /&gt;Username: [*01/01/1970 00:00:40.7874] &lt;BR /&gt;&amp;#27;[38C&lt;BR /&gt;[*01/01/1970 00:00:40.7874] led pattern module start &lt;BR /&gt;&amp;#27;[54C&lt;BR /&gt;[*01/01/1970 00:00:40.8374] AP1852I&lt;BR /&gt;&amp;#27;[35C&lt;BR /&gt;[*01/01/1970 00:00:40.9374] nss_driver - Turbo Support 1&lt;BR /&gt;&amp;#27;[56C&lt;BR /&gt;[*01/01/1970 00:00:40.9374] Supported Frequencies - 110Mhz 550Mhz 733Mhz &lt;BR /&gt;&amp;#27;[73C&lt;BR /&gt;[*01/01/1970 00:00:40.9774] NSS firmware booted&lt;BR /&gt;&amp;#27;[47C&lt;BR /&gt;[*01/01/1970 00:00:41.0074] NSS firmware booted&lt;BR /&gt;&amp;#27;[47C&lt;BR /&gt;[*01/01/1970 00:00:41.0873] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*01/01/1970 00:00:41.0873] phy_value=0: org="0x1000" phy_reg="0x1800" &lt;BR /&gt;&amp;#27;[71C&lt;BR /&gt;[*01/01/1970 00:00:41.4472] Current value of FACTORY_RESET=0&lt;BR /&gt;&amp;#27;[60C&lt;BR /&gt;[*01/01/1970 00:00:41.4672] Last reload time: Dec 14 06:21:33 2022&lt;BR /&gt;&amp;#27;[66C&lt;BR /&gt;[*12/14/2022 06:21:33.0000] Setting system time Wed Dec 14 06:21:33 UTC 2022&lt;BR /&gt;&amp;#27;[76C&lt;BR /&gt;[*12/14/2022 06:21:33.0699] device wired0 entered promiscuous mode&lt;BR /&gt;&amp;#27;[66C&lt;BR /&gt;[*12/14/2022 06:21:33.1499] device wired1 entered promiscuous mode&lt;BR /&gt;&amp;#27;[66C&lt;BR /&gt;[*12/14/2022 06:21:33.5798] stile module dp init successfully&lt;BR /&gt;&amp;#27;[61C&lt;BR /&gt;[*12/14/2022 06:21:33.5798] NBAR Label:BLD_V155_3_S_XE316_THROTTLE_LATEST_20180404_162221 NBAR VERSION:module build date: Feb 18 2020 at 05:00:59&lt;BR /&gt;&amp;#27;[145C&lt;BR /&gt;[*12/14/2022 06:21:34.2696] miibus get eecb4000!&lt;BR /&gt;&amp;#27;[48C&lt;BR /&gt;[*12/14/2022 06:21:34.3096] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] boot 25 build T-eaf8c9a5819ff90fa88df9b4045e20adf0d0a259-geaf8c9a5-vipendya board corsica mac 50:1C:B0:24:06:D0&lt;BR /&gt;&amp;#27;[139C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: mbedtls .text=0xbf000000 data=0xbf007e18 bss=0xbf008070&lt;BR /&gt;&amp;#27;[106C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: aptrace .text=0xbf00c000 data=0xbf018834 bss=0xbf018cc0&lt;BR /&gt;&amp;#27;[106C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: led_module .text=0xbf020000 data=0xbf0204e0 bss=0xbf020b48&lt;BR /&gt;&amp;#27;[109C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: qca_nss_gmac .text=0xbf024000 data=0xbf02abc4 bss=0xbf02b088&lt;BR /&gt;&amp;#27;[111C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: qca_nss_drv .text=0xbf034000 data=0xbf04f9e8 bss=0xbf050798&lt;BR /&gt;&amp;#27;[110C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: qca_nss_capwapmgr .text=0xbf071000 data=0xbf075acc bss=0xbf075c20&lt;BR /&gt;&amp;#27;[116C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: nssmgrctl .text=0xbf07c000 data=0xbf07d728 bss=0xbf07da4c&lt;BR /&gt;&amp;#27;[108C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: proclikefs .text=0xbf083000 data= bss=0xbf083b40&lt;BR /&gt;&amp;#27;[99C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: stile_lm_ft .text= data= bss=&lt;BR /&gt;&amp;#27;[80C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: stile_lm_dp .text= data= bss=&lt;BR /&gt;&amp;#27;[80C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: ipv6 .text=0xbfa12000 data=0xbfa42f40 bss=0xbfa447ec&lt;BR /&gt;&amp;#27;[103C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: bonding .text=0xbfa5e000 data=0xbfa6f62c bss=0xbfa6fa58&lt;BR /&gt;&amp;#27;[106C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: lowmemorykiller .text=0xbfa7c000 data=0xbfa7c2c0 bss=0xbfa7c44c&lt;BR /&gt;&amp;#27;[114C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: qca_nss_profile_drv .text=0xbfa80000 data=0xbfa81320 bss=0xbfa81494&lt;BR /&gt;&amp;#27;[118C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: scsi_wait_scan .text= data= bss=&lt;BR /&gt;&amp;#27;[83C&lt;BR /&gt;[*12/14/2022 06:21:34.3196] Module: ssdk_reg .text=0xbfa8a000 data= bss=0xbfa8a838&lt;BR /&gt;&amp;#27;[97C&lt;BR /&gt;[*12/14/2022 06:21:34.7694] Last reload reason : 0: unknown&lt;BR /&gt;&amp;#27;[59C&lt;BR /&gt;[*12/14/2022 06:21:36.3689] __mm_init_module &lt;BR /&gt;&amp;#27;[45C&lt;BR /&gt;[*12/14/2022 06:21:36.4189] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:36.4189] __ol_ath_attach() Allocated scn ed1c0480&lt;BR /&gt;&amp;#27;[68C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] ol_ath_attach interface_id 0&lt;BR /&gt;&amp;#27;[56C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] Chip id: 0x9, chip version: 0x1000000&lt;BR /&gt;&amp;#27;[65C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] Target Version is 1000000&lt;BR /&gt;&amp;#27;[54C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] Flash Download Address c0000 &lt;BR /&gt;&amp;#27;[59C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] ol_transfer_bin_file: flash data file defined&lt;BR /&gt;&amp;#27;[73C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] Cal location [0]: 00000000&lt;BR /&gt;&amp;#27;[54C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:36.4289] Wifi0 NAND FLASH Select OFFSET 0x1000&lt;BR /&gt;&amp;#27;[66C&lt;BR /&gt;[*12/14/2022 06:21:36.4489] qc98xx_verify_checksum: flash checksum passed: 0x6e76&lt;BR /&gt;&amp;#27;[81C&lt;BR /&gt;[*12/14/2022 06:21:36.4489] ol_transfer_bin_file 3979: Download Flash data len 12064&lt;BR /&gt;&amp;#27;[84C&lt;BR /&gt;[*12/14/2022 06:21:36.4689] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:36.4689] Board data initialized&lt;BR /&gt;&amp;#27;[51C&lt;BR /&gt;[*12/14/2022 06:21:36.5189] ol_ath_download_firmware :First OTP download and Execute is good address:0xa000 return param 4660&lt;BR /&gt;&amp;#27;[125C&lt;BR /&gt;[*12/14/2022 06:21:36.5189] ol_ath_download_firmware:##Board Id 8 , CHIP Id 1&lt;BR /&gt;&amp;#27;[77C&lt;BR /&gt;[*12/14/2022 06:21:36.5189] ol_transfer_bin_file: Board Data File download to address=0xc0000 file name=AR900B/hw.2/boardData_AR900B_CUS260_negative_pwr_offset_2G_v2_008.bin&lt;BR /&gt;&amp;#27;[173C&lt;BR /&gt;[*12/14/2022 06:21:36.5989] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:36.5989] [Flash] : Ignore Module param&lt;BR /&gt;&amp;#27;[58C&lt;BR /&gt;[*12/14/2022 06:21:36.5989] ol_ath_download_firmware : Second OTP download and Execute is good, param=0x0 &lt;BR /&gt;&amp;#27;[106C&lt;BR /&gt;[*12/14/2022 06:21:36.6189] ol_transfer_bin_file: Downloading firmware file: AR900B/hw.2/athwlan.bin&lt;BR /&gt;&amp;#27;[100C&lt;BR /&gt;[*12/14/2022 06:21:37.7185] HTC Rx: insufficient length, got:4 expected =8&lt;BR /&gt;&amp;#27;[74C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] Startup Mode-0 set&lt;BR /&gt;&amp;#27;[46C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] HTC Service:0x0300 ep:1 TX flow control disabled&lt;BR /&gt;&amp;#27;[76C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] HTC Service:0x0100 ep:2 TX flow control disabled&lt;BR /&gt;&amp;#27;[76C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] Firmware_Build_Number:70 &lt;BR /&gt;&amp;#27;[53C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] num_rf_chain:0x00000004 ht_cap_info:0x0000185b vht_cap_info:0x339a79b2 vht_supp_mcs:0x0000ffaa&lt;BR /&gt;&amp;#27;[125C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] RES CFG Support wmi_service_bitmap 9778 &lt;BR /&gt;&amp;#27;[69C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] Sending Ext resource cfg: HOST PLATFORM as 0 and fw_feature_bitmap as 50 to TGT &lt;BR /&gt;&amp;#27;[109C&lt;BR /&gt;[*12/14/2022 06:21:37.7285] ol_ath_service_ready_event: sw_cal_support_check_flag: 1&lt;BR /&gt;&amp;#27;[84C&lt;BR /&gt;[*12/14/2022 06:21:37.7985] wmi_ready_event_rx: WMI UNIFIED READY event &lt;BR /&gt;&amp;#27;[73C&lt;BR /&gt;[*12/14/2022 06:21:37.7985] htt_h2t_frag_desc_bank_cfg_msg - HTT_H2T_MSG_TYPE_FRAG_DESC_BANK_CFG sent to FW for radio ID = 0&lt;BR /&gt;&amp;#27;[124C&lt;BR /&gt;[*12/14/2022 06:21:37.8085] ACS not enabled &lt;BR /&gt;&amp;#27;[44C&lt;BR /&gt;[*12/14/2022 06:21:37.8085] ol_ath_thermal_mitigation_attach: --&lt;BR /&gt;&amp;#27;[64C&lt;BR /&gt;[*12/14/2022 06:21:37.8485] pktlog_init: Initializing Pktlog for AR900B, pktlog_hdr_size = 16&lt;BR /&gt;&amp;#27;[94C&lt;BR /&gt;[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x3, 0xdeb001, 0x94c, 0x94c, 0x0 )&lt;BR /&gt;&amp;#27;[106C&lt;BR /&gt;[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x12, 0x1e, 0x94c, 0x94c, 0x0 )&lt;BR /&gt;&amp;#27;[103C&lt;BR /&gt;[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x45, 0x1e, 0x94c, 0x94c, 0x0 )&lt;BR /&gt;&amp;#27;[103C&lt;BR /&gt;[*12/14/2022 06:21:38.7282] FWLOG: [47158] WAL_DBGID_TX_AC_BUFFER_SET ( 0x67, 0x1e, 0x94c, 0x94c, 0x0 )&lt;BR /&gt;&amp;#27;[103C&lt;BR /&gt;[*12/14/2022 06:21:40.9075] click-config/io-real.click:131: While configuring 'todev_wired0 :: ToDevice':&lt;BR /&gt;&amp;#27;[105C&lt;BR /&gt;[*12/14/2022 06:21:40.9075] warning: device 'wired0' is down&lt;BR /&gt;&amp;#27;[62C&lt;BR /&gt;[*12/14/2022 06:21:40.9475] click-config/io-real.click:131: While configuring 'fromdev_wired0 :: FromDevice':&lt;BR /&gt;&amp;#27;[109C&lt;BR /&gt;[*12/14/2022 06:21:40.9475] warning: device 'wired0' is down&lt;BR /&gt;&amp;#27;[62C&lt;BR /&gt;[*12/14/2022 06:21:40.9975] pid 2486's current affinity mask: 3&lt;BR /&gt;&amp;#27;[63C&lt;BR /&gt;[*12/14/2022 06:21:40.9975] pid 2486's new affinity mask: 1&lt;BR /&gt;&amp;#27;[59C&lt;BR /&gt;[*12/14/2022 06:21:42.1571] click-config/io-real.click:131: While initializing 'tohost_wired0 :: ToHost':&lt;BR /&gt;&amp;#27;[105C&lt;BR /&gt;[*12/14/2022 06:21:42.1571] warning: device 'wired0' is down&lt;BR /&gt;&amp;#27;[62C&lt;BR /&gt;[*12/14/2022 06:21:43.5367] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:43.5367] Click sched monitor: schedulers = 1&lt;BR /&gt;&amp;#27;[63C&lt;BR /&gt;[*12/14/2022 06:21:44.0865] wmi_dbg_cfg_send: mod[0]00000000 dbgcfg40000000 cfgvalid[0] 00000000 cfgvalid[1] 00000000&lt;BR /&gt;&amp;#27;[117C&lt;BR /&gt;[*12/14/2022 06:21:46.0159] chatter: tohost_srcr6 :: ToHost: device 'srcr6' went down&lt;BR /&gt;&amp;#27;[85C&lt;BR /&gt;[*12/14/2022 06:21:46.0359] chatter: tohost_srcr6 :: ToHost: device 'srcr6' came up&lt;BR /&gt;&amp;#27;[83C&lt;BR /&gt;[*12/14/2022 06:21:46.0359] ip6_port srcr6, ip6local fe80::521c:b0ff:fe24:6d0, ip6 ::, plen 0, gw6 ::, gw6_mac 00:00:00:00:00:00, mtu 1500, vid 0, mode6 3(slaac)&lt;BR /&gt;&amp;#27;[161C&lt;BR /&gt;[*12/14/2022 06:21:47.4355] wired0: 1000 Mbps Full Duplex&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:21:47.4355] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:21:56.1128] Loading sha2...&lt;BR /&gt;&amp;#27;[43C&lt;BR /&gt;[*12/14/2022 06:21:56.1128] Dumpping sha1...&lt;BR /&gt;&amp;#27;[44C&lt;BR /&gt;[*12/14/2022 06:21:57.7623] Loading MIC cert and key&lt;BR /&gt;&amp;#27;[52C&lt;BR /&gt;[*12/14/2022 06:21:57.7623] Dumpping sha2...&lt;BR /&gt;&amp;#27;[44C&lt;BR /&gt;[*12/14/2022 06:21:59.4018] Loading MIC cert and key&lt;BR /&gt;&amp;#27;[52C&lt;BR /&gt;[*12/14/2022 06:21:59.7817] Generating key, this may take a while...&lt;BR /&gt;&amp;#27;[68C&lt;BR /&gt;[*12/14/2022 06:22:01.7411] Public key portion is:&lt;BR /&gt;&amp;#27;[50C&lt;BR /&gt;[*12/14/2022 06:22:01.7411] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGEol6lHAb+Cwk9eEBDa+lDc6mwHj3hY4aVLQkyWpqtItTY3LZ6++11Vnh/D5ka+GRyrS3fxKtwOinYkEfKXg3LrP4vBlNAIqtH+J/U4Rzt7LCIwpunBz3xYJ9nyM0LrUJPMIN1c52x+6V6B+Eym1dJBqH/aNGN94QHZJt9Y0AKfhXCm3Rt4uOZg30gqC/8fAIIT+D53WIB+fYD2JzLhzP8t7Ky7Ou7mux2sT93PkrEQuRC4F6c96/SolCvqPYB+ILzCBcDcRdTyxkSdJHElE1TbL7SczWziOHwZNZd/wuSL6HOaPwhgUvSocs2LzSZ3lLOWmbDyrXyF7+9UPaFC7J root@m501CB02406D0&lt;BR /&gt;&amp;#27;[75C&lt;BR /&gt;[*12/14/2022 06:22:01.7411] Fingerprint: sha1!! 