<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco 5508 Wireless LAN Controller Upgrade from 8.0.152.0 to 8.5.140.0 in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cisco-5508-wireless-lan-controller-upgrade-from-8-0-152-0-to-8-5/m-p/5353677#M287842</link>
    <description>&lt;P&gt;Cisco 5508 Wireless LAN Controller (WLC) from Software Version 8.0.x to 8.5.140.0 when legacy Access Points (APs) such as the AIR-CAP3502I-A-K9/AIR-CAP3602I-A-K9/AIR-CAP3702I-A-K9 series fail to register due to expired Manufacturing Installed Certificates (MIC) and DTLS handshake failures.&lt;BR /&gt;&lt;BR /&gt;Error log:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Mar&amp;nbsp; 1 00:01:36.347: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:45.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.111.4.4 peer_port: 5246&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: %PKI-3-CERTIFICATE_INVALID_EXPIRED: Certificate chain validation has failed.&amp;nbsp; The certificate (SN: 1C2C8A5900000009D45D) has expired.&amp;nbsp;&amp;nbsp;&amp;nbsp; Validity period ended on 03:08:22 UTC May 10 2023Peer certificate verification failed 001A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:508 Certificate verified failed!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 10.111.4.4:5246&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.111.4.4:5246&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cause:&lt;/P&gt;&lt;P&gt;Legacy APs ship with MICs that have reached end-of-life (EOL) validity windows. After the WLC upgrade DTLS negotiations enforce certificate checks aligned to SHA-2 requirements, causing CAPWAP DTLS to fail when AP MICs are expired.&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Backup the current configuration:&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Upload File → select TFTP/SFTP, server IP, and path.&lt;BR /&gt;&lt;/STRONG&gt;Save a verified backup.&lt;/LI&gt;&lt;LI&gt;Reboot the WLC on current code to ensure a clean state:&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Reboot.&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Temporarily set the controller date to a year within AP MIC validity (example: 2021):&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Set Time.&lt;BR /&gt;&lt;/STRONG&gt;Note: Do not use NTP during this step.&lt;/LI&gt;&lt;LI&gt;Transfer the 8.5.140.0 image:&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Download File → choose TFTP/SFTP, server IP, path, and filename. &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Reboot into 8.5.140.0 and save configuration.&lt;/LI&gt;&lt;LI&gt;Temporarily ignore MIC certificate expiry for APs:&lt;BR /&gt;&lt;STRONG&gt;CLI → WLC&amp;gt; config ap cert-expiry-ignore mic enable&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Remove/disable NTP servers:&lt;BR /&gt;&lt;STRONG&gt;GUI → Controller → NTP → Server → remove entries.&lt;/STRONG&gt; This avoids time drift corrections until APs complete join and image negotiation.&lt;/LI&gt;&lt;LI&gt;Allow 5–10 minutes for APs to boot, download any required image bundles, and register. Monitor join status.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Dec 2025 02:25:41 GMT</pubDate>
    <dc:creator>00un9wsyaSrkvoKmS5d6</dc:creator>
    <dc:date>2025-12-10T02:25:41Z</dc:date>
    <item>
      <title>Cisco 5508 Wireless LAN Controller Upgrade from 8.0.152.0 to 8.5.140.0</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5508-wireless-lan-controller-upgrade-from-8-0-152-0-to-8-5/m-p/5353677#M287842</link>
      <description>&lt;P&gt;Cisco 5508 Wireless LAN Controller (WLC) from Software Version 8.0.x to 8.5.140.0 when legacy Access Points (APs) such as the AIR-CAP3502I-A-K9/AIR-CAP3602I-A-K9/AIR-CAP3702I-A-K9 series fail to register due to expired Manufacturing Installed Certificates (MIC) and DTLS handshake failures.&lt;BR /&gt;&lt;BR /&gt;Error log:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Mar&amp;nbsp; 1 00:01:36.347: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:45.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.111.4.4 peer_port: 5246&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: %PKI-3-CERTIFICATE_INVALID_EXPIRED: Certificate chain validation has failed.&amp;nbsp; The certificate (SN: 1C2C8A5900000009D45D) has expired.&amp;nbsp;&amp;nbsp;&amp;nbsp; Validity period ended on 03:08:22 UTC May 10 2023Peer certificate verification failed 001A&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:508 Certificate verified failed!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 10.111.4.4:5246&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*Dec&amp;nbsp; 2 16:33:46.235: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.111.4.4:5246&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cause:&lt;/P&gt;&lt;P&gt;Legacy APs ship with MICs that have reached end-of-life (EOL) validity windows. After the WLC upgrade DTLS negotiations enforce certificate checks aligned to SHA-2 requirements, causing CAPWAP DTLS to fail when AP MICs are expired.&lt;/P&gt;&lt;P&gt;Solution:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Backup the current configuration:&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Upload File → select TFTP/SFTP, server IP, and path.&lt;BR /&gt;&lt;/STRONG&gt;Save a verified backup.&lt;/LI&gt;&lt;LI&gt;Reboot the WLC on current code to ensure a clean state:&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Reboot.&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Temporarily set the controller date to a year within AP MIC validity (example: 2021):&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Set Time.&lt;BR /&gt;&lt;/STRONG&gt;Note: Do not use NTP during this step.&lt;/LI&gt;&lt;LI&gt;Transfer the 8.5.140.0 image:&lt;BR /&gt;&lt;STRONG&gt;GUI → Commands → Download File → choose TFTP/SFTP, server IP, path, and filename. &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Reboot into 8.5.140.0 and save configuration.&lt;/LI&gt;&lt;LI&gt;Temporarily ignore MIC certificate expiry for APs:&lt;BR /&gt;&lt;STRONG&gt;CLI → WLC&amp;gt; config ap cert-expiry-ignore mic enable&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Remove/disable NTP servers:&lt;BR /&gt;&lt;STRONG&gt;GUI → Controller → NTP → Server → remove entries.&lt;/STRONG&gt; This avoids time drift corrections until APs complete join and image negotiation.&lt;/LI&gt;&lt;LI&gt;Allow 5–10 minutes for APs to boot, download any required image bundles, and register. Monitor join status.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 02:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5508-wireless-lan-controller-upgrade-from-8-0-152-0-to-8-5/m-p/5353677#M287842</guid>
      <dc:creator>00un9wsyaSrkvoKmS5d6</dc:creator>
      <dc:date>2025-12-10T02:25:41Z</dc:date>
    </item>
  </channel>
</rss>

