cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Cisco AP AIR-CAP702I-E-K9

738
Views
0
Helpful
0
Comments
sahara101
Beginner

 

Hello Community,

 

I have an issue where APs do not connect to the WLC. Connection is made over VPN. Until yesterday all 3 APfailed with below errors. We change the LAN connection to a cisco router and now one of the AP magically connected to the WLC. All ports are the same on the switch. Also tried manual assign of IP on the AP, but same error.


Could you please assist me?...

 

Thank you!

 

 

 

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2021.02.18 13:27:03 =~=~=~=~=~=~=~=~=~=~=~=

*Feb 18 12:26:50.451: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:26:50.451: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface is getting down
*Feb 18 12:26:50.451: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface is getting down
*Feb 18 12:26:50.495: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Feb 18 12:26:50.495: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Feb 18 12:26:50.563: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to down
*Feb 18 12:26:50.571: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Feb 18 12:26:51.563: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to down
*Feb 18 12:26:51.595: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Feb 18 12:26:51.603: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to down
*Feb 18 12:26:51.611: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
*Feb 18 12:26:52.595: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Feb 18 12:26:52.603: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to down
*Feb 18 12:26:52.639: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Feb 18 12:26:53.639: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Feb 18 12:27:00.559: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:27:00.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
APe0d1.73b1.ef78#
APe0d1.73b1.ef78#
APe0d1.73b1.ef78#re
*Feb 18 12:27:06.103: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_record.c:394 BD is not of DTLS Change Cipher Spec typeload
Proceed with reload? [confirm]
*Feb 18 12:27:06.103: %DTLS-5-SEND_ALERT: Send FATAL : Internal error Alert to 192.168.49.15:5246
*Feb 18 12:27:06.103: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246

Writing out the event log to flash:/event.log ...



*Feb 18 12:27:08.911: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to IOS reload
*Feb 18 12:27:08.911: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to IOS reload
*Feb 18 12:27:08.919: %SYS-5-RELOAD: Reload requested by Cisco on console. Reload Reason: Reload.
*Feb 18 12:27:08.919: %LWAPP-5-CHANGED: CAPWAP changed state to DOWN

Write of event.log done



U-Boot 1.1.4.v5.3 (Jan 31 2013 - 12:54:33)

DRAM:  128 MB
CPU: 560 MHz
Top of RAM usable for U-Boot at: 88000000
Reserving 283k for U-Boot at: 87fb8000
Reserving 144k for malloc() at: 87f94000
Reserving 44 Bytes for Board Info at: 87f93fd4
Reserving 36 Bytes for Global Data at: 87f93fb0
Reserving 128k for boot params() at: 87f73fb0
Stack Pointer at: 87f73f98
Now running in RAM - U-Boot at: 87fb8000
Flash Manuf Id 0xc2, DeviceId0 0x20, DeviceId1 0x14
flash size 1MB, sector count = 64
Flash:  1 MB
Fetching MAC Address from 0x87fe3908
eth0: e0:d1:73:b1:ef:78
ATHRSF1_PHY: Port 4, Neg Success
Ethernet link up - 1000Mbps Full
eth0
Ether initialization ok!
Atheros on-chip NAND FLash Controller Driver, Version 0.1 (c) 2010 Atheros Communications, Ltd.
Ath Nand ID[87ff117c]: c2:f1:80:1d:c2
Macronix NAND 128MiB 3,3V 8-bit [128MB]
====== NAND Parameters ======
sc = 0x87ff1158 bbt = 0x87f98360 bbt_size = 0x100 nf_ctrl = 0x345
page = 0x800 block = 0x20000 oob = 0x40
size = 128MB
Setting 0xb8116290 to 0x28502d0f
Test Size=0x8000000, Start!!
RAM test complete!
PTD Init
MAC address check ok!
boot method:3 
Hit "ESC" to stop autoboot:  5  4  3  2  1  0 
Uncompressed size: 320755 = 0x4E4F3
Loading .text @ 0x84000000 (205856 bytes)
Loading .rodata @ 0x84032420 (38368 bytes)
Loading .data @ 0x8403ba00 (3232 bytes)
Loading .data.rel.local @ 0x8403c6a0 (992 bytes)
Loading .data.rel @ 0x8403ca80 (124 bytes)
Loading .data.rel.ro.local @ 0x8403cafc (92 bytes)
Loading .data.rel.ro @ 0x8403cb58 (960 bytes)
Clearing .bss @ 0x8403cf20 (161112 bytes)
Clearing .scommon @ 0x84064478 (60 bytes)
## Starting application at 0x84000000 ...


IOS Secondary Bootloader - Starting system.

Ath Nand ID: 1d:80:f1:c2:1d

Using driver version 1 for media type 2

Valid buffers 378

total378  378

success found all blocks

start end 5 68 

found in range  

high low end 2207 163 68 

Xmodem file system is available.

mifs[0]: 51 files, 9 directories

mifs[0]: Total bytes     :  131334144

mifs[0]: Bytes used      :   21612544

mifs[0]: Bytes available :  109721600

mifs[0]: mifs fsck took 0 seconds.

Base Ethernet MAC address: e0:d1:73:b1:ef:78

Setup MAC....

Waiting for PHY auto negotiation to complete...Port 4 Negogiation success.

Ethernet speed is 1000 Mb - FULL duplex

Setting Drop CRC Errors, Pause Frames and Length Error frames 

: cfg1 0xf cfg2 0x7215

Loading "flash:/ap1g1-k9w8-mx.153-3.JD16/ap1g1-k9w8-mx.153-3.JD16"...###############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################


File "flash:/ap1g1-k9w8-mx.153-3.JD16/ap1g1-k9w8-mx.153-3.JD16" uncompressed and installed, entry point: 0x60080000

executing...

Stop MAC.


Starting IOS...
cp0 timer begin value is set as 1000  
prid= 1974C
Starts main. 
 
              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706



Cisco IOS Software, C702 Software (ap1g1-K9W8-M), Version 15.3(3)JD16, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2018 by Cisco Systems, Inc.
Compiled Tue 05-Jun-18 00:02 by prod_rel_team

Initializing flashfs...
Ath Nand ID: 1D:80:F1:C2:1D
Using driver version 1 for media type 2
Valid buffers 378
total378  378
success found all blocks
start end 5 68 
found in range  
high low end 2207 163 68 
mifs[3]: 51 files, 9 directories
mifs[3]: Total bytes     : 131334144 
mifs[3]: Bytes used      : 21612544  
mifs[3]: Bytes available : 109721600 
mifs[3]: mifs fsck took 4 seconds.
mifs[3]: Initialization complete.

...done Initializing flashfs.
soap_pci_subsys_init(673): PCI CMD write: 0x356
soap_pci_subsys_init(700): PCI vendor ID: 0x168C
soap_pci_subsys_init(702): PCI device ID: 0x33

 current platform is 1 
Base Ethernet MAC address: E0:D1:73:B1:EF:78
WASP  ----> F1 PHY *
Waiting for PHY auto negotiation to complete...Port 4 Negogiation success.

Radio0  present 9300 9000 0 0 0 0
Rate table has 250 entries (12 legacy/64 11n/174 11ac)

Radio1  present 9592 9000 0 0 B0000000 1
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

cisco AIR-CAP702I-E-K9 (MIPS74k) processor (revision 01) with 86016K/45056K bytes of memory.
Processor board ID KWC18470175
MIPS74k CPU at 560Mhz, revision number 0x0000
Last reset from power-on
LWAPP image version 8.3.143.0
1 Gigabit Ethernet interface
2 802.11 Radios

32K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address: E0:D1:73:B1:EF:78
Part Number                          : 74-11077-01
PCB Serial Number                    : KWC18470175
Top Assembly Part Number             : 000-00000-00
Top Assembly Serial Number           : KWC18470175
Top Revision Number                  : 01
Product/Model Number                 : AIR-CAP702I-E-K9    
% Please define a domain-name first.


Press RETURN to get started!


*Mar  1 00:00:19.467: %SOAP_FIPS-2-SELF_TEST_IOS_SUCCESS: IOS crypto FIPS self test passed (15)PCI init:soap_pci_subsys_init
mips74k_config_radio_pci(302): PCI CMD write: 0x356
Ethernet link changed to speed: 3, duplex 1
athr_gmac_hw_setup mac: 0x62FBF9E0 
Setting Drop CRC Errors, Pause Frames and Length Error frames 
: cfg1 0xF cfg2 0x7215

*Mar  1 00:00:24.607: %LINK-6-UPDOWN: Interface GigabitEthernet0, changed state to upEnterprise mode: 0x00000000

*Mar  1 00:00:24.835: ath_load_ctl_pwr_tbl() dot11radio 2G loading CTL binary flash:/ap1g1-k9w8-mx.153-3.JD16/ca702I2.bin version# 5.0
*Mar  1 00:00:25.251: ath_load_ctl_pwr_tbl() dot11radio 5G loading CTL binary flash:/ap1g1-k9w8-mx.153-3.JD16/ca702I5.bin version# 2.2
*Mar  1 00:00:25.635: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
*Feb 18 12:27:08.195: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to hostname change
*Feb 18 12:27:08.195: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to hostname change
*Feb 18 12:27:08.219: %SYS-5-RESTART: System restarted --
Cisco IOS Software, C702 Software (ap1g1-K9W8-M), Version 15.3(3)JD16, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2018 by Cisco Systems, Inc.
Compiled Tue 05-Jun-18 00:02 by prod_rel_team
*Feb 18 12:27:08.219: %SNMP-5-COLDSTART: SNMP agent on host APe0d1.73b1.ef78 is undergoing a cold start
*Feb 18 12:27:08.547: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Feb 18 12:27:08.547: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Feb 18 12:27:08.795: %SSH-5-ENABLED: SSH 2.0 has been enabled
*Feb 18 12:27:08.795: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Feb 18 12:27:08.799: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to uplwapp_crypto_init: MIC Present and Parsed Successfully

*Feb 18 12:27:09.311: %LINEPROTO-5-UPDOWN: Line protocol on Interface BVI1, changed state to up
*Feb 18 12:27:16.947: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.53.138, mask 255.255.255.0, hostname APe0d1.73b1.ef78

*Feb 18 12:27:26.503: Currently running a Release Image

*Feb 18 12:27:26.515: Using SHA-2 signed certificate for image signing validation.%Default route without gateway, if not a point-to-point interface, may impact performance
*Feb 18 12:27:32.235: AP image integrity check PASSED

*Feb 18 12:27:32.255: Non-recovery image. PNP Not required.

*Feb 18 12:27:32.279: Cert ISSUER (39): cn=Cisco Manufacturing CA SHA2,o=Cisco

*Feb 18 12:27:32.463: %LINK-5-CHANGED: Interface Dot11Radio0, changed state to reset
*Feb 18 12:27:32.463: %LINK-5-CHANGED: Interface Dot11Radio1, changed state to reset
%Error opening flash:/capwap-saved-config (No such file or directory)
%Error opening flash:/capwap-saved-config-bak (No such file or directory)
*Feb 18 12:27:42.503: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 0 CLI Request Triggered
*Feb 18 12:27:43.503: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host 255.255.255.255 port 514 started - CLI initiated
Translating "CISCO-CAPWAP-CONTROLLER"...domain server (192.168.49.1) (4.2.2.2)

*Feb 18 12:27:53.523: %CAPWAP-5-DHCP_OPTION_43: Controller address 192.168.49.15 obtained through DHCP
*Feb 18 12:28:03.635: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:29:16.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:29:22.111: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_record.c:394 BD is not of DTLS Change Cipher Spec type
*Feb 18 12:29:22.111: %DTLS-5-SEND_ALERT: Send FATAL : Internal error Alert to 192.168.49.15:5246
*Feb 18 12:29:22.111: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:29:34.759: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio0 due to interface reset
*Feb 18 12:29:34.759: %DOT11-5-EXPECTED_RADIO_RESET: Restarting Radio interface Dot11Radio1 due to interface reset
*Feb 18 12:29:34.759: %CDP_PD-4-POWER_OK: Full power - NEGOTIATED inline power source
*Feb 18 12:29:35.763: %LINK-6-UPDOWN: Interface Dot11Radio0, changed state to up
*Feb 18 12:29:35.763: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio0, changed state to up
*Feb 18 12:29:36.795: %LINEPROTO-5-UPDOWN: Line protocol on Interface Dot11Radio1, changed state to up
*Feb 18 12:29:36.799: %LINK-6-UPDOWN: Interface Dot11Radio1, changed state to up
*Feb 18 12:30:30.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:30:31.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:30:31.023: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
*Feb 18 12:30:31.027: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.49.15:5246
*Feb 18 12:30:31.027: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:31:45.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:31:46.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:31:48.023: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
*Feb 18 12:31:48.023: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.49.15:5246
*Feb 18 12:31:48.023: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:33:00.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:33:01.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:33:07.099: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_record.c:394 BD is not of DTLS Change Cipher Spec type
*Feb 18 12:33:07.099: %DTLS-5-SEND_ALERT: Send FATAL : Internal error Alert to 192.168.49.15:5246
*Feb 18 12:33:07.103: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:34:15.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:34:16.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:34:16.027: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
*Feb 18 12:34:16.027: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.49.15:5246
*Feb 18 12:34:16.027: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
Not in Bound state.
*Feb 18 12:35:26.511: %CAPWAP-3-DHCP_RENEW: Could not discover WLC. Either IP address is not assigned or assigned IP is wrong. Renewing DHCP IP.
*Feb 18 12:35:29.711: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.53.140, mask 255.255.255.0, hostname APe0d1.73b1.ef78

Translating "CISCO-CAPWAP-CONTROLLER"...domain server (192.168.49.1) (4.2.2.2)

*Feb 18 12:35:36.511: %CAPWAP-5-DHCP_OPTION_43: Controller address 192.168.49.15 obtained through DHCP
*Feb 18 12:35:46.615: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:35:47.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:35:53.103: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_record.c:394 BD is not of DTLS Change Cipher Spec type
*Feb 18 12:35:53.103: %DTLS-5-SEND_ALERT: Send FATAL : Internal error Alert to 192.168.49.15:5246
*Feb 18 12:35:53.103: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:37:01.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:37:02.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:37:02.023: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
*Feb 18 12:37:02.023: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.49.15:5246
*Feb 18 12:37:02.027: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:38:16.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:38:17.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:38:19.023: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
*Feb 18 12:38:19.023: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.49.15:5246
*Feb 18 12:38:19.023: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:39:31.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:39:32.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:39:38.103: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_record.c:394 BD is not of DTLS Change Cipher Spec type
*Feb 18 12:39:38.103: %DTLS-5-SEND_ALERT: Send FATAL : Internal error Alert to 192.168.49.15:5246
*Feb 18 12:39:38.103: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
Not in Bound state.
*Feb 18 12:40:42.507: %CAPWAP-3-DHCP_RENEW: Could not discover WLC. Either IP address is not assigned or assigned IP is wrong. Renewing DHCP IP.
*Feb 18 12:40:45.707: %DHCP-6-ADDRESS_ASSIGN: Interface BVI1 assigned DHCP address 192.168.53.142, mask 255.255.255.0, hostname APe0d1.73b1.ef78

Translating "CISCO-CAPWAP-CONTROLLER"...domain server (192.168.49.1) (4.2.2.2)

*Feb 18 12:40:52.507: %CAPWAP-5-DHCP_OPTION_43: Controller address 192.168.49.15 obtained through DHCP
*Feb 18 12:41:02.967: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:41:03.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:41:09.103: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_record.c:394 BD is not of DTLS Change Cipher Spec type
*Feb 18 12:41:09.103: %DTLS-5-SEND_ALERT: Send FATAL : Internal error Alert to 192.168.49.15:5246
*Feb 18 12:41:09.103: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246
*Feb 18 12:42:17.999: AP has SHA2 MIC certificate - Using SHA2 MIC certificate for DTLS.

*Feb 18 12:42:18.000: %CAPWAP-5-DTLSREQSEND: DTLS connection request sent peer_ip: 192.168.49.15 peer_port: 5246
*Feb 18 12:42:18.023: DTLS_CLIENT_ERROR: ../capwap/base_capwap/dtls/base_capwap_dtls_handshake.c:929 Unexpected message received while expecting HelloVerifyRequest
*Feb 18 12:42:18.023: %DTLS-5-SEND_ALERT: Send FATAL : Unexpected message Alert to 192.168.49.15:5246
*Feb 18 12:42:18.023: %DTLS-5-SEND_ALERT: Send FATAL : Close notify Alert to 192.168.49.15:5246

 

 

Content for Community-Ad