23:8e:53:75:40:88:af:1b:69:85:ba:60:e5:06:03:a1:64:dc:8b:38&lt;BR /&gt;&amp;#27;[107C&lt;BR /&gt;[*12/14/2022 06:22:01.7910] pid 3706's current affinity mask: 3&lt;BR /&gt;&amp;#27;[63C&lt;BR /&gt;[*12/14/2022 06:22:01.7910] pid 3706's new affinity mask: 1&lt;BR /&gt;&amp;#27;[59C&lt;BR /&gt;[*12/14/2022 06:22:02.2709] Password for user changed&lt;BR /&gt;&amp;#27;[53C&lt;BR /&gt;[*12/14/2022 06:22:02.3709] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/1/g' -e 's/__DOMAIN_5G__/51/g' -e 's/__PWR_TABLE_49G__/0/g' -e 's/__PRODUCT_ID__/AIR-AP1852E-H-K9/g' -e 's/__AP_TYPE__/47/g' -e 's/__WIRELESS_MAC__/50:1C:B0:24:81:A0/g' -e 's/__WIRED_MAC__/50:1C:B0:24:06:D0/g' -e 's/__WIRED1_MAC__/50:1C:B0:24:06:D0/g' | DMALLOC_OPTIONS=debug=0x400003,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &amp;amp;&lt;BR /&gt;&amp;#27;[114C&lt;BR /&gt;[*12/14/2022 06:22:03.7204] DOT11_DRV[0]: Init Radio0&lt;BR /&gt;&amp;#27;[53C&lt;BR /&gt;[*12/14/2022 06:22:03.7404] DOT11_DRV[0]: Stop Radio0&lt;BR /&gt;&amp;#27;[53C&lt;BR /&gt;[*12/14/2022 06:22:03.7504] DOT11_DRV[0]: set_channel Channel set to 6&lt;BR /&gt;&amp;#27;[70C&lt;BR /&gt;[*12/14/2022 06:22:03.7504] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX failed for apr1v0 error No such device&lt;BR /&gt;&amp;#27;[147C&lt;BR /&gt;[*12/14/2022 06:22:03.7504] wcpd: /local/BUILD/workspace/85MR6_ME_CCO/corsica/router/base/../elts-meraki/elements/wcp/wcp_db.cc: 1513: void WcpDb::populate_if_index_table(): Assertion `if_index &amp;gt;= 0 &amp;amp;&amp;amp; if_index &amp;lt; 64' failed.&lt;BR /&gt;&amp;#27;[48C&lt;BR /&gt;[*12/14/2022 06:22:12.6976] ethernet_port wired0, ip 192.168.0.137, netmask 255.255.255.0, gw 192.168.0.253, mtu 1500, bcast 192.168.0.255, dns1 202.96.128.86, dns2 202.96.128.166, vid 0, static_ip_failover false, dhcp_vlan_failover false&lt;BR /&gt;&amp;#27;[62C&lt;BR /&gt;[*12/14/2022 06:22:17.8960] AP IPv4 Address updated from 0.0.0.0 to 192.168.0.137&lt;BR /&gt;&amp;#27;[81C&lt;BR /&gt;[*12/14/2022 06:22:38.4396] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:22:38.4396] !!!!! {watchdogd} Process wcpd gone for 60s&lt;BR /&gt;&amp;#27;[71C&lt;BR /&gt;[*12/14/2022 06:22:38.4396] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:22:38.4396] !!!!! {watchdogd} Process capwapd no heartbeat for 60s&lt;BR /&gt;&amp;#27;[82C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] waiting for WCP to initialize&lt;BR /&gt;&amp;#27;[57C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] Socket Invalid Element wcp/wcp_db Handler has_rlan Data 0 Length 10&lt;BR /&gt;&amp;#27;[95C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] Failed to load flex AP config from file. Default config will be used.&lt;BR /&gt;&amp;#27;[97C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] /usr/sbin/capwapd: opening /click/cli_h/apr_bypass/active failed!: No such file or directory&lt;BR /&gt;&amp;#27;[120C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] !!!!! {/usr/sbin/capwapd} failed writing /click/cli_h/apr_bypass/active len 1 data: "1"&lt;BR /&gt;&amp;#27;[115C&lt;BR /&gt;[*12/14/2022 06:23:02.4821] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_outdoor Data 0 Length 25&lt;BR /&gt;&amp;#27;[116C&lt;BR /&gt;[*12/14/2022 06:23:02.5721] Socket Invalid Element wcp/mesh_userspace/capwap Handler set_ap_I_domain Data 0 Length 25&lt;BR /&gt;&amp;#27;[117C&lt;BR /&gt;[*12/14/2022 06:23:02.7620] /usr/bin/cisco_core.sh: Corefile /storage/cores//AP501C.B024.06D0__core-wcpd.8.5.161.0.2022-12-14-05-36-16.tgz deleted.&lt;BR /&gt;&amp;#27;[147C&lt;BR /&gt;[*12/14/2022 06:23:17.4674] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:23:17.4674] phy_value=0: org="0x1800" phy_reg="0x1800" &lt;BR /&gt;&amp;#27;[71C&lt;BR /&gt;[*12/14/2022 06:23:43.4993] &lt;BR /&gt;&amp;#27;[28C&lt;BR /&gt;[*12/14/2022 06:23:43.4993] !!!!! {watchdogd} Process wcpd gone for 120s&lt;BR /&gt;&amp;#27;[72C&lt;BR /&gt;Username: cisco&lt;BR /&gt;Password: &lt;BR /&gt;AP501C.B024.06D0&amp;gt;en&lt;BR /&gt;Password: &lt;BR /&gt;AP501C.B024.06D0#show ver&lt;BR /&gt;AP501C.B024.06D0#show version &lt;BR /&gt;Restricted Rights Legend&lt;/P&gt;
&lt;P&gt;Use, duplication, or disclosure by the Government is subject to&lt;BR /&gt;restrictions as set forth in subparagraph (c) of the Commercial&lt;BR /&gt;Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and&lt;BR /&gt;subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer&lt;BR /&gt;Software clause at DFARS sec. 252.227-7013.&lt;/P&gt;
&lt;P&gt;Cisco Systems, Inc.&lt;BR /&gt;170 West Tasman Drive&lt;BR /&gt;San Jose, California 95134-1706&lt;/P&gt;
&lt;P&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;/P&gt;
&lt;P&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank" rel="noopener"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;BR /&gt;--More-- [*12/14/2022 06:24:48.5489] &lt;BR /&gt;&amp;#27;[37C&lt;BR /&gt;[*12/14/2022 06:24:48.5489] !!!!! {watchdogd} Process wcpd gone for 180s&lt;BR /&gt;&amp;#27;[72C&lt;BR /&gt;[*12/14/2022 06:24:53.0975] chatter: tohost_virtual :: ToHost: device 'virtual' went down&lt;BR /&gt;&amp;#27;[89C&lt;BR /&gt;[*12/14/2022 06:24:53.0975] chatter: tohost_vlan0 :: ToHost: device 'vlan0' went down&lt;BR /&gt;&amp;#27;[85C&lt;BR /&gt;[*12/14/2022 06:24:53.1075] chatter: tohost_vlan1 :: ToHost: device 'vlan1' went down&lt;BR /&gt;&amp;#27;[85C&lt;BR /&gt;[*12/14/2022 06:24:53.1075] chatter: tohost_vlan2 :: ToHost: device 'vlan2' went down&lt;BR /&gt;&amp;#27;[85C&lt;BR /&gt;[*12/14/2022 06:24:53.1175] chat&lt;BR /&gt;Cryptographic library self-test....&lt;BR /&gt;Testing SHA1 Short Message 1&lt;BR /&gt;Testing SHA256 Short Message 1&lt;BR /&gt;Testing SHA384 Short Message 1&lt;BR /&gt;SHA1 POST PASSED&lt;BR /&gt;Testing HMAC SHA1 Short Message 1&lt;BR /&gt;Testing HMAC SHA2 Short Message 1&lt;BR /&gt;Testing HMAC SHA384 Short Message 1&lt;BR /&gt;passed!&lt;/P&gt;
&lt;P&gt;XML config selected&lt;BR /&gt;/bin/sh: /usr/bin/iptables: not found&lt;BR /&gt;/bin/sh: /usr/bin/iptables: not found&lt;BR /&gt;Starting SSHD: ok&lt;BR /&gt;Validating XML configuration&lt;BR /&gt;Cisco is a trademark of Cisco Systems, Inc.&lt;BR /&gt;Software Copyright Cisco Systems, Inc. All rights reserved.&lt;/P&gt;
&lt;P&gt;Cisco AireOS Version 8.5.161.0&lt;BR /&gt;Initializing OS Services: ok&lt;BR /&gt;Initializing Serial Services: ok&lt;BR /&gt;Initializing Network Services: ok&lt;BR /&gt;Starting Statistics Service: ok&lt;BR /&gt;Starting ARP Services: ok&lt;BR /&gt;Starting Trap Manager: ok&lt;BR /&gt;Starting Network Interface Management Services: ok&lt;BR /&gt;Starting System Services: ok&lt;BR /&gt;Starting SNMP services: ok&lt;BR /&gt;Starting Fastpath Hardware Acceleration: Starting Switching Services: ok&lt;BR /&gt;Starting QoS Services: ok&lt;BR /&gt;Starting Policy Manager: ok&lt;BR /&gt;Starting Data Transport Link Layer: ok&lt;BR /&gt;Starting Access Control List Services: ok&lt;BR /&gt;Starting System Interfaces: &lt;BR /&gt;As the Mgmt Address is updated, all the DHCP scopes with Central NAT enabled will be disabled and enabled&lt;BR /&gt;As the Mgmt Address is updated, all the WLANs associated with central NAT enabled scopes will be enabled and disabled&lt;BR /&gt;ok&lt;BR /&gt;Starting Client Troubleshooting Service: ok&lt;BR /&gt;Starting Certificate Database: Initializing Curl Globally..&lt;BR /&gt;ok&lt;BR /&gt;Starting VPN Services: ok&lt;BR /&gt;Starting Management Frame Protection: ok&lt;BR /&gt;Starting DNS Services: ok&lt;BR /&gt;ok&lt;BR /&gt;Starting LWAPP: ok&lt;BR /&gt;Starting CAPWAP: ok&lt;BR /&gt;Starting LOCP: ok &lt;BR /&gt;Starting Security Services: ok&lt;BR /&gt;Starting Policy Manager: ok&lt;BR /&gt;Starting Authentication Engine: ok&lt;BR /&gt;Starting Mobility Management: ok&lt;BR /&gt;Starting Capwap Ping Component: ok&lt;BR /&gt;Starting AVC Services: ok&lt;BR /&gt;Starting AVC Flex Services: ok&lt;BR /&gt;Starting Virtual AP Services: ok&lt;BR /&gt;Starting AireWave Director: ok&lt;BR /&gt;Starting Network Time Services: ok&lt;BR /&gt;Starting Cisco Discovery Protocol: ok&lt;BR /&gt;Starting Broadcast Services: ok&lt;BR /&gt;Starting Logging Services: ok&lt;BR /&gt;Starting DHCP Server: ok&lt;BR /&gt;Starting IDS Signature Manager: ok&lt;BR /&gt;Starting RFID Tag Tracking: ok&lt;BR /&gt;Starting RF Profiles: ok&lt;BR /&gt;Starting Mesh Services: ok&lt;BR /&gt;Starting TSM: ok&lt;BR /&gt;Starting CIDS Services: ok&lt;BR /&gt;Starting Ethernet-over-IP: ok&lt;BR /&gt;Starting DTLS server: enabled in CAPWAP&lt;BR /&gt;Starting CleanAir: ok&lt;BR /&gt;Starting WIPS: ok &lt;BR /&gt;Starting SSHPM LSC PROV LIST: ok &lt;BR /&gt;Starting RRC Services: ok&lt;BR /&gt;Starting SXP Services: ok&lt;BR /&gt;Starting Alarm Services: ok&lt;BR /&gt;Starting FMC HS: ok &lt;BR /&gt;Starting FLEXEXPRESS ConfigSync Task: ok&lt;BR /&gt;Starting Hotspot Services: ok&lt;BR /&gt;Starting HTTP Image Download Task: ok&lt;BR /&gt;Starting Tunnel Services New: ok&lt;BR /&gt;Starting Portal Server Services: ok&lt;BR /&gt;Starting Management Services: &lt;BR /&gt;Web Server: CLI: Secure Web: ok&lt;BR /&gt;Starting IPSec Profiles component: ok&lt;BR /&gt;Starting CPU ACL Logging services: ok&lt;/P&gt;
&lt;P&gt;(Cisco Controller)&lt;/P&gt;
&lt;P&gt;Enter User Name (or 'Recover-Config' this one-time only to reset configuration to factory defaults)&lt;/P&gt;
&lt;P&gt;User: admin&lt;BR /&gt;Password:**********&lt;BR /&gt;Warning: Missing TFTP/CCO params, Please Configure the Image Download Params&lt;/P&gt;
&lt;P&gt;Welcome to the Cisco Mobility Express command line interface.&lt;BR /&gt;Only commands which are listed in the command reference guide for this release are supported.&lt;BR /&gt;&lt;A href="http://www.cisco.com/c/en/us/support/wireless/mobility-express/products-command-reference-list.html" target="_blank" rel="noopener"&gt;http://www.cisco.com/c/en/us/support/wireless/mobility-express/products-command-reference-list.html&lt;/A&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug capwap ap&amp;#8; &amp;#8;&amp;#8; &amp;#8;?&lt;BR /&gt;&lt;BR /&gt;detail Configures debug of CAPWAP detail&lt;BR /&gt;dtls-keepalive Configures debug of CAPWAP Data DTLS keep alive packets&lt;BR /&gt;errors Configures debug of CAPWAP errors&lt;BR /&gt;events Configures debug of CAPWAP events and state&lt;BR /&gt;hexdump Configures debug of CAPWAP payloads&lt;BR /&gt;info Configures debug of CAPWAP info&lt;BR /&gt;packet Configures debug of CAPWAP packet&lt;BR /&gt;payload Configures debug of CAPWAP payloads&lt;BR /&gt;&lt;BR /&gt;aggregation Configures debug of CAPWAP aggregation events&lt;BR /&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug capwap detail enable&lt;/P&gt;
&lt;P&gt;(Cisco Controller) &amp;gt;debug ca?&lt;BR /&gt;cac call-control capwap calea &lt;BR /&gt;(Cisco Controller) &amp;gt;debug capwap events *spamApTask0: Dec 14 14:30:16.559: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.559: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.559: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.559: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:16.560: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;enable&lt;/P&gt;
&lt;P&gt;(Cisco Controller) &amp;gt;debug capwap ?&lt;BR /&gt;&lt;BR /&gt;detail Configures debug of CAPWAP detail&lt;BR /&gt;dtls-keepalive Configures debug of CAPWAP Data DTLS keep alive packets&lt;BR /&gt;errors Configures debug of CAPWAP errors&lt;BR /&gt;events Configures debug of CAPWAP events and state&lt;BR /&gt;hexdump Configures debug of CAPWAP payloads&lt;BR /&gt;info Configures debug of CAPWAP info&lt;BR /&gt;packet Configures debug of CAPWAP packet&lt;BR /&gt;payload Configures debug of CAPWAP payloads&lt;BR /&gt;&lt;BR /&gt;aggregation Configures debug of CAPWAP aggregation events&lt;BR /&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug capwap info enable&lt;/P&gt;
