cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1141
Views
0
Helpful
2
Replies

240AC Access Points Not Joined with this Primary AP!!!

Mark30
Level 1
Level 1

I've got a bunch of Cisco Business Wireless 240AC Access Points connected on a local lan. There's a main network and several Vlans. All the access points are visible on the dashboard from the primary 240AC and generally everything works as expected.

However, I keep finding that access points keep disappearing from the dashboard for a period of time then return. Visually looking at each access point the LED repeats read, green, orange for a short period of time then goes back to green. Each AP seems to take this in turn.

Looking at and monitoring the terminal output I can see access points keep repeating 'Config sync in progress!!! Cannot save now'. 

Also this is another extract from another AP;

[*12/15/2022 19:43:20.2799] CAPWAP State: Run
[*12/15/2022 19:43:20.4599] AP has joined controller AP1
[*12/15/2022 19:43:20.4899] CLSM[5C:52:30:55:9F:1C]: PMK cache was found (11r or 11i)
[*12/15/2022 19:43:20.5199] Flexconnect Switching to Connected Mode!
[*12/15/2022 19:43:23.3299] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=20, NumofPendingMsgs=17
[*12/15/2022 19:43:23.3299]
[*12/15/2022 19:43:26.1799] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=22, NumofPendingMsgs=19
[*12/15/2022 19:43:26.1799]
[*12/15/2022 19:43:29.0299] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=25, NumofPendingMsgs=22
[*12/15/2022 19:43:29.0299]
[*12/15/2022 19:43:31.8799] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=25, NumofPendingMsgs=22
[*12/15/2022 19:43:31.8799]
[*12/15/2022 19:43:34.7299] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=27, NumofPendingMsgs=24
[*12/15/2022 19:43:34.7299]
[*12/15/2022 19:43:37.5999] Max retransmission count exceeded, going back to DISCOVER mode.

This cycle seems to repeat forever. Tried the usual reset everything and switch it back on tricks. But these things seem like the firmware has a bug. The firmware is the latest. Not sure where to go on this.

If you have an idea, I'm all ears.

 

 

 

2 Replies 2

Mark30
Level 1
Level 1

Here's another log. Feels like there is a network issue. But I can ping these things all day long and all seems fine. There's nothing in the way like firewalls or access lists.

 

[*12/15/2022 19:56:14.0000] CAPWAP State: DTLS Setup
[*12/15/2022 19:56:14.7799]
[*12/15/2022 19:56:14.7799] CAPWAP State: Join
[*12/15/2022 19:56:14.8199] Sending Join request to 10.19.19.15 through port 5256
[*12/15/2022 19:56:14.8799] Join Response from 10.19.19.15
[*12/15/2022 19:56:14.8799] AC accepted join request with result code: 0
[*12/15/2022 19:56:14.8799] Master-Slave: role 3, master 10.19.19.7, old 1
[*12/15/2022 19:56:14.8799] Aborting image download(0x1): Changing master IP4,
[*12/15/2022 19:56:15.0899] do ABORT, part1 is active part
[*12/15/2022 19:56:15.1599] upgrade.sh: Cleanup tmp files ...
[*12/15/2022 19:56:15.2699] Master-Slave: Set to Slave, retry 44, set_tftp_server 0, Master AP 10.19.19.7, Join role Slave, tftp_timeoutCnt 3
[*12/15/2022 19:56:15.2699] Image pre-download request for version 10.7.1.0.
[*12/15/2022 19:56:15.3999] do NO_UPGRADE, part1 is active part
[*12/15/2022 19:56:15.3999] Received wlcType 1, timer 120
[*12/15/2022 19:56:15.4999]
[*12/15/2022 19:56:15.4999] CAPWAP State: Image Data
[*12/15/2022 19:56:15.5299] AP image version 10.7.1.0 backup 10.6.1.0, Controller 10.7.1.0
[*12/15/2022 19:56:15.5299] Version is the same, do not need update.
[*12/15/2022 19:56:15.6699] do NO_UPGRADE, part1 is active part
[*12/15/2022 19:56:15.6699]
[*12/15/2022 19:56:15.6699] CAPWAP State: Configure
[*12/15/2022 19:56:15.6999] DOT11_CFG[0] Radio Mode is changed from Remote Bridge to Remote Bridge
[*12/15/2022 19:56:15.6999] DOT11_CFG[1] Radio Mode is changed from Remote Bridge to Remote Bridge
[*12/15/2022 19:56:15.9099] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:56:15.9099] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:56:15.9099] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:56:15.9299] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:56:16.3499] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:56:16.3499] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:56:16.3499] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:56:16.3499] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:56:16.7099]
[*12/15/2022 19:56:16.7099] CAPWAP State: Run
[*12/15/2022 19:56:16.8799] AP has joined controller AP1
[*12/15/2022 19:56:16.9399] Flexconnect Switching to Connected Mode!
[*12/15/2022 19:56:16.9999] RLAN_CRIT-RlanPortControl:: platform_set_lan_poe_enabled :Insufficient power, POE-out not supported !!
[*12/15/2022 19:56:17.7599] chpasswd: password for user changed
[*12/15/2022 19:56:17.8899] Setting efficientUpgradeState 1
[*12/15/2022 19:56:17.9699] DOT11_CFG[0]: (Primary Auth Radius Server) Config not applied
[*12/15/2022 19:56:17.9699] DOT11_CFG[1]: (Primary Auth Radius Server) Config not applied
[*12/15/2022 19:56:17.9699] DOT11_CFG[0]: (Secondary Auth Radius Server) Config not applied
[*12/15/2022 19:56:17.9799] DOT11_CFG[1]: (Secondary Auth Radius Server) Config not applied
[*12/15/2022 19:56:18.0799] Got WSA Server config TLVs
[*12/15/2022 19:56:18.0799] Recvd FQDN Config Payload
[*12/15/2022 19:56:18.0799]
[*12/15/2022 19:56:18.0899] AP is already configured for this type.
[*12/15/2022 19:56:18.5399]
[*12/15/2022 19:56:18.5399] ========== enable_skb_stats_wireless_counters = 1 ==============
[*12/15/2022 19:56:39.6599] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=23, NumofPendingMsgs=1
[*12/15/2022 19:56:39.6599]
[*12/15/2022 19:56:44.0699] set cleanair [slot0][band0] disable
[*12/15/2022 19:56:44.0799] CLEANAIR: Slot 0 admin disabled
[*12/15/2022 19:56:44.0799] set cleanair [slot1][band1] disable
[*12/15/2022 19:56:46.0799] CLEANAIR: Slot 1 admin disabled
[*12/15/2022 19:57:45.0399] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=50, NumofPendingMsgs=5
[*12/15/2022 19:57:45.0399]
[*12/15/2022 19:57:47.8899] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=51, NumofPendingMsgs=6
[*12/15/2022 19:57:47.8899]
[*12/15/2022 19:57:50.7399] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=51, NumofPendingMsgs=6
[*12/15/2022 19:57:50.7399]
[*12/15/2022 19:57:53.5899] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=51, NumofPendingMsgs=6
[*12/15/2022 19:57:53.5899]
[*12/15/2022 19:57:56.4399] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=51, NumofPendingMsgs=6
[*12/15/2022 19:57:56.4399]
[*12/15/2022 19:57:59.2899] Max retransmission count exceeded, going back to DISCOVER mode.
[*12/15/2022 19:57:59.2899] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 532, eleLen = 540, sendSeqNum = 51
[*12/15/2022 19:57:59.2899] ...Vendor SubType: AP_CDP_CACHE_PAYLOAD(24) len: 528 vendId 409600
[*12/15/2022 19:57:59.2899] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 863, eleLen = 871, sendSeqNum = 51
[*12/15/2022 19:57:59.2899] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2899] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 19:57:59.2999] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 38, eleLen = 46, sendSeqNum = 51
[*12/15/2022 19:57:59.2999] ....TLV: TLV_ECHOPAYLOAD(42), level: 0, seq: 0, nested: true
[*12/15/2022 19:57:59.2999] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 64, eleLen = 72, sendSeqNum = 51
[*12/15/2022 19:57:59.2999] ....TLV: TLV_APETHERINTFPAYLOAD(46), level: 0, seq: 0, nested: true
[*12/15/2022 19:57:59.2999] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 64, eleLen = 72, sendSeqNum = 51
[*12/15/2022 19:57:59.2999] ....TLV: TLV_APETHERINTFPAYLOAD(46), level: 0, seq: 0, nested: true
[*12/15/2022 19:57:59.2999] Dropping msg CAPWAP_ECHO_REQUEST, type = 1, len = 0, eleLen = 8, sendSeqNum = 51
[*12/15/2022 19:57:59.2999] Flexconnect Switching to Standalone Mode!
[*12/15/2022 19:57:59.3699]
[*12/15/2022 19:57:59.3699] CAPWAP State: DTLS Teardown
[*12/15/2022 19:58:13.6199] Discovery Response from 10.19.19.15
[*12/15/2022 19:58:13.6199] Discovery Response from 10.19.19.15
[*12/15/2022 19:58:24.0000]
[*12/15/2022 19:58:24.0000] CAPWAP State: DTLS Setup
[*12/15/2022 19:59:21.0599]
[*12/15/2022 19:59:21.0599] CAPWAP State: DTLS Teardown
[*12/15/2022 19:59:35.3199] Discovery Response from 10.19.19.15
[*12/15/2022 19:59:35.3199] Discovery Response from 10.19.19.15
[*12/15/2022 19:59:44.0000]
[*12/15/2022 19:59:44.0000] CAPWAP State: DTLS Setup
[*12/15/2022 19:59:44.7499]
[*12/15/2022 19:59:44.7499] CAPWAP State: Join
[*12/15/2022 19:59:44.7999] Sending Join request to 10.19.19.15 through port 5256
[*12/15/2022 19:59:44.8199] Join Response from 10.19.19.15
[*12/15/2022 19:59:44.8199] AC accepted join request with result code: 0
[*12/15/2022 19:59:44.8199] Master-Slave: role 3, master 10.19.19.9, old 1
[*12/15/2022 19:59:44.8199] Aborting image download(0x1): Changing master IP4,
[*12/15/2022 19:59:45.0299] do ABORT, part1 is active part
[*12/15/2022 19:59:45.0999] upgrade.sh: Cleanup tmp files ...
[*12/15/2022 19:59:45.1999] Master-Slave: Set to Slave, retry 44, set_tftp_server 0, Master AP 10.19.19.9, Join role Slave, tftp_timeoutCnt 3
[*12/15/2022 19:59:45.2099] Image pre-download request for version 10.7.1.0.
[*12/15/2022 19:59:45.3499] do NO_UPGRADE, part1 is active part
[*12/15/2022 19:59:45.3499] Received wlcType 1, timer 120
[*12/15/2022 19:59:45.4499]
[*12/15/2022 19:59:45.4499] CAPWAP State: Image Data
[*12/15/2022 19:59:45.4699] AP image version 10.7.1.0 backup 10.6.1.0, Controller 10.7.1.0
[*12/15/2022 19:59:45.4699] Version is the same, do not need update.
[*12/15/2022 19:59:45.5999] do NO_UPGRADE, part1 is active part
[*12/15/2022 19:59:45.5999]
[*12/15/2022 19:59:45.5999] CAPWAP State: Configure
[*12/15/2022 19:59:45.6399] DOT11_CFG[0] Radio Mode is changed from Remote Bridge to Remote Bridge
[*12/15/2022 19:59:45.6399] DOT11_CFG[1] Radio Mode is changed from Remote Bridge to Remote Bridge
[*12/15/2022 19:59:45.8399] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:59:45.8399] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:59:45.8599] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:59:45.8599] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:59:46.2899] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:59:46.2899] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:59:46.2999] DOT11_CFG[0]: Starting radio 0
[*12/15/2022 19:59:46.2999] DOT11_CFG[1]: Starting radio 1
[*12/15/2022 19:59:46.6599]
[*12/15/2022 19:59:46.6599] CAPWAP State: Run
[*12/15/2022 19:59:46.8299] AP has joined controller AP1
[*12/15/2022 19:59:46.8899] Flexconnect Switching to Connected Mode!
[*12/15/2022 19:59:46.9699] RLAN_CRIT-RlanPortControl:: platform_set_lan_poe_enabled :Insufficient power, POE-out not supported !!
[*12/15/2022 19:59:47.6999] chpasswd: password for user changed
[*12/15/2022 19:59:47.8999] Setting efficientUpgradeState 1
[*12/15/2022 19:59:47.9099] DOT11_CFG[0]: (Primary Auth Radius Server) Config not applied
[*12/15/2022 19:59:47.9099] DOT11_CFG[1]: (Primary Auth Radius Server) Config not applied
[*12/15/2022 19:59:47.9199] DOT11_CFG[0]: (Secondary Auth Radius Server) Config not applied
[*12/15/2022 19:59:47.9199] DOT11_CFG[1]: (Secondary Auth Radius Server) Config not applied
[*12/15/2022 19:59:47.9699] Got WSA Server config TLVs
[*12/15/2022 19:59:47.9699] Recvd FQDN Config Payload
[*12/15/2022 19:59:47.9699]
[*12/15/2022 19:59:47.9699] AP is already configured for this type.
[*12/15/2022 19:59:48.4299]
[*12/15/2022 19:59:48.4299] ========== enable_skb_stats_wireless_counters = 1 ==============
[*12/15/2022 20:00:13.9199] set cleanair [slot0][band0] disable
[*12/15/2022 20:00:13.9199] CLEANAIR: Slot 0 admin disabled
[*12/15/2022 20:00:13.9199] set cleanair [slot1][band1] disable
[*12/15/2022 20:00:15.9199] CLEANAIR: Slot 1 admin disabled
