cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3361
Views
0
Helpful
6
Replies

V_wlc ios 7.3 and 2602e ap is not able to join

chandru.j
Level 1
Level 1

Hello all,

             Below are the errors that i am getting while trying to register AP (2606e) with vWLC (7.3.112) .

That is the error on vwlc

*spamApTask6: Mar 08 18:07:24.594: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 18:06:09.178: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 18:05:04.179: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 18:03:48.763: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 18:02:43.759: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 18:01:27.378: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 18:00:22.403: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 17:59:06.962: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 17:58:01.955: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*emWeb: Mar 08 17:58:00.080: #WEB-3-FORM_SUBMIT_FAILED: ap_join_stats.c:475 Form submission failed for file:ap_join_stats_list.html.

*spamApTask6: Mar 08 17:56:46.540: #DTLS-3-HANDSHAKE_FAILURE: openssl_dtls.c:681 Failed to complete DTLS handshake with peer 10.129.150.229

*spamApTask6: Mar 08 17:55:41.534: #DTLS-3-HANDSHAKE_FAILURE:

Beow error from AP 2602e

(note:we are assignig static ip to ap after assigning this static ip are getting following error)

*May 31 00:07:20.047: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER

*May 31 00:07:20.047: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255lwapp_crypto_init: MIC Present and Parsed Successfully

Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)

*May 31 00:07:46.063: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER

AP442b.039a.8b77>

AP442b.039a.8b77>

AP442b.039a.8b77>en

Password:

*May 31 00:07:57.063: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Mar  8 12:53:12.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.129.150.223 peer_port: 5246Peer certificate verification failed 000B

*Mar  8 12:53:12.015: %CAPWAP-3-ERRORLOG: Certificate verification failed!

*Mar  8 12:53:12.015: DTLS_CLIENT_ERROR: ../capwap/base_capwap/capwap/base_capwap_wtp_dtls.c:337 Certificate verified failed!

*Mar  8 12:53:12.015: %DTLS-5-SEND_ALERT: Send FATAL : Bad certificate Alert to 10.129.150.223:5246

*Mar  8 12:53:12.015: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.129.150.223:5246

*Mar  8 12:53:12.015: %CAPWAP-3-ERRORLOG: Invalid event 38 & state 3 combination.

Password:

But in wlc statistis we are able to see the ap join mac, screen shot is attached

6 Replies 6

maldehne
Cisco Employee
Cisco Employee

please do the following:

monitor --> statisitics --> click the AP name  in the output you will find an indicator why the AP is not able to join

the controller is arguing about the certificate.

Pleae have the following debug outputs collected from controller:

debug mac addr < ap mac addr >

debug capwap event enable

debug capwap error enable

debug pm pki enable

on the AP, please have the following :

debug capwap client event

debug capwap client error

from the controller please have the following outputs attched:

show msglog

show traplog

from the AP

show capwap client config

show capwap client rcb

--------------------------------------------------------------------

Please make sure to rate correct answers

Thanks maldehne, find the log message below.

(Cisco Controller) >

(Cisco Controller) >show msglog

Message Log Severity Level ...................... ERROR

*fp_main_task: Mar 08 20:24:27.162: #LOG-3-Q_IND: sisf_shim_utils.c:316 Internal error, NULL entry in sisf_sw_policy_get_cfg_ptr[...It occurred 3 times.!]

                                                                          *fp_main_task: Mar 08 20:24:27.148: #SISF-3-INTERNAL: sisf_shim_utils.c:316 Internal error, NULL entry in sisf_sw_policy_get_cfg_ptr

*fp_main_task: Mar 08 20:24:27.147: #SISF-3-INTERNAL: sisf_shim_utils.c:316 Internal error, Can't create the acl for 0000019F

*fp_main_task: Mar 08 20:24:25.925: #MM-3-MEMBER_ADD_FAILED: mm_dir.c:1193 Could not add Mobility Member. Reason: IP already assigned, Member-Count:1,MAC: 00:00:00:00:00:00, IP: 0.0.0.0

*mfpKeyRefreshTask: Mar 08 20:24:21.957: #SSHPM-3-NOT_INIT: bsnrandom.c:620 Random context not initialized

(Cisco Controller) show>

(Cisco Controller) show>trap?

trapflags      traplog

(Cisco Controller) show>traplog

Number of Traps Since Last Reset ............ 5

Number of Traps Since Log Last Displayed .... 0

Log System Time              Trap

--- ------------------------ -------------------------------------------------

  0 Fri Mar  8 20:25:31 2013 Controller time base status - Controller is out o

                             f sync with the central timebase.

  1 Fri Mar  8 20:25:06 2013 Cold Start:

  2 Fri Mar  8 20:24:30 2013 Link Up: Slot: 0 Port: 1  Admin Status: Enable Op

                             er Status: Link Up

  3 Fri Mar  8 20:24:27 2013 A RF group member has been added on 802.11a netwo

                             rk on controller with  IP 10.129.150.223(MAC 00:0

                             c:29:10:ed:c4)

  4 Fri Mar  8 20:24:27 2013 A RF group member has been added on 802.11b/g net

                             work on controller with  IP 10.129.150.223(MAC 00

                             :0c:29:10:ed:c4)

Would you like to display more entries? (y/n)

AP442b.039a.8b77#show capwap client rcb

AdminState                  :  ADMIN_ENABLED

SwVer                       :  7.2.104.6

NumFilledSlots              :  0

Name                        :  AP442b.039a.8b77

Location                    :  default location

MwarName                    :  V_WLC

MwarApMgrIp                 :  10.129.150.223

MwarHwVer                   :  0.0.0.0

ApMode                      :  Local

ApSubMode                   :  Not Configured

OperationState              :

CAPWAP Path MTU             :  576

LinkAuditing                :  disabled

AP Rogue Detection Mode     :  Enabled

AP Tcp Mss Adjust           :  Disabled

Band Direct                 :  Disabled

Predownload Status          :  None

Auto Immune Status          :  Disabled

RA Guard Status             :  Disabled

Efficient Upgrade State     :  Disabled

Efficient Upgrade Role      :  None

TFTP Server                 :  Disabled

AP442b.039a.8b77#show cap

AP442b.039a.8b77#show capwap cli

AP442b.039a.8b77#show capwap client config

configMagicMark         0xF1E2D3C4

chkSumV2                31105

chkSumV1                26827

swVer                   7.2.104.6

adminState              ADMIN_ENABLED(1)

name                    AP442b.039a.8b77

location                default location

group name             

mwarName               

mwarIPAddress           0.0.0.0

mwarName               

mwarIPAddress           0.0.0.0

mwarName               

mwarIPAddress           0.0.0.0

ssh status              Disabled

Telnet status           Disabled

numOfSlots              0

spamRebootOnAssert      1

spamStatTimer           180

randSeed                0xBAD0

transport               SPAM_TRANSPORT_L3(2)

transportCfg            SPAM_TRANSPORT_DEFAULT(0)

initialisation          SPAM_PRODUCTION_DISCOVERY(1)

--More--                           ApMode                  Local

ApSubMode               Not Configured

AP Rogue Detection Mode Enabled

OfficeExtend AP         [0] Disabled

OfficeExtend AP JoinMode[0] Standard

Discovery Timer         10 secs

Heart Beat Timer        30 secs

Led State Enabled       255

Primed Interval         0

AP ILP Pre-Standard Switch Support Disabled

AP Power Injector Disabled

Infrastructure MFP validation Enabled

non-occupancy channels:

Ethernet (Duplex/Speed) auto/auto

Slot 0

    adminstate              ADMIN_ENABLED(1)

    radioType               RADIO_TYPE_UNKNOWN

    countryCode             ^@^@^@

    countryISOCode          ^@^@^@

    chanAutoCfg             CONFIG_AUTO

    channel                 0

    txPowerAutoCfg          CONFIG_AUTO

--More--                               txPowerLevel            0

    diversitySelection      DIVERSITY_ENABLED

    Antenna Mode            ANTENNA_OMNI

    antennaSelection_0      INTERNAL_ANTENNA

    antennaSelection_1      INTERNAL_ANTENNA

    antennaSelection_2      INTERNAL_ANTENNA

    antennaSelection_3      INTERNAL_ANTENNA

    twiceExtAntennaGain     0

    Profile Mode            CONFIG_AUTO

    Load Profile

     rfBusyThreshold        0

     numClientsThreshold    0

     bytesPerSecThreshold   0

    Interference Profile

     InterferenceThreshold  0

    Noise Profile

     NoiseThreshold         0

    Coverage Profile

     SNRThreshold           0

     ExceptionThreshold     0

     minClientsThreshold    0

     11gSupport             Disabled

     override mode          Disabled

--More--                               CCX RM Mode             CONFIG_AUTO

     CCX RM Config

     rm state              0

     rm meas interval      0

     rts enabled            0

     rts threshold          2347

     LOMM optimization 0

     LOMM Number of Channels 0

          channel[0] = 0, channel[1] = 0, channel[2] = 0, channel[3] = 0,

     FMC HS AP Type is 0, Threshhold 0

Slot 1

    adminstate              ADMIN_ENABLED(1)

    radioType               RADIO_TYPE_UNKNOWN

    countryCode             ^@^@^@

    countryISOCode          ^@^@^@

    chanAutoCfg             CONFIG_AUTO

    channel                 0

    txPowerAutoCfg          CONFIG_AUTO

    txPowerLevel            0

    diversitySelection      DIVERSITY_ENABLED

    Antenna Mode            ANTENNA_OMNI

    antennaSelection_0      INTERNAL_ANTENNA

    antennaSelection_1      INTERNAL_ANTENNA

--More--

logging facility kern

        ^

% Invalid input detected at '^' marker.

                              antennaSelection_2      INTERNAL_ANTENNA

    antennaSelection_3      INTERNAL_ANTENNA

    twiceExtAntennaGain     0

    Profile Mode            CONFIG_AUTO

    Load Profile

     rfBusyThreshold        0

     numClientsThreshold    0

     bytesPerSecThreshold   0

    Interference Profile

     InterferenceThreshold  0

    Noise Profile

     NoiseThreshold         0

    Coverage Profile

     SNRThreshold           0

     ExceptionThreshold     0

     minClientsThreshold    0

     11gSupport             Disabled

     override mode          Disabled

    CCX RM Mode             CONFIG_AUTO

     CCX RM Config

     rm state              0

     rm meas interval      0

     rts enabled            0

  Debug message from controller below.

(Cisco Controller) >*spamApTask3: Mar 08 20:29:49.249: 44:2b:03:9a:8b:70 Discovery Request from 10.129.150.175:43192

*spamApTask3: Mar 08 20:29:49.250: 44:2b:03:9a:8b:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0

*spamApTask3: Mar 08 20:29:49.250: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192

*spamApTask3: Mar 08 20:29:49.250: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192

*sshpmLscTask: Mar 08 20:30:31.894: sshpmLscTask: LSC Task received a message 4

*spamApTask3: Mar 08 20:31:09.550: 44:2b:03:9a:8b:70 Discovery Request from 10.129.150.175:43192

*spamApTask3: Mar 08 20:31:09.550: 44:2b:03:9a:8b:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0

*spamApTask3: Mar 08 20:31:09.551: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192

*spamApTask3: Mar 08 20:31:09.551: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192

*spamApTask3: Mar 08 20:32:28.940: 44:2b:03:9a:8b:70 Discovery Request from 10.129.150.175:43192

*spamApTask3: Mar 08 20:32:28.940: 44:2b:03:9a:8b:70 Join Priority Processing status = 0, Incoming Ap's Priority 1, MaxLrads = 200, joined Aps =0

*spamApTask3: Mar 08 20:32:28.941: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192

*spamApTask3: Mar 08 20:32:28.941: 44:2b:03:9a:8b:70 Discovery Response sent to 10.129.150.175:43192

*sshpmLscTask: Mar 08 20:32:34.644: sshpmLscTask: LSC Task received a message 4

*spamApTask3: Mar 08 20:32:38.955: 44:2b:03:9a:8b:70 DTLS connection not found, creating new connection for 10:129:150:175 (43192) 10:129:150:223 (5246)

*spamApTask3: Mar 08 20:32:38.955: sshpmGetCID: called to evaluate

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.956: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.957: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.957: sshpmGetCertFromCID: called to get cert for CID 17a666f7

*spamApTask3: Mar 08 20:32:38.957: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultCaCert<

*spamApTask3: Mar 08 20:32:38.957: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultRootCaCert<

*spamApTask3: Mar 08 20:32:38.962: sshpmGetCertFromCID: comparing to row 2, certname >bsnDefaultCaCert<

*spamApTask3: Mar 08 20:32:38.962: sshpmGetCertFromCID: comparing to row 3, certname >bsnDefaultBuildCert<

*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 4, certname >cscoDefaultNewRootCaCert<

*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 5, certname >cscoDefaultMfgCaCert<

*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.963: sshpmGetCertFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.963: sshpmGetCID: called to evaluate

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 0, CA cert >bsnOldDefaultCaCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 1, CA cert >bsnDefaultRootCaCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 2, CA cert >bsnDefaultCaCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 3, CA cert >bsnDefaultBuildCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 4, CA cert >cscoDefaultNewRootCaCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 5, CA cert >cscoDefaultMfgCaCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 0, ID cert >bsnOldDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 1, ID cert >bsnDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.964: sshpmGetCID: comparing to row 2, ID cert >cscoDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: called to get key for CID 17a666f7

*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: comparing to row 0, certname >bsnOldDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: comparing to row 1, certname >bsnDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: comparing to row 2, certname >cscoDefaultIdCert<

*spamApTask3: Mar 08 20:32:38.965: sshpmGetSshPrivateKeyFromCID: match in row 2

Debug message from AP

P442b.039a.8b77#deb

AP442b.039a.8b77#debug cap

AP442b.039a.8b77#debug capwap cli

AP442b.039a.8b77#debug capwap client ev

AP442b.039a.8b77#debug capwap client event

CAPWAP Client EVENT display debugging is on

AP442b.039a.8b77#

logging facility kern

        ^

% Invalid input detected at '^' marker.

logging trap emergencies

        ^

% Invalid input detected at '^' marker.

logging facility kern

        ^

% Invalid input detected at '^' marker.

logging trap emergencies

        ^

% Invalid input detected at '^' marker.

Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)

*Mar  8 15:02:08.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired

*Mar  8 15:02:08.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed

*Mar  8 15:02:08.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.129.150.223:5246

*Mar  8 15:02:08.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.

*Mar  8 15:02:08.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.

*Mar  8 15:02:08.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.

*Mar  8 15:02:08.999: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255

*Mar  8 15:02:09.387: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.

*Mar  8 15:02:09.387: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.

AP442b.039a.8b77#de

AP442b.039a.8b77#deb

AP442b.039a.8b77#debug ca

AP442b.039a.8b77#debug ca

*Mar  8 15:02:18.387: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER

*Mar  8 15:02:18.387: %CAPWAP-3-EVENTLOG: Discovery Request sent to 10.129.150.223 with discovery type set to 1

*Mar  8 15:02:18.387: %CAPWAP-3-EVENTLOG: Discovery Request sent to 255.255.255.255 with discovery type set to 0

*Mar  8 15:02:18.387: %CAPWAP-3-EVENTLOG: Discovery Response from 10.129.150.223cli

AP442b.039a.8b77#debug cacli         p

AP442b.039a.8b77#debug capwap cli

AP442b.039a.8b77#debug capwap client err

AP442b.039a.8b77#debug capwap client error

CAPWAP Client ERROR display debugging is on

AP442b.039a.8b77#

*Mar  8 15:02:28.387: %CAPWAP-3-EVENTLOG: Selected MWAR 'V_WLC' (index 0).

*Mar  8 15:02:28.387: %CAPWAP-3-EVENTLOG: Ap mgr count=1

*Mar  8 15:02:28.387: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Mar  8 15:02:28.387: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 0xA8196DF , load = 0..

*Mar  8 15:02:28.387: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.

*Mar  8 15:02:28.000: %CAPWAP-3-EVENTLOG: Setting time to 15:02:28 UTC Mar 8 2013

*Mar  8 15:02:28.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.129.150.223 peer_port: 5246

*Mar  8 15:02:28.000: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Setup.

*Mar  8 15:02:58.051: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_connection_db.c:2051 Max retransmission count reached!

logging facility kern

        ^

% Invalid input detected at '^' marker.

logging trap emergencies

        ^

% Invalid input detected at '^' marker.

logging facility kern

        ^

% Invalid input detected at '^' marker.

logging trap emergencies

        ^

% Invalid input detected at '^' marker.

Translating "CISCO-CAPWAP-CONTROLLER"...domain server (255.255.255.255)

*Mar  8 15:03:27.999: %CAPWAP-3-EVENTLOG: Wait DTLS timer has expired

*Mar  8 15:03:27.999: %CAPWAP-3-EVENTLOG: Dtls session establishment failed

*Mar  8 15:03:27.999: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 10.129.150.223:5246

*Mar  8 15:03:27.999: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Teardown.

*Mar  8 15:03:27.999: %CAPWAP-3-EVENTLOG: DTLS session cleanup completed. Restarting capwap state machine.

*Mar  8 15:03:27.999: %CAPWAP-3-EVENTLOG: Previous CAPWAP state was DTLS Setup,numOfCapwapDiscoveryResp = 1.

*Mar  8 15:03:27.999: %LWAPP-3-CLIENTERRORLOG: LWAPP LED Init: incorrect led state 255

*Mar  8 15:03:28.387: %CAPWAP-3-EVENTLOG: Starting Discovery. Initializing discovery latency in discovery responses.

*Mar  8 15:03:28.387: %CAPWAP-3-EVENTLOG: CAPWAP State: Discovery.

*Mar  8 15:03:37.391: %CAPWAP-3-ERRORLOG: Could Not resolve CISCO-CAPWAP-CONTROLLER

*Mar  8 15:03:37.391: %CAPWAP-3-EVENTLOG: Discovery Request sent to 10.129.150.223 with discovery type set to 1

*Mar  8 15:03:37.391: %CAPWAP-3-EVENTLOG: Discovery Request sent to 255.255.255.255 with discovery type set to 0

*Mar  8 15:03:37.395: %CAPWAP-3-EVENTLOG: Discovery Response from 10.129.150.223

*Mar  8 15:03:47.391: %CAPWAP-3-EVENTLOG: Selected MWAR 'V_WLC' (index 0).

*Mar  8 15:03:47.391: %CAPWAP-3-EVENTLOG: Ap mgr count=1

*Mar  8 15:03:47.391: %CAPWAP-3-ERRORLOG: Go join a capwap controller

*Mar  8 15:03:47.391: %CAPWAP-3-EVENTLOG: Choosing AP Mgr with index 0, IP = 0xA8196DF , load = 0..

*Mar  8 15:03:47.391: %CAPWAP-3-EVENTLOG: Synchronizing time with AC time.

*Mar  8 15:03:48.000: %CAPWAP-3-EVENTLOG: Setting time to 15:03:48 UTC Mar 8 2013

*Mar  8 15:03:48.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 10.129.150.223 peer_port: 5246

*Mar  8 15:03:48.000: %CAPWAP-3-EVENTLOG: CAPWAP State: DTLS Setup.

seems that the debugs are not complete,

there should be more i guess.

simply the join is not proceeding but we should see more to identify what is going on.

In the mean time try to reload the controller.

How it goes ??

can i have show version output form the AP ?

From the controller :

monitor --> statisitics --> click the AP name  in the output you will find an indicator why the AP is not able to join

Leo Laohoo
Hall of Fame
Hall of Fame

Can you post the following output please?

1.  vWLC:  sh sysinfo;

2.  AP:  sh version

3.  AP:  sh inventory

chris_day
Level 1
Level 1

This is strange because it could be the ap is refusing the cert of the controller because its self signed and not MSC installed. Cisco is suppose to send all new APs with 7.3 release firmware so they accept the SSC so do check the version on the AP because prior to 7.3 firmware the AP can't join a vwlc as they use a self signed cert. I have also seen this issue when a vwlc is put in and the admin forgets to accept the license agreement. This is important, you must actually view the license to accept it and then reboot the controller.

Sent from Cisco Technical Support iPhone App

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card