&lt;P&gt;(Cisco Controller) &amp;gt;*capwapSocketTask: Dec 14 14:30:26.062: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:30:26.062: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.062: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:26.063: 50:1c:b0:24:81:a0 WTP already released&lt;/P&gt;
&lt;P&gt;(Cisco Controller) &amp;gt;debug ap ?&lt;BR /&gt;&lt;BR /&gt;aid Configures debug of client AID messages.&lt;BR /&gt;client-trace Debug command for AP Client Trace&lt;BR /&gt;command Remote execute a command on Cisco AP. &lt;BR /&gt;disable Disable remote debugging of Cisco AP. &lt;BR /&gt;enable Enable remote debugging of Cisco AP. &lt;BR /&gt;packet-dump Debug command for AP Packet capture&lt;BR /&gt;radar-logs Debug command for AP Radar log collection&lt;BR /&gt;show Display debug ap show commands.&lt;BR /&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug ap *capwapSocketTask: Dec 14 14:30:35.569: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:30:35.569: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.569: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:35.570: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;enable&lt;/P&gt;
&lt;P&gt;Incorrect input! Use 'debug ap enable &amp;lt;Cisco AP&amp;gt;'&lt;/P&gt;
&lt;P&gt;(Cisco Controller) &amp;gt;debug ap enable &amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;debug ap enable&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;&amp;#8; &amp;#8;?&lt;BR /&gt;&lt;BR /&gt;aid Configures debug of client AID messages.&lt;BR /&gt;client-trace Debug command for AP Client Trace&lt;BR /&gt;command Remote execute a command on Cisco AP. &lt;BR /&gt;disable Disable remote debugging of Cisco AP. &lt;BR /&gt;enable Enable remote debugging of Cisco AP. &lt;BR /&gt;packet-dump Debug command for AP Packet capture&lt;BR /&gt;radar-logs Debug command for AP Radar log collection&lt;BR /&gt;show Display debug ap show commands.&lt;BR /&gt;&lt;BR /&gt;(Cisco Controller) &amp;gt;debug ap *capwapSocketTask: Dec 14 14:30:45.071: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:30:45.072: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.072: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:45.073: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:30:54.576: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:30:54.576: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.576: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.576: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.576: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.577: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.578: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.578: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.578: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.578: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:30:54.578: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:31:04.079: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:31:04.079: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.079: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.080: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.081: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:04.081: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:31:13.584: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:31:13.585: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.585: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:13.586: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:31:23.089: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:31:23.089: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.089: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:23.090: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:31:32.593: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:31:32.593: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.593: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.593: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.593: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.594: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.595: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.595: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.595: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.595: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:32.595: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:31:42.098: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:31:42.099: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.099: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:42.100: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:31:51.602: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:31:51.602: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.602: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.603: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.604: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:31:51.604: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:01.108: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:01.108: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.108: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:01.109: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:10.612: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:10.612: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.612: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:10.613: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:20.116: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:20.116: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.116: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.117: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:20.118: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:29.619: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:29.620: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.620: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:29.621: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:39.124: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:39.125: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.125: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:39.126: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:48.629: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:48.629: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.629: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:48.630: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:32:58.134: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:32:58.134: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.134: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.134: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.135: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.136: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.136: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:32:58.136: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:33:07.636: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:33:07.637: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.637: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:07.638: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:33:17.144: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:33:17.145: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.145: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:17.146: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:33:26.648: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:33:26.648: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.648: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:26.649: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:33:36.152: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:33:36.152: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.152: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.153: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:36.154: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:33:45.655: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:33:45.655: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.655: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.656: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.657: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.657: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:45.657: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:33:55.160: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:33:55.161: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.161: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:33:55.162: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:34:04.664: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:34:04.664: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.664: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.665: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:04.666: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:34:14.169: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:34:14.169: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.169: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.170: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.171: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.171: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:14.171: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:34:23.674: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:34:23.674: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.674: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:23.675: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:34:33.177: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:34:33.178: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.178: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:33.179: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:34:42.683: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:34:42.683: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.683: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:42.684: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:34:52.184: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:34:52.185: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.185: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:34:52.186: 50:1c:b0:24:81:a0 WTP already released&lt;BR /&gt;*capwapSocketTask: Dec 14 14:35:01.689: Recieved CAPWAP Packet from=192.168.0.137:5264&lt;BR /&gt;*spamApTask0: Dec 14 14:35:01.689: 00:00:00:00:00:00 CAPWAP Control Msg Received from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 length = 4, packet received from 50:1c:b0:24:81:a0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 packet received of length 24 from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Msg Type = 1 Capwap state = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery Request from 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery request: Total msgEleLen = 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Join Priority Processing status = 0, Incoming Ap's Priority 0, MaxLrads = 50, MaxLicense=50 joined Aps =0&lt;BR /&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Send Discovery response to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 1. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 2. 232 3&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 3. 0 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 4. 50 0&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 apType = 77 apModel:&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Unknown AP type. Using Controller Version!!!&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 msgLength = 36&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: AC Descriptor message element len = 40&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 acName = wlc&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp:AC Name message element length = 47&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: WTP Radio Information msg length = 56&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp:IPv4WtpManager[0]: c0a8008d&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV4 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.690: 50:1c:b0:24:81:a0 Discovery resp: CAPWAP Control IPV6 Address len = 66&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery resp: Mwar type payload len = 77&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery resp: Expire MIC type payload len = 91&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery resp: Time sync payload len = 106&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 encodeLen = 106 len = 16 msgEleLen = 27904&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: acSendDiscoveryResponsePacket: ipv4 lrad 192.168.0.137, mwar 192.168.0.141&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: acSendDiscoveryResponsePacket.2170: ipv4 lrad 192.168.0.137, mwar 192.168.0.141 Len 164&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 Discovery Response sent to 192.168.0.137:5264&lt;/P&gt;
&lt;P&gt;*spamApTask0: Dec 14 14:35:01.691: 50:1c:b0:24:81:a0 WTP already released&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Writing reload timestamp (Wed Dec 14 06:35:09 UTC 2022) to disk&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[12/14/2022 06:35:11.8957] UBIFS: un-mount UBI device 0, volume 3&lt;BR /&gt;[12/14/2022 06:35:12.7555] Restarting system.&lt;BR /&gt;[12/14/2022 06:35:12.7955] Going down for restart now&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;U-Boot 2012.07 (btldr release 41) (Jan 05 2021 - 13:03:00)&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU General Public License, version 2" provided with&lt;BR /&gt;ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU General Public License, version 2", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html" target="_blank" rel="noopener"&gt;http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;DRAM: 1 GiB&lt;BR /&gt;NAND (ONFI): Detected SPANSION S34MS02G1 [256 MiB]&lt;BR /&gt;SF: Detected Macronix MX25U3235F [4 MiB]&lt;BR /&gt;MFG data loaded&lt;BR /&gt;Scanning shenv data blocks&lt;BR /&gt;Total valid parts=4&lt;BR /&gt;Active shenv part[0:0], write_counter=29&lt;BR /&gt;PCI0 Link Intialized&lt;BR /&gt;Net: &lt;BR /&gt;PHY ID = 0x4dd074, eth0 found AR8033 PHY&lt;BR /&gt;PHY ID = 0x4dd074, eth1 found AR8033 PHY&lt;BR /&gt;Valid I2C chip addresses: 51 52&lt;BR /&gt;AP 1832/1852 detected...&lt;BR /&gt;Power Type: 802.3af POE or Others detected...&lt;BR /&gt;Signature returns 0&lt;BR /&gt;BL signing verification success, continue to run... &lt;BR /&gt;Auto boot mode, use bootipq directly&lt;BR /&gt;Hit ESC key to stop autoboot: 5 &amp;#8;&amp;#8;&amp;#8; 4 &amp;#8;&amp;#8;&amp;#8; 3 &amp;#8;&amp;#8;&amp;#8; 2 &amp;#8;&amp;#8;&amp;#8; 1 &amp;#8;&amp;#8;&amp;#8; 0 &lt;BR /&gt;Specified BOOT: part1&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 06:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4738339#M249453</guid>
      <dc:creator>id404</dc:creator>
      <dc:date>2022-12-14T06:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: 1852E Mobility Express AP can not join ifself</title>
      <link>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4738353#M249454</link>
      <description>&lt;P&gt;&lt;BR /&gt;AP501C.B024.06D0&amp;gt;show version&lt;BR /&gt;Restricted Rights Legend&lt;/P&gt;
&lt;P&gt;Use, duplication, or disclosure by the Government is subject to&lt;BR /&gt;restrictions as set forth in subparagraph (c) of the Commercial&lt;BR /&gt;Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and&lt;BR /&gt;subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer&lt;BR /&gt;Software clause at DFARS sec. 252.227-7013.&lt;/P&gt;
&lt;P&gt;Cisco Systems, Inc.&lt;BR /&gt;170 West Tasman Drive&lt;BR /&gt;San Jose, California 95134-1706&lt;/P&gt;
&lt;P&gt;This product contains cryptographic features and is subject to United&lt;BR /&gt;States and local country laws governing import, export, transfer and&lt;BR /&gt;use. Delivery of Cisco cryptographic products does not imply&lt;BR /&gt;third-party authority to import, export, distribute or use encryption.&lt;BR /&gt;Importers, exporters, distributors and users are responsible for&lt;BR /&gt;compliance with U.S. and local country laws. By using this product you&lt;BR /&gt;agree to comply with applicable laws and regulations. If you are unable&lt;BR /&gt;to comply with U.S. and local laws, return this product immediately.&lt;/P&gt;
&lt;P&gt;A summary of U.S. laws governing Cisco cryptographic products may be found at:&lt;BR /&gt;&lt;A href="http://www.cisco.com/wwl/export/crypto/tool/stqrg.html" target="_blank"&gt;http://www.cisco.com/wwl/export/crypto/tool/stqrg.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If you require further assistance please contact us by sending email to&lt;BR /&gt;export@cisco.com.