08-31-2018 03:25 AM - edited 07-05-2021 09:04 AM
Hi,
I'm trying to joing a AIR-CAP2602I-E-K9 to my 1852i with mobility express.
this should work as subordinate AP (table 2)
The 1852i says:
Unable to get Ap mode in Join request
Join request not accepted: Unsupported AP Model AIR-CAP2602I-E-K9
Join Request Process Failed: Unsupported ap model in join request from
Please can anyone help?
What am I'm missing?
The 1852i has fw 8.6.101.0
Thanks and kind regards
Sepp
Solved! Go to Solution.
10-11-2018 02:56 AM
Hi,
Have tried this one https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_Cisco_Mobility_Express_Deployment_Guide/b_Cisco_Mobility_Express_Deployment_Guide_chapter_0110.html for joining the CAPWAP APs to ME AP?
10-22-2018 07:23 AM
Thank you very much indeed for pointing me in this direction!
As I read about the "ap_bundle zip" things became much more clear to me.
It works now!
What I did:
Installing the "ap3g2"-file which was in the controler-image.tar onto the 2602i.
This is actually the "k9w8-mx.153-3.JD16"-version. The "JF8"-Version is not working.
08-31-2018 03:36 AM - edited 08-31-2018 03:37 AM
That won't work.
8.6.101.0 will not support 2600/3600. Downgrade to 8.5.X.X and the AP will join.
Even though 2600/3600 can run the CAPWAP image of 8.6, 8.7 and 8.8, there is a "hardware lock" which is a list of what APs can join the WLC or ME.
08-31-2018 04:10 AM
Thank you very much for your fast help! I will try this.
09-06-2018 08:00 AM
Hi again,
I downgraded to 8.5. The previous error is gone, thanks!
Still, the AP won't join.
Debug capwap error:
*spamApTask0: Sep 06 16:46:03.113: 00:56:2b:00:73:b0 ApModel: AIR-CAP2602I-E-K9
*spamApTask0: Sep 06 16:46:13.368: 00:56:2b:00:73:b0 Unable to get Ap mode in Join request
*spamApTask0: Sep 06 16:46:13.369: 00:56:2b:00:73:b0 State machine handler: Failed to process msg type = 3 state = 0 from 172.30.3.246:51135
*spamApTask0: Sep 06 16:46:13.369: 00:56:2b:00:73:b0 Failed to parse CAPWAP packet from 172.30.3.246:51135
*spamApTask0: Sep 06 16:46:18.365: 00:56:2b:00:73:b0 Multiple Join Request: Join request received from AP which is already present. Deleting previous conne
*spamApTask0: Sep 06 16:46:18.365: 00:56:2b:00:73:b0 Not sending DTLS session closed notification to capwap.(172.30.3.246:51135)
*spamApTask0: Sep 06 16:46:18.366: 00:56:2b:00:73:b0 State machine handler: Failed to process msg type = 3 state = 0 from 172.30.3.246:51135
*spamApTask0: Sep 06 16:46:18.366: 00:56:2b:00:73:b0 Failed to parse CAPWAP packet from 172.30.3.246:51135
*spamApTask0: Sep 06 16:46:18.367: 00:00:00:00:00:00 Discarding non-ClientHello Handshake OR DTLS encrypted packet from 172.30.3.246:51135)since DTLS session is not established
*spamApTask0: Sep 06 16:46:18.623: 00:56:2b:00:73:b0 Unable to get Ap mode in Join request
*spamApTask0: Sep 06 16:46:18.624: 00:56:2b:00:73:b0 State machine handler: Failed to process msg type = 3 state = 0 from 172.30.3.246:51135
I tried to changed the auth-list but no success.
Thanks for any help in advance!
09-06-2018 08:06 AM
09-07-2018 01:25 AM
09-07-2018 02:10 AM
09-07-2018 02:21 AM
09-07-2018 03:15 AM
09-07-2018 03:53 AM
09-07-2018 04:22 AM
09-07-2018 04:36 AM
IOS Bootloader - Starting system.
flash is writable
FLASH CHIP: Numonyx Mirrorbit (0089)
Xmodem file system is available.
flashfs[0]: 72 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 31997952
flashfs[0]: Bytes used: 16150528
flashfs[0]: Bytes available: 15847424
flashfs[0]: flashfs fsck took 19 seconds.
Reading cookie from SEEPROM
Base Ethernet MAC address: e0:0e:da:f8:7b:ec
Ethernet speed is 100 Mb - FULL Duplex
Loading "flash:/ap3g2-k9w8-mx.153-3.JF8/ap3g2-k9w8-mx.153-3.JF8"...#########################
File "flash:/ap3g2-k9w8-mx.153-3.JF8/ap3g2-k9w8-mx.153-3.JF8" uncompressed and installed, entry point: 0x2003000
executing...
Secondary Bootloader - Starting system.
Tide MB - 32MB of flash
Xmodem file system is available.
flashfs[0]: 72 files, 8 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 31997952
flashfs[0]: Bytes used: 16150528
flashfs[0]: Bytes available: 15847424
flashfs[0]: flashfs fsck took 11 seconds.
flashfs[1]: 0 files, 1 directories
flashfs[1]: 0 orphaned files, 0 orphaned directories
flashfs[1]: Total bytes: 12257280
flashfs[1]: Bytes used: 1024
flashfs[1]: Bytes available: 12256256
flashfs[1]: flashfs fsck took 1 seconds.
Base Ethernet MAC address: e0:0e:da:f8:7b:ec
2600/3600 AP, PID: 'AIR-CAP2602I-E-K9 '. Checking for BL upgrade...
BL: C2600 Boot Loader (AP3G2-BOOT-M) LoaderVersion 12.4(25e)JAY, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Compiled Thu 03-Oct-13 03:35 by sdcunha
BL Build year: 13
Boot CMD: 'boot flash:/ap3g2-k9w8-mx.153-3.JF8/ap3g2-k9w8-xx.153-3.JF8;flash:/ap3g2-k9w8-mx.153-3.JF8/ap3g2-k9w8-xx.153-3.JF8'
Loading "flash:/ap3g2-k9w8-mx.153-3.JF8/ap3g2-k9w8-xx.153-3.JF8"...####################################################
File "flash:/ap3g2-k9w8-mx.153-3.JF8/ap3g2-k9w8-xx.153-3.JF8" uncompressed and installed, entry point: 0x1003000
executing...
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, C2600 Software (AP3G2-K9W8-M), Version 15.3(3)JF8, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2018 by Cisco Systems, Inc.
Compiled Fri 20-Jul-18 21:11 by prod_rel_team
Tide MB - 32MB of flash
Initializing flashfs...
flashfs[2]: 72 files, 8 directories
flashfs[2]: 0 orphaned files, 0 orphaned directories
flashfs[2]: Total bytes: 31739904
flashfs[2]: Bytes used: 16150528
flashfs[2]: Bytes available: 15589376
flashfs[2]: flashfs fsck took 11 seconds.
flashfs[2]: Initialization complete.
flashfs[4]: 0 files, 1 directories
flashfs[4]: 0 orphaned files, 0 orphaned directories
flashfs[4]: Total bytes: 11999232
flashfs[4]: Bytes used: 1024
flashfs[4]: Bytes available: 11998208
flashfs[4]: flashfs fsck took 0 seconds.
flashfs[4]: Initialization complete.
Copying radio files from flash: to ram:
Copy in progress...CCCCC
Copy in progress...CCC
Copy in progress...CCCC
Copy in progress...CCCC
Copy in progress...CC
Copy in progress...CC
Copy in progress...CCCC
Copy in progress...CC
Copy in progress...CCCCCCCC
Copy in progress...CCCC
Copy in progress...CC
Copy in progress...C
Uncompressing radio files...
...done Initializing flashfs.
PRST-VBL Debug set from cache (0x3FF,3FF) to All
PRST-VBL API Get (,40B71F0,280,0xC-NMVL-?)
PRST-VBL DET Lock - ok
PRST-VBL DET Compare Next - YES > prst-dbg=0x3FF
PRST-VBL DET Cache unlock - ok
PRST-VBL API Get - ok returning "prst-dbg=0x3FF" of size 15
PRST-VBL API Get (prst-dbg=0x3FF,40B71F0,280,0xC-NMVL-?)
PRST-VBL DET Lock - ok
PRST-VBL DET Compare Next - NO prst-dbg=0x3FF <= prst-dbg=0x3FF
PRST-VBL DET Compare Next - YES prst-dbg=0x3FF > prst-fls=2
PRST-VBL DET Cache unlock - ok
PRST-VBL API Get - ok returning "prst-fls=2" of size 11
PRST-VBL API Get (prst-fls=2,40B71F0,280,0xC-NMVL-?)
PRST-VBL DET Lock - ok
PRST-VBL DET Compare Next - NO prst-fls=2 <= prst-dbg=0x3FF
PRST-VBL DET Compare Next - NO prst-fls=2 <= prst-fls=2
PRST-VBL DET Compare Next - YES prst-fls=2 > prst-ver=1
PRST-VBL DET Cache unlock - ok
PRST-VBL API Get - ok returning "prst-ver=1" of size 11
PRST-VBL API Get (prst-ver=1,40B71F0,280,0xC-NMVL-?)
PRST-VBL DET Lock - ok
PRST-VBL DET Compare Next - NO prst-ver=1 <= prst-dbg=0x3FF
PRST-VBL DET Compare Next - NO prst-ver=1 <= prst-fls=2
PRST-VBL DET Compare Next - NO prst-ver=1 <= prst-ver=1
PRST-VBL DET Cache unlock - ok
PRST-VBL API Get - prst-ver=1 missing in the prst cache
PRST-VBL STD Init cache - ok
PRST-VBL MED Init complete - filesys added: tmpsys
PRST-VBL STD Process - waiting on system init
PRST-VBL MED Init complete - filesys added: tftp
PRST-VBL MED Init complete - filesys added: null
PRST-VBL MED Init complete - filesys added: capwap
PRST-VBL MED Init complete - filesys added: lwapp
Radio0 present 8764 8000 0 A8000000 A8010000 0
Rate table has 650 entries (20 legacy/224 11n/406 11ac)
POWER TABLE FILENAME = ram:/Y2.bin
Radio1 present 8764 8000 0 88000000 88010000 4
POWER TABLE FILENAME = ram:/Y5.bin
PRST-VBL MED Init complete - filesys added: rcp
PRST-VBL MED Init complete - filesys added: http
PRST-VBL MED Init complete - filesys added: scp
PRST-VBL MED Init complete - filesys added: ftp
PRST-VBL MED Init complete - filesys added: tar
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
PRST-VBL MED Init complete - filesys added: https
cisco AIR-CAP2602I-E-K9 (PowerPC) processor (revision A0) with 188398K/60928K bytes of memory.
Processor board ID FCW2029NCYJ
PowerPC CPU at 800Mhz, revision number 0x2151
Last reset from power-on
LWAPP image version 8.5.135.0
1 Gigabit Ethernet interface
2 802.11 Radios
32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: E0:0E:DA:F8:7B:EC
Part Number : 73-14588-03
PCB Serial Number : FOC2027576Y
Top Assembly Part Number : 800-102026-02
Top Assembly Serial Number : FCW2029NCYJ
Top Revision Number : A0
Product/Model Number : AIR-CAP2602I-E-K9
% Please define a domain-name first.
Translating "CISCO-CAPWAP-CONTROLLER.gast-wlan"...domain server (255.255.255.255)
Press RETURN to get started!
*Mar 1 00:00:16.543: PRST-VBL Debug set from cache (0x3FF,3FF) to All
*Mar 1 00:00:16.591: PRST-VBL API Get (,40B71F0,280,0xC-NMVL-?)
*Mar 1 00:00:16.619: PRST-VBL DET Lock - ok
*Mar 1 00:00:16.679: PRST-VBL DET Compare Next - YES > prst-dbg=0x3FF
*Mar 1 00:00:16.715: PRST-VBL DET Cache unlock - ok
*Mar 1 00:00:16.787: PRST-VBL API Get - ok returning "prst-dbg=0x3FF" of size 15
*Mar 1 00:00:16.851: PRST-VBL API Get (prst-dbg=0x3FF,40B71F0,280,0xC-NMVL-?)
*Mar 1 00:00:16.879: PRST-VBL DET Lock - ok
*Mar 1 00:00:16.955: PRST-VBL DET Compare Next - NO prst-dbg=0x3FF <= prst-dbg=0x3FF
*Mar 1 00:00:17.027: PRST-VBL DET Compare Next - YES prst-dbg=0x3FF > prst-fls=2
*Mar 1 00:00:17.063: PRST-VBL DET Cache unlock - ok
*Mar 1 00:00:17.127: PRST-VBL API Get - ok returning "prst-fls=2" of size 11
*Mar 1 00:00:17.191: PRST-VBL API Get (prst-fls=2,40B71F0,280,0xC-NMVL-?)
*Mar 1 00:00:17.219: PRST-VBL DET Lock - ok
*Mar 1 00:00:17.287: PRST-VBL DET Compare Next - NO prst-fls=2 <= prst-dbg=0x3FF
*Mar 1 00:00:17.355: PRST-VBL DET Compare Next - NO prst-fls=2 <= prst-fls=2
*Mar 1 00:00:17.419: PRST-VBL DET Compare Next - YES prst-fls=2 > prst-ver=1
*Mar 1 00:00:17.455: PRST-VBL DET Cache unlock - ok
*Mar 1 00:00:17.523: PRST-VBL API Get - ok returning "prst-ver=1" of size 11
*Mar 1 00:00:17.583: PRST-VBL API Get (prst-ver=1,40B71F0,280,0xC-NMVL-?)
*Mar 1 00:00:17.611: PRST-VBL DET Lock - ok
*Mar 1 00:00:17.683: PRST-VBL DET Compare Next - NO prst-ver=1 <= prst-dbg=0x3FF
*Mar 1 00:00:17.747: PRST-VBL DET Compare Next - NO prst-ver=1 <= prst-fls=2
*Mar 1 00:00:17.815: PRST-VBL DET Compare Next - NO prst-ver=1 <= prst-ver=1
*Mar 1 00:00:17.851: PRST-VBL DET Cache unlock - ok
*Mar 1 00:00:17.915: PRST-VBL API Get - prst-ver=1 missing in the prst cache
*Mar 1 00:00:17.951: PRST-VBL STD Init cache - ok
*Mar 1 00:00:18.011: PRST-VBL MED Init complete - filesys added: tmpsys
*Mar 1 00:00:18.227: PRST-VBL STD Process - waiting on system init
*Mar 1 00:00:18.251: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed (15)
*Mar 1 00:00:18.315: PRST-VBL MED Init complete - filesys added: tftp
*Mar 1 00:00:18.375: PRST-VBL MED Init complete - filesys added: null
*Mar 1 00:00:18.887: PRST-VBL MED Init complete - filesys added: capwap
*Mar 1 00:00:18.947: PRST-VBL MED Init complete - filesys added: lwapp
*Mar 1 00:00:18.947: Registering HW DTLS
*Mar 1 00:00:21.627: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to up
*Mar 1 00:00:24.139: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 0 (4)
*Mar 1 00:00:24.251: loading Power Tables from ram:/Y2.bin. Class = E
*Mar 1 00:00:24.255: record size of 3ss: 1168 read_ptr: 4DBA32E
*Mar 1 00:00:29.151: %SOAP_FIPS-2-SELF_TEST_RAD_SUCCESS: RADIO crypto FIPS self test passed on interface Dot11Radio 1 (4)
*Mar 1 00:00:29.199: loading Power Tables from ram:/Y5.bin. Class = E
*Mar 1 00:00:29.251: record size of 3ss: 1168 read_ptr: 4DBA32E
*Mar 1 00:00:29.343: PRST-VBL MED Init complete - filesys added: rcpAPAVC Registering AVC licences on the AP to make sure we enable advanced PP
*Mar 1 00:00:30.443: PRST-VBL MED Init complete - filesys added: http
*Mar 1 00:00:30.503: PRST-VBL MED Init complete - filesys added: scp
*Mar 1 00:00:30.559: PRST-VBL MED Init complete - filesys added: ftp
*Mar 1 00:00:30.843: SCHED: Ethernet Bridge Process: install watched boolean System Initialized(4DA2568), os:1 ah:0APAVC Protocol list already initialized.
*Mar 1 00:00:30.843: Start STILE Activation
APAVC: Succeeded to activate all the STILE protocols.
APAVC: Registering with CFT
*Mar 1 00:00:31.059: APAVC: CFT registration of delete callback succeeded
APAVC: Reattaching Original Buffer pool for system use
*Mar 1 00:00:31.183: PRST-VBL MED Init complete - filesys added: tar
*Mar 1 00:00:31.283: Found crash file: 'crashinfo_19930803-031023-UTC'
*Mar 1 00:00:32.855: PRST-VBL MED Init complete - filesys added: https
*Sep 7 07:47:46.067: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 7 07:47:46.067: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 7 07:47:46.079: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C2600 Software (AP3G2-K9W8-M), Version 15.3(3)JF8, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2018 by Cisco Systems, Inc.
Compiled Fri 20-Jul-18 21:11 by prod_rel_team
*Sep 7 07:47:46.083: PRST-VBL STD Process - running but no timer started
*Sep 7 07:47:46.135: SCHED: Ethernet Bridge Process: remove watched boolean System Initialized(4DA2568)
*Sep 7 07:47:46.135: SCHED: Ethernet Bridge Process: install watched queue Soap BVI input queue(4DBB574), os:0 ah:0
*Sep 7 07:47:47.503: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Sep 7 07:47:51.963: %SOAP_FIPS-2-SELF_TEST_HW_SUCCESS: HW crypto FIPS self test passed (2-16)
*Sep 7 07:47:51.963: DPAA Initialization Complete
*Sep 7 07:47:51.963: %SYS-3-HARIKARI: Process DPAA INIT top-level routine exited
*Sep 7 07:47:52.963: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Sep 7 07:48:04.487: %LWAPP-3-CLIENTERRORLOG: rcb in dcb is NULL
*Sep 7 07:48:04.487: -Traceback= 11B8500z 1C42AD4z 1C6A5C4z 13483B4z 132F13Cz
*Sep 7 07:48:07.595: %CAPWAP-5-AP_EASYADMIN_INFO: AP Easy Admin information - EASY_ADMIN is not set, turn off easy admin service!
*Sep 7 07:48:07.595: %CAPWAP-5-AP_EASYADMIN_INFO: AP Easy Admin information - Easy Admin is not enabled, turn it off!
*Sep 7 07:48:07.607: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Sep 7 07:48:07.607: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Sep 7 07:48:07.627: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 7 07:48:07.631: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 7 07:48:07.635: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 7 07:48:07.775: %SSH-5-ENABLED: SSH 2.0 has been enabled
*Sep 7 07:48:07.775: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to uplwapp_crypto_init: MIC Present and Parsed Successfully
*Sep 7 07:48:07.791: Currently running a Release Image
*Sep 7 07:48:07.819: Using SHA-2 signed certificate for image signing validation.
*Sep 7 07:48:16.183: AP image integrity check PASSED
*Sep 7 07:48:16.191: Non-recovery image. PNP Not required.
*Sep 7 07:48:16.199: Cert ISSUER (39): cn=Cisco Manufacturing CA SHA2,o=Cisco
*Sep 7 07:48:16.219: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Sep 7 07:48:16.219: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Sep 7 07:48:26.299: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 0 CLI Request Triggered
*Sep 7 07:48:27.299: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 514 started - CLI initiated
Translating "CISCO-CAPWAP-CONTROLLER.gast-wlan"...domain server (255.255.255.255)
*Sep 7 07:48:39.347: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Sep 7 07:48:39.347: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Sep 7 07:48:39.347: %CDP_PD-4-POWER_OK: Full power - LOW_POWER_CLASSIC_NO_INJECTOR_CONFIGURED inline power source
*Sep 7 07:48:40.455: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Sep 7 07:48:41.455: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Sep 7 07:48:41.563: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Sep 7 07:48:42.563: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Sep 7 07:49:23.307: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.
*Sep 7 10:32:43.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:32:43.255: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:32:43.255: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:32:48.255: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:32:48.255: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.30.3.238
*Sep 7 10:32:48.255: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.30.3.238:5246
*Sep 7 10:32:48.259: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.
*Sep 7 10:33:24.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:33:24.251: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:33:24.251: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:33:29.251: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:33:29.251: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.30.3.238
*Sep 7 10:33:29.251: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.30.3.238:5246
*Sep 7 10:33:29.251: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.
*Sep 7 10:33:29.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:33:29.255: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:33:29.255: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:33:34.255: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:33:34.255: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.30.3.238
*Sep 7 10:33:34.255: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.30.3.238:5246
*Sep 7 10:33:34.255: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.
*Sep 7 10:33:34.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:33:34.255: %CAPWAP-5-DTLSREQSUCC: DTLS connection created sucessfully peer_ip: 172.30.3.238 peer_port: 5246
*Sep 7 10:33:34.255: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
User Access Verification
Username:
Translating "CISCO-CAPWAP-CONTROLLER.gast-wlan"...domain server (255.255.255.255)
*Sep 7 10:33:39.255: %CAPWAP-5-SENDJOIN: sending Join Request to 172.30.3.238
*Sep 7 10:33:39.255: %DTLS-5-ALERT: Received WARNING : Close notify alert from 172.30.3.238
*Sep 7 10:33:39.255: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 172.30.3.238:5246
09-07-2018 04:39 AM
09-07-2018 04:41 AM
It says:
WARNING!!!! AP mode already in the requested state.
09-07-2018 04:45 AM
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: