cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1269
Views
0
Helpful
4
Replies

Problems getting AP to join WLC

brstrode
Cisco Employee
Cisco Employee

I am attempting to add a third AP to an environment.  I have one of the exact same model connected to the WLC already but this one is having problems.  Please see the output from below.  It receives an IP on the same subnet as the other access points and then thats when it begins to encounter problems.  Any help would be greatly appreciated.  Thank all.

 

User Access Verification
Username: [*01/01/1970 00:00:15.9630]
[*01/01/1970 00:00:15.9630]
[*01/01/1970 00:00:15.9630]
[*01/01/1970 00:00:15.9630]
[*01/01/1970 00:00:15.9630] Authenticating ACT2 ID:AP2800
[*01/01/1970 00:00:15.9630] Authenticating SN:FOC22450MQG
[*01/01/1970 00:00:15.9634]
[*01/01/1970 00:00:15.9634] (ACT2Boot) Hardware is Cisco (c) authentic
[*01/01/1970 00:00:15.9634]
[*01/01/1970 00:00:15.9634] Seeding /dev/urandom from ACT2
[*11/19/2018 23:59:59.0061] Last reload time: Nov 20 03:42:08 2018
[*11/20/2018 03:42:08.0001] Setting system time Tue Nov 20 03:42:08 UTC 2018
[*11/20/2018 03:42:08.1135] Loading kernel crypto modules
[*11/20/2018 03:42:08.2369] GCM-128 POST passed
[*11/20/2018 03:42:08.2369] GCM-256 POST passed
[*11/20/2018 03:42:08.3966] Active version: 8.3.143.0
[*11/20/2018 03:42:08.3978] Backup version: 0.0.0.0
[*11/20/2018 03:[11/20/2018 03:42:08.5600] PCI: enabling device 0000:00:02.0 (0140 -> 0143)
42:08.5578] devi[11/20/2018 03:42:08.6400] PCI: enabling device 0000:02:00.0 (0140 -> 0142)
ce wired0 entered promiscuous mode
[*11/20/2018 03:42:09.9613] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/20/2018 03:42:14.9369] Firmware download complete
[*11/20/2018 03:42:14.9377] FIPS enc aes-ccmp Verified
[*11/20/2018 03:42:14.9378] FI[11/20/2018 03:42:15.0700] PCI: enabling device 0000:00:03.0 (0140 -> 0143)
PS dec aes-ccmp [11/20/2018 03:42:15.1600] PCI: enabling device 0000:03:00.0 (0140 -> 0142)
Verified
[*11/20/2018 03:42:14.9379] FIPS enc aes-ccmp-256 Verified
[*11/20/2018 03:42:14.9381] FIPS dec aes-ccmp-256 Verified
[*11/20/2018 03:42:14.9382] FIPS enc aes-gcmp Verified
[*11/20/2018 03:42:14.9383] FIPS dec aes-gcmp Verified
[*11/20/2018 03:42:14.9384] FIPS enc aes-gcmp-256 Verified
[*11/20/2018 03:42:14.9385] FIPS dec aes-gcmp-256 Verified
[*11/20/2018 03:42:16.4737] 0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;0;
[*11/20/2018 03:42:20.7208] Firmware download complete
[*11/20/2018 03:42:20.7216] FIPS enc aes-ccmp Verified
[*11/20/2018 03:42:20.7217] FIPS dec aes-ccmp Verified
[*11/20/2018 03:42:20.7218] FIPS enc aes-ccmp-256 Verified
[*11/20/2018 03:42:20.7219] FIPS dec aes-ccmp-256 Verified
[*11/20/2018 03:42:20.7220] FIPS enc aes-gcmp Verified
[*11/20/2018 03:42:20.7221] FIPS dec aes-gcmp Verified
[*11/20/2018 03:42:20.7222] FIPS enc aes-gcmp-256 Verified
[*11/20/2018 03:42:20.7223] FIPS dec aes-gcmp-256 Verified
[*11/20/2018 03:42:21.1571] ifconfig: SIOCGIFFLAGS: No such device
[*11/20/2018 03:42:21.2670] Initializing NSS Firmware
[11/20/2018 03:42:24.4000] Disabling lock debugging due to kernel taint
[*11/20/2018 03:42:24.4099] stile_lm_ft_barbados: module license 'Copyright (c) 2014-2015 by cisco Systems, Inc.' taints kernel.
[*11/20/2018 03:42:24.5039] stile module dp init successfully
[*11/20/2018 03:42:24.5039] NBAR Label:BLD_MCP_DEV_LATEST_20150424_123021 NBAR VERSION:module build date: Oct 4 2017 at 08:35:18
[*11/20/2018 03:42:26.1552]
[*11/20/2018 03:42:26.1589] boot 10 build T-5a1977b5600aa94dd31adcabae872ed6700b2ea1-g5a1977b5-vipendya board barbados mac 70:B3:17:9E:E7:3C
[*11/20/2018 03:42:26.1617] Module: act2_driver .text=0x7f000000 data=0x7f000770 bss=0x7f000a04
[*11/20/2018 03:42:26.1617] Module: aes_generic .text=0x7f004000 data=0x7f00a460 bss=
[*11/20/2018 03:42:26.1617] Module: sha256_generic .text=0x7f00e000 data=0x7f00fbdc bss=
[*11/20/2018 03:42:26.1617] Module: sha512_generic .text=0x7f014000 data=0x7f0158c8 bss=
[*11/20/2018 03:42:26.1617] Module: hmac .text=0x7f019000 data=0x7f0195e8 bss=
[*11/20/2018 03:42:26.1617] Module: sha1_generic .text=0x7f01d000 data=0x7f01d2cc bss=
[*11/20/2018 03:42:26.1617] Module: sha1_arm .text=0x7f021000 data=0x7f021850 bss=
[*11/20/2018 03:42:26.1617] Module: gf128mul .text=0x7f025000 data= bss=
[*11/20/2018 03:42:26.1617] Module: cbc .text=0x7f02a000 data=0x7f02a4f4 bss=
[*11/20/2018 03:42:26.1617] Module: ctr .text=0x7f02e000 data=0x7f02e7c8 bss=
[*11/20/2018 03:42:26.1617] Module: ghash_generic .text=0x7f032000 data=0x7f032268 bss=
[*11/20/2018 03:42:26.1617] Module: seqiv .text=0x7f036000 data=0x7f036654 bss=
[*11/20/2018 03:42:26.1617] Module: md5 .text=0x7f03a000 data=0x7f03a260 bss=
[*11/20/2018 03:42:26.1617] Module: mbedtls .text=0x7f0[11/20/2018 03:42:27.7200] wired0 emac 2: link up
3e000 dat[11/20/2018 03:42:27.7900] wired0: link up
a=0x7f0455e0 bss=0x7f045850
[*11/20/2018 03:42:26.1617] Module: aptrace .text=0x7f04a000 data=0x7f051da8 bss=0x7f052210
[*11/20/2018 03:42:26.1617] Module: ap8x .text=0x7f059000 data=0x7f106fd0 bss=0x7f10e7f4
[*11/20/2018 03:42:26.1618] Module: mv_nss_api .text=0x7f2e7000 data=0x7f339680 bss=0x7f33ab08
[*11/20/2018 03:42:26.1618] Module: proclikefs .text=0x7f34c000 data= bss=0x7f34cb80
[*11/20/2018 03:42:26.1618] Module: stile_lm_ft .text= data= bss=
[*11/20/2018 03:42:26.1618] Module: stile_lm_dp .text= data= bss=
[*11/20/2018 03:42:26.1618] Module: mtdoops .text=0x7fde4000 data=0x7fde4e34 bss=0x7fde4fa8
[*11/20/2018 03:42:26.1618] Module: ipv6 .text=0x7fde9000 data=0x7fe1e140 bss=0x7fe1fd00
[*11/20/2018 03:42:26.1618] Module: llc .text=0x7fe46000 data=0x7fe46854 bss=0x7fe469f0
[*11/20/2018 03:42:26.1618] Module: stp .text=0x7fe4b000 data=0x7fe4b280 bss=0x7fe4b43c
[*11/20/2018 03:42:26.1618] Module: crc_itu_t .text=0x7fe4f000 data= bss=
[*11/20/2018 03:42:26.1618] Module: lowmemorykiller .text=0x7fe53000 data=0x7fe532f4 bss=0x7fe534a0
[*11/20/2018 03:42:26.1618] Module: p8022 .text=0x7fe57000 data= bss=
[*11/20/2018 03:42:26.1618] Module: psnap .text=0x7fe5b000 data=0x7fe5b344 bss=0x7fe5b4c4
[*11/20/2018 03:42:26.1618] Module: rng_core .text=0x7fe5f000 data=0x7fe5f818 bss=0x7fe5f9d8
[*11/20/2018 03:42:26.1618] Module: udf .text=0x7fe63000 data=0x7fe72fc4 bss=0x7fe73140
[*11/20/2018 03:42:26.1839] barbados /tmp/SC4_1dbm.txt
[*11/20/2018 03:42:26.2965] Last reload reason : 2: Capwap Discovery Failed
[*11/20/2018 03:42:34.4060]
[*11/20/2018 03:42:34.4060] Click sched monitor: schedulers = 1
[*11/20/2018 03:42:48.8124] Create symlink /dev/mic_cert result 0
[*11/20/2018 03:42:48.8124] Loading certificates from storage...
[*11/20/2018 03:42:48.8252] SKU to radio FW
[*11/20/2018 03:42:49.1207] Generating key, this may take a while...
[*11/20/2018 03:42:50.7836] Public key portion is:
[*11/20/2018 03:42:50.7836] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCSHF31EjXkFljLZGz3NuWEf+/StQK8Fr0zMZ6HulDyF9JG7IllqApsbJze/mcrvx0GhJ24lmDk4eVfTHnEl9tW8775QOOdfXjS5QqdOTPfX3gk4maFMjrHJ4U4SQmxyO005WDmNESxIZyjPcz2GRy/Rnx5Wnh3/8H7BiasI9tNCxP7TSmzBSx3NGwWVyX1hqGtAV04+mGRd25o35M8T9EBxfEz6e5Dka8y3NCWV9AiBqslTx4XE8FIlPKowWNnUgdiVoK83OtPRgi25gQy6HyEUGetehDNPGQKQL21zok/o6pUMM5slVSSgv5W29hNOZcaUwHngT/er49FRVFzcjRF root@m70B3179EE73C
[*11/20/2018 03:42:50.7836] Fingerprint: md5 f1:27:a1:f9:f1:15:b4:d5:24:c5:d4:e6:8d:23:38:34
[*11/20/2018 03:42:53.6545] starting tam services using ACT2...
[*11/20/2018 03:42:54.0102] gzip -dc /etc/wcp.usermodule.template.gz | sed -e 's/__TX_POWER_XOR_5G_FILE__/\/radio_fw\/X5.csv/g' -e 's/__EVM_POWER_XOR_5G_FILE__/\/radio_fw\/EVM_X5.csv/g' -e 's/__TX_POWER_2G_FILE__/\/radio_fw\/R2.csv/g' -e 's/__TX_POWER_5G_FILE__/\/radio_fw\/R5.csv/g' -e 's/__EVM_POWER_2G_FILE__/\/radio_fw\/EVM_2.csv/g' -e 's/__EVM_POWER_5G_FILE__/\/radio_fw\/EVM_5.csv/g' -e 's/__DOMAIN_2G__/0/g' -e 's/__DOMAIN_5G__/11/g' -e 's/__PRODUCT_ID__/AIR-AP2802I-A-K9/g' -e 's/__AP_TYPE__/56/g' -e 's/__WIRELESS_MAC__/70:B3:17:AD:B0:60/g' -e 's/__WIRED_MAC__/70:B3:17:9E:E7:3C/g' -e 's/__WIRED1_MAC__/70:B3:17:9E:E7:3C/g' | DMALLOC_OPTIONS=debug=0x03,inter=1000,log=/tmp/wcp.dmalloc.log,limit=40000000 wcpd &
[*11/20/2018 03:42:54.1175] Password for 'Cisco' changed
[*11/20/2018 03:42:55.2538] Stopped Radio 0
[*11/20/2018 03:42:55.2654] DOT11_DRV[0]: set_channel Channel set to 6
[*11/20/2018 03:42:55.8006] Stopped Radio 1
[*11/20/2018 03:42:55.8123] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:56.3703] DOT11_DRV[0]: set_channel Channel set to 1
[*11/20/2018 03:42:56.6556] DOT11_DRV[0]: set_channel Channel set to 1
[*11/20/2018 03:42:56.6648] DOT11_DRV[0]: set_channel Channel set to 1
[*11/20/2018 03:42:57.0811] DOT11_DRV[0]: set_channel Channel set to 1
[*11/20/2018 03:42:57.3981] DOT11_DRV[0]: set_channel Channel set to 1
[*11/20/2018 03:42:57.5644] ethernet_port wired0, ip 172.27.x.x, netmask 255.255.255.0, gw 172.27.x.x, mtu 1500, bcast 172.27.x.255, dns1 208.67.222.222, dns2 208.67.220.220, domain bshome.localDOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:57.9745] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:58.2532] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:58.2623] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:58.7124] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:59.0736] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:42:59.4258] DOT11_DRV[1]: set_channel Channel set to 36
[*11/20/2018 03:43:03.5295] waiting for POE negotiation to complete
[*11/20/2018 03:43:03.5295]
[*11/20/2018 03:43:08.5300] waiting for POE negotiation to complete
[*11/20/2018 03:43:08.5300]
[*11/20/2018 03:43:12.7308] AP IPv4 Address updated from 0.0.0.0 to 172.27.x.x
[*11/20/2018 03:43:13.5305] waiting for POE negotiation to complete
[*11/20/2018 03:43:13.5305]
[*11/20/2018 03:43:16.7311] waiting for POE negotiation to complete
[*11/20/2018 03:43:16.7311]
[*11/20/2018 03:43:18.5309] waiting for POE negotiation to complete
[*11/20/2018 03:43:18.5310]
[*11/20/2018 03:43:21.7315] waiting for POE negotiation to complete
[*11/20/2018 03:43:21.7315]
[*11/20/2018 03:43:23.5314] waiting for POE negotiation to complete
[*11/20/2018 03:43:23.5314]
[*11/20/2018 03:43:26.7319] waiting for POE negotiation to complete
[*11/20/2018 03:43:26.7319]
[*11/20/2018 03:43:28.5319] waiting for POE negotiation to complete
[*11/20/2018 03:43:28.5319]
[*11/20/2018 03:43:31.7323] waiting for POE negotiation to complete
[*11/20/2018 03:43:31.7323]
[*11/20/2018 03:43:33.5324] waiting for POE negotiation to complete
[*11/20/2018 03:43:33.5324]
[*11/20/2018 03:43:36.7327] waiting for POE negotiation to complete
[*11/20/2018 03:43:36.7327]
[*11/20/2018 03:43:38.5329] waiting for POE negotiation to complete
[*11/20/2018 03:43:38.5329]
[*11/20/2018 03:43:38.7840] SYS-COND: AP is in fair condition
[*11/20/2018 03:43:39.5572] dtls_init: Use MIC device cert
[*11/20/2018 03:43:39.5575] dtls_init: Use MIC device cert private key
[*11/20/2018 03:43:39.5576]
[*11/20/2018 03:43:39.5576] CAPWAP State: Init
[*11/20/2018 03:43:39.5580]
[*11/20/2018 03:43:39.5580] Config not found, PNP is required, Starting PNP
[*11/20/2018 03:43:39.5580]
[*11/20/2018 03:44:00.4618] PNP Discovery Timer Expired, Starting CAPWAP Discovery
[*11/20/2018 03:44:00.4620]
[*11/20/2018 03:44:00.4620] CAPWAP State: Discovery
[*11/20/2018 03:44:00.5448] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:44:00.5448]
[*11/20/2018 03:44:00.5448] CAPWAP State: Discovery
[*11/20/2018 03:44:09.9652]
[*11/20/2018 03:44:09.9652] CAPWAP State: Discovery
[*11/20/2018 03:44:10.0501] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:44:19.4679]
[*11/20/2018 03:44:19.4679] CAPWAP State: Discovery
[*11/20/2018 03:44:19.5505] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:44:28.9706]
[*11/20/2018 03:44:28.9707] CAPWAP State: Discovery
[*11/20/2018 03:44:29.0556] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:44:38.4734]
[*11/20/2018 03:44:38.4734] CAPWAP State: Discovery
[*11/20/2018 03:44:38.5555] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:47:39.0251] PNP Discovery Timer Expired, Starting CAPWAP Discovery
[*11/20/2018 03:47:39.0251]
[*11/20/2018 03:47:39.0251] Lost connection to the controller, going to restart CAPWAP...
[*11/20/2018 03:47:39.0252]
[*11/20/2018 03:47:39.0252] Restarting CAPWAP State Machine.
[*11/20/2018 03:47:39.0298] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Discovery(2).
[*11/20/2018 03:47:39.0306]
[*11/20/2018 03:47:39.0306] CAPWAP State: DTLS Teardown
[*11/20/2018 03:47:43.7776]
[*11/20/2018 03:47:43.7776] CAPWAP State: Discovery
[*11/20/2018 03:47:43.8620] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:47:53.2799]
[*11/20/2018 03:47:53.2799] CAPWAP State: Discovery
[*11/20/2018 03:47:53.3621] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:48:02.7826]
[*11/20/2018 03:48:02.7826] CAPWAP State: Discovery
[*11/20/2018 03:48:02.8653] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:48:12.2854]
[*11/20/2018 03:48:12.2854] CAPWAP State: Discovery
[*11/20/2018 03:48:12.3710] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)
[*11/20/2018 03:48:21.7881]
[*11/20/2018 03:48:21.7881] CAPWAP State: Discovery
[*11/20/2018 03:48:21.8768] Discovery Request sent to 255.255.255.255, discovery type UNKNOWN(0)

1 Accepted Solution

Accepted Solutions

Leo Laohoo
Hall of Fame
Hall of Fame
I can see the AP getting an IP address but I don't see the AP being told the WLC details. Is DHCP Option 43 enabled?
Can you also post the output to the command: sh capwap client rcb

View solution in original post

4 Replies 4

What WLC hardware/software in use ? "show sysinfo" from WLC and "show ver" from AP would be useful.

Also does AP is on same vlan as WLC management ?

 

Rasika

Leo Laohoo
Hall of Fame
Hall of Fame
I can see the AP getting an IP address but I don't see the AP being told the WLC details. Is DHCP Option 43 enabled?
Can you also post the output to the command: sh capwap client rcb

Thank you for mentioning the DHCP Option 43.  I went into my WLC and found that my other access points had their options configured.  Once I configured the option 43 for that model of access point it worked.  

Happy to see it working.
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card