&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU General Public License, version 2" provided with&lt;BR /&gt;ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU General Public License, version 2", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/gpl-2.0.html" target="_blank"&gt;http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU Library General Public License, version 2" provided&lt;BR /&gt;with ABSOLUTELY NO WARRANTY under the terms of "GNU Library&lt;BR /&gt;General Public License, version 2", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html" target="_blank"&gt;http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU Lesser General Public License, version 2.1" provided&lt;BR /&gt;with ABSOLUTELY NO WARRANTY under the terms of "GNU Lesser&lt;BR /&gt;General Public License, version 2.1", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html" target="_blank"&gt;http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU General Public License, version 3" provided with&lt;BR /&gt;ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU General Public License, Version 3", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/gpl.html" target="_blank"&gt;http://www.gnu.org/licenses/gpl.html&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This product contains some software licensed under the&lt;BR /&gt;"GNU Affero General Public License, version 3" provided&lt;BR /&gt;with ABSOLUTELY NO WARRANTY under the terms of&lt;BR /&gt;"GNU Affero General Public License, version 3", available here:&lt;BR /&gt;&lt;A href="http://www.gnu.org/licenses/agpl-3.0.html" target="_blank"&gt;http://www.gnu.org/licenses/agpl-3.0.html&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Cisco AP Software, (ap1g4), C1852, RELEASE SOFTWARE&lt;BR /&gt;Technical Support: &lt;A href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;BR /&gt;Copyright (c) 1986-2015 by Cisco Systems, Inc.&lt;BR /&gt;Compiled Tue Feb 18 05:04:04 PST 2020&lt;/P&gt;
&lt;P&gt;ROM: Bootstrap program is U-Boot boot loader&lt;BR /&gt;BOOTLDR: U-Boot boot loader Version 41&lt;/P&gt;
&lt;P&gt;AP501C.B024.06D0 uptime is 0 days, 0 hours, 2 minutes&lt;BR /&gt;Last reload time : Wed Dec 14 06:35:09 UTC 2022&lt;BR /&gt;Last reload reason : watchdog reset(wcpd)&lt;/P&gt;
&lt;P&gt;cisco AIR-AP1852E-H-K9 ARMv7 Processor rev 0 (v7l) with 997268/731060K bytes of memory.&lt;BR /&gt;Processor board ID KWC2149041J&lt;BR /&gt;AP Running Image : 8.5.161.0&lt;BR /&gt;Primary Boot Image : 8.5.161.0&lt;BR /&gt;Backup Boot Image : 0.0.0.0&lt;BR /&gt;AP Image type : MOBILITY EXPRESS IMAGE&lt;BR /&gt;AP Configuration : MOBILITY EXPRESS CAPABLE&lt;BR /&gt;2 Gigabit Ethernet interfaces&lt;BR /&gt;1 802.11 Radios&lt;BR /&gt;Radio FW version : 64035bf3490c0cb9e24ce9b09a56fe6c&lt;BR /&gt;NSS FW version : NSS.AK.C.CS-3-fix3&lt;/P&gt;
&lt;P&gt;Base ethernet MAC Address : 50:1C:B0:24:06:D0&lt;BR /&gt;Part Number : 0-0000-00&lt;BR /&gt;PCA Assembly Number : 074-13150-02&lt;BR /&gt;PCA Revision Number : 01&lt;BR /&gt;PCB Serial Number : KWC2149041J&lt;BR /&gt;Top Assembly Part Number : 074-13150-02&lt;BR /&gt;Top Assembly Serial Number : KWC2149041J&lt;BR /&gt;Top Revision Number : A0&lt;BR /&gt;Product/Model Number : AIR-AP1852E-H-K9&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(Cisco Controller) &amp;gt;show sysinfo&lt;/P&gt;
&lt;P&gt;Manufacturer's Name.............................. Cisco Systems Inc.&lt;BR /&gt;Product Name..................................... Cisco Controller&lt;BR /&gt;Product Version.................................. 8.5.161.0&lt;/P&gt;
&lt;P&gt;System Name...................................... wlc&lt;BR /&gt;System Location..................................&lt;BR /&gt;System Contact...................................&lt;BR /&gt;System ObjectID.................................. 1.3.6.1.4.1.9.1.2250&lt;BR /&gt;IP Address....................................... 192.168.0.141&lt;BR /&gt;Last Reset....................................... 12: watchdog reset(wcpd)&lt;/P&gt;
&lt;P&gt;System Up Time................................... 0 days 0 hrs 0 mins 30 secs&lt;BR /&gt;System Timezone Location......................... (GMT +8:00) HongKong, Bejing, Chongquing&lt;BR /&gt;System Stats Realtime Interval................... 5&lt;BR /&gt;System Stats Normal Interval..................... 180&lt;/P&gt;
&lt;P&gt;Configured Country............................... Multiple Countries : BA,BH,CN,US&lt;/P&gt;
&lt;P&gt;State of 802.11b Network......................... Enabled&lt;BR /&gt;State of 802.11a Network......................... Enabled&lt;BR /&gt;Number of WLANs.................................. 1&lt;/P&gt;
&lt;P&gt;--More-- or (q)uit&lt;BR /&gt;Number of Active Clients......................... 0&lt;/P&gt;
&lt;P&gt;OUI Classification Failure Count................. 0&lt;/P&gt;
&lt;P&gt;Memory Current Usage............................. 0&lt;BR /&gt;Memory Average Usage............................. 0&lt;BR /&gt;CPU Current Usage................................ 0&lt;BR /&gt;CPU Average Usage................................ 0&lt;/P&gt;
&lt;P&gt;Flash Type....................................... Compact Flash Card&lt;BR /&gt;Flash Size....................................... 1073741824&lt;/P&gt;
&lt;P&gt;Burned-in MAC Address............................ 50:1C:B0:24:06:C0&lt;BR /&gt;Maximum number of APs supported.................. 50&lt;BR /&gt;System Nas-Id....................................&lt;BR /&gt;WLC MIC Certificate Types........................ SHA1/SHA2&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2022 06:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4738353#M249454</guid>
      <dc:creator>id404</dc:creator>
      <dc:date>2022-12-14T06:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: 1852E Mobility Express AP can not join ifself</title>
      <link>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4739130#M249493</link>
      <description>&lt;P&gt;&lt;SPAN&gt;[*12/14/2022 06:22:03.7504] DOT11_DRV[1]: wcp/RadDrv1 :: Dot11BaseDriver get_vap_if_index ioctl SIOCGIFINDEX &lt;STRONG&gt;failed for apr1v0 error No such device&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think you have a faulty AP - RMA required.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The other clue to that is "Discovery request: Total msgEleLen = 0" and "Unknown AP type"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 00:32:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/1852e-mobility-express-ap-can-not-join-ifself/m-p/4739130#M249493</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2022-12-15T00:32:27Z</dc:date>
    </item>
  </channel>
</rss>