[*12/15/2022 20:02:41.7399] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=67, NumofPendingMsgs=9
[*12/15/2022 20:02:41.7399]
[*12/15/2022 20:02:44.5899] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=67, NumofPendingMsgs=9
[*12/15/2022 20:02:44.5899]
[*12/15/2022 20:03:26.7799] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=80, NumofPendingMsgs=2
[*12/15/2022 20:03:26.7799]
[*12/15/2022 20:03:29.6299] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=80, NumofPendingMsgs=2
[*12/15/2022 20:03:29.6299]
[*12/15/2022 20:03:32.4799] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=80, NumofPendingMsgs=2
[*12/15/2022 20:03:32.4799]
[*12/15/2022 20:03:35.3299] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=80, NumofPendingMsgs=2
[*12/15/2022 20:03:35.3299]
[*12/15/2022 20:04:36.9499] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=96, NumofPendingMsgs=5
[*12/15/2022 20:04:36.9499]
[*12/15/2022 20:04:39.7899] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=98, NumofPendingMsgs=7
[*12/15/2022 20:04:39.7899]
[*12/15/2022 20:04:42.6399] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=98, NumofPendingMsgs=7
[*12/15/2022 20:04:42.6399]
[*12/15/2022 20:04:45.4899] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=98, NumofPendingMsgs=7
[*12/15/2022 20:04:45.4899]
[*12/15/2022 20:05:34.6199] Re-Tx Count=1, Max Re-Tx Value=5, SendSeqNum=110, NumofPendingMsgs=5
[*12/15/2022 20:05:34.6199]
[*12/15/2022 20:05:37.4699] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=110, NumofPendingMsgs=5
[*12/15/2022 20:05:37.4699]
[*12/15/2022 20:05:40.3199] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=110, NumofPendingMsgs=5
[*12/15/2022 20:05:40.3199]
[*12/15/2022 20:05:43.1799] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=114, NumofPendingMsgs=9
[*12/15/2022 20:05:43.1799]
[*12/15/2022 20:05:46.0299] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=114, NumofPendingMsgs=9
[*12/15/2022 20:05:46.0299]
[*12/15/2022 20:05:48.8799] Max retransmission count exceeded, going back to DISCOVER mode.
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 863, eleLen = 871, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] ..Vendor Type: SPAM_DATA_ECHO_REPORT_PAYLOAD(179) len 15 vendId 409600
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 38, eleLen = 46, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ....TLV: TLV_ECHOPAYLOAD(42), level: 0, seq: 0, nested: true
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 64, eleLen = 72, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ....TLV: TLV_APETHERINTFPAYLOAD(46), level: 0, seq: 0, nested: true
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 64, eleLen = 72, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ....TLV: TLV_APETHERINTFPAYLOAD(46), level: 0, seq: 0, nested: true
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_ECHO_REQUEST, type = 1, len = 0, eleLen = 8, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 35, eleLen = 43, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ....TLV: TLV_AP_THROUGHPUT_PAYLOAD(745), level: 0, seq: 0, nested: true
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 35, eleLen = 43, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ....TLV: TLV_AP_THROUGHPUT_PAYLOAD(745), level: 0, seq: 0, nested: true
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 3083, eleLen = 3091, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: STAT_PAYLOAD(38) len 3079 vendId 409600
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 3083, eleLen = 3091, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: STAT_PAYLOAD(38) len 3079 vendId 409600
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 16, eleLen = 24, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: AP_BACKHAUL_PAYLOAD(112) len 12 vendId 409600
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 1126, eleLen = 1134, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: MESH_ENV_UPDATE_PAYLOAD(167) len 1122 vendId 409600
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 802, eleLen = 810, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: MESH_NODE_UPDATE_PAYLOAD(110) len 798 vendId 409600
[*12/15/2022 20:05:48.8799] Dropping msg CAPWAP_WTP_EVENT_REQUEST, type = 34, len = 346, eleLen = 354, sendSeqNum = 118
[*12/15/2022 20:05:48.8799] ..Vendor Type: MESH_NEIGHS_UPDATE_PAYLOAD(111) len 342 vendId 409600
[*12/15/2022 20:05:48.8799] Flexconnect Switching to Standalone Mode!
[*12/15/2022 20:05:48.9599]
[*12/15/2022 20:05:48.9599] CAPWAP State: DTLS Teardown
[

marce1000
Hall of Fame
Hall of Fame

 

                          >...:Insufficient power, POE-out not supported !!
  - This could be a powering problem, are the access points using POE ? Is sufficient power provided ?

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '