05-14-2020 09:01 AM
Hello everybody.
I am using DNA Center version 1.3.1.5 and Cisco WLC 3504 running firmware version 8.10.112.0. This WLC is exist on Provision - Inventory DNA Center. But on the Assurance page, there is no wireless client detected. And also on Assurance page, the WLC is shown as "No data/unmonitored". Can anyone tell me how to fix this? Thank you.
Best regards,
Lazuardi Nurfaiz
Solved! Go to Solution.
05-14-2020 02:54 PM
The certificate should get pushed during discovery, but there may be some bugs that cause it to fail. TAC will tell you:
1) Make sure you have all the right firewall ports open if there is a firewall in the path between DNA-C and WLC (ports are in DNAC docs)
2) try delete/rediscovery of WLC (you may not want to do this if you already dedicated a lot of time placing AP's on your floor maps. Deleting WLC will delete AP's as well and their placement on the map.)
3) Use api's to reprovision the telemetry profile
1. Use Apitester (https://(DNAC IP)/dna/apitester ) 2. Select network-design 3. Then extend "POST /wireless-telemetry/provision/wlc/{deviceIp} " 4. Fill in the WLC ip address and click "Try now".
05-14-2020 10:15 AM
Hello,
Do you have DNA license on the WLC? If not, you need it, as it's a requirement for DNA support.
Secondly, what does the Sync status show for the WLC under the Provision tab?
05-14-2020 10:57 AM
Hi there.
I have a DNA license on the WLC. The assurence is already running for WLC before I upgrade the firmware on DNA Center.
The sync status Managed.
05-14-2020 10:24 AM
Hello @lazuardinurfaiz15
Could you verify NTP, DNAC should discover the Access point through the wireless controller re-check the SNMP, CLI credentials, and also streaming telemetry on WLC after this you should find all the AP's joined WLC through CAPWAP appearance with DNA include clients also.
Steps to enable streaming telemetry on the WL
Login to WLC---> management ---> cloud services --->network assurance --->enable services --->save config
05-14-2020 11:01 AM
Hello @Mohamed Alhenawy
All the AP also already discovered and exist on DNAC Inventory.
Login to WLC---> management ---> cloud services --->network assurance --->enable services --->save config
I just configure those in WLC. Still no improvement in Assurance page.
05-14-2020 11:15 AM
Hello @Mohamed Alhenawy
I get these error on WLC - Network Assurance - Server
Fri May 15 01:10:56 2020 Peer certificate cannot be authenticated with given CA certificates, SSL certificate problem: self signed certificate in certificate chain
05-14-2020 11:52 AM - edited 05-14-2020 11:52 AM
Hi @lazuardinurfaiz15
Could you give output
debug transfer all enable
and
debug pm PKI enable
05-14-2020 01:07 PM
Here is the output from the debug you asked.
debug transfer all enable
(Cisco Controller) >*emWeb: May 15 02:56:33.424: [SA]
Debugging session started on May 15 02:56:33.424 for WLC AIR-CT3504-K9 Version :8.10.112.0 SN :FCW2332M0BE Hostname IDJKTDCWLC01
(Cisco Controller) >
(Cisco Controller) >
(Cisco Controller) >debug pm PKI enable
Incorrect input! Use 'debug pm [<keyword>] [enable/disable]'
(Cisco Controller) >debug pm ?
all Used to disable all debug in policy manager module
init Configures debug of policy manager initialization events
rules Configures debug of layer 3 policy events
pki Configures debug of PKI-related events
(Cisco Controller) >debug pm pki enable
(Cisco Controller) >*sshpmLscTask: May 15 02:57:53.734: [SA] sshpmLscTask: LSC Task received a message 4
*sshpmLscTask: May 15 02:59:52.751: [SA] sshpmLscTask: LSC Task received a message 4
(Cisco Controller) >
(Cisco Controller) >*sshpmLscTask: May 15 03:01:51.766: [SA] sshpmLscTask: LSC Task received a message 4
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert ><
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert ><
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnOldDefaultIdCert<
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: found match in row 0
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnOldDefaultIdCert<
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: found match in row 0
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnDefaultIdCert<
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: found match in row 1
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnDefaultIdCert<
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: found match in row 1
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: called to lookup cert >cscoDefaultIdCert<
*SNMPTask: May 15 03:02:34.817: [SA] sshpmGetIdCertIndex: found match in row 2
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >cscoDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 2
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >cscoSha2IdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 3
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >cscoSha2IdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 3
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnSslWebadminCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 4
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnSslWebadminCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 4
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnSslWebauthCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 5
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert ><
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnSslWebauthCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 5
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert ><
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnOldDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 0
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnOldDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 0
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 1
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 1
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >cscoDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 2
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: called to lookup cert >cscoDefaultIdCert<
*SNMPTask: May 15 03:02:34.818: [SA] sshpmGetIdCertIndex: found match in row 2
*emWeb: May 15 03:02:44.695: [SA] sshpmGetCID: called to evaluate <cscoSha2IdCert>
*emWeb: May 15 03:02:45.448: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnSslWebadminCert<
*emWeb: May 15 03:02:45.448: [SA] sshpmGetIdCertIndex: found match in row 4
*emWeb: May 15 03:02:45.448: [SA] sshpmGetIdCertIndex: called to lookup cert >bsnSslWebauthCert<
*emWeb: May 15 03:02:45.448: [SA] sshpmGetIdCertIndex: found match in row 5
(Cisco Controller) >
(Cisco Controller) >*sshpmLscTask: May 15 03:03:50.783: [SA] sshpmLscTask: LSC Task received a message 4
05-14-2020 12:28 PM
Are you using CA signed cert on the DNA and using self-signed on the WLC or are both devices using self-signed?
The error you have is similar to an IOS-XE controller such as 9800. It's either a certificate trust issue or the devices are checking if there is a revocation on the certificate.
I don't have a 3504 WLC, so I don't know what commands to tell you, but this is what I did to fix same issue with a 9800, which is an IOS-XE controller. Under the pki trustpoint for the WLC certificate and the Trustpoint profile sent by the DNAC, which I think is sdn-network-infra-iwan, I added revocation-check none.
05-14-2020 01:09 PM
Hi @grabonlee
I think I use self signed certificate on DNA and WLC.
which I think is sdn-network-infra-iwan, I added revocation-check none.
How can I add revocation-check none ?
05-14-2020 01:44 PM
The commands for AIREOS controller is different from IOS-XE controller, so I can't help you on that. I merely pointed what may be your issue, as it's same as I had with an IOS-XE controller. You can do a show telemetry on your WLC to see the status of the connection between the WLC and DNAC.
I would suggest you a open a TAC, as TAC would know the commands for you to apply.
05-14-2020 02:54 PM
The certificate should get pushed during discovery, but there may be some bugs that cause it to fail. TAC will tell you:
1) Make sure you have all the right firewall ports open if there is a firewall in the path between DNA-C and WLC (ports are in DNAC docs)
2) try delete/rediscovery of WLC (you may not want to do this if you already dedicated a lot of time placing AP's on your floor maps. Deleting WLC will delete AP's as well and their placement on the map.)
3) Use api's to reprovision the telemetry profile
1. Use Apitester (https://(DNAC IP)/dna/apitester ) 2. Select network-design 3. Then extend "POST /wireless-telemetry/provision/wlc/{deviceIp} " 4. Fill in the WLC ip address and click "Try now".
05-14-2020 08:55 PM
Thank you! I try your suggest on step 3 and now on the Assurance page is showing the wireless device and also the wireless client.
06-16-2020 07:23 PM
Hello, i have the same problem but when in run de Apitester, the result is a code 202.
I think the problem is with the certificates.
10-14-2020 09:16 AM - edited 10-14-2020 09:27 AM
i do have the same problem....now it solved.
some tips to workaround
-make sure WLC has been discovered by dnac with netconf enable.
-if, from dnac assurance WLC show no data/unmonitored. You might need to delete the wlc device from inventory & re-discover the wlc but before that...
-go to logon to the wlc and select configuration-> services -> cloud services.
-under network assurance configuration, enable service status & put DNAC ip address on URL.
back to dnac and re-discover the wlc.
for me, it work and now i can monitor wlc under assurance
DNAC ver 1.3.0.147
WLC C9800 ver 6.12.03
SI Engineer